[nsp-sec] Potential TCP / IP vulnerabilities announcedmidOctober - Outpost24 interview

David Freedman david.freedman at uk.clara.net
Sat Oct 4 10:00:32 EDT 2008


Yes, well, I could sit there spoofing TOOBIG messages
and make the node send smaller (but more) packets 
driving its CPU up, surely?

------------------------------------------------
David Freedman
Group Network Engineering 
Claranet Limited
http://www.clara.net



-----Original Message-----
From: Florian Weimer [mailto:fweimer at bfk.de]
Sent: Sat 10/4/2008 14:41
To: David Freedman
Cc: Chris Morrow; nsp-security at puck.nether.net
Subject: Re: [nsp-sec] Potential TCP / IP vulnerabilities announcedmidOctober - Outpost24 interview
 
* David Freedman:

> ----------- nsp-security Confidential --------
>
> I'm surprised nobody is sprouting this one at the moment:
>
> http://tools.ietf.org/html/draft-ietf-tcpm-icmp-attacks-03
>
> attacking ICMP is far more profitable since the communication is 
> unidirectional, you don't have to guess TCP sequence numbers,
> and you can tear down TCP with it.

The difference is between taking down a single TCP connection (where
you even have to guess the connection quadruple, at the very least),
and taking out the entire node.

-- 
Florian Weimer                <fweimer at bfk.de>
BFK edv-consulting GmbH       http://www.bfk.de/
Kriegsstraße 100              tel: +49-721-96201-1
D-76133 Karlsruhe             fax: +49-721-96201-99




More information about the nsp-security mailing list