看板FB_security
标 题Re: TCP RST attack
发信站NCTU CSIE FreeBSD Server (Tue Apr 20 18:16:48 2004)
转信站ptt!FreeBSD.csie.NCTU!not-for-mail
Dragos Ruiu <
[email protected]> writes:
> On April 20, 2004 10:44 am, Dag-Erling Sm=F8rgrav wrote:
> > The advisory grossly exaggerates the impact and severity of this
> > fea^H^H^Hbug. The attack is only practical if you already know the
> > details of the TCP connection you are trying to attack, or are in a
> > position to sniff it.
> This is not true. The attack does not require sniffing.
You need to know the source and destination IP and port. In most
cases, this means sniffing. BGP is easier because the destination
port is always 179 and the source and destination IPs are recorded in
the whois database, but you still need to know the source port.
DES
--=20
Dag-Erling Sm=F8rgrav -
[email protected]
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "
[email protected]"