看板FB_security
标 题Re: [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
发信站NCTU CSIE FreeBSD Server (Wed Apr 21 23:20:59 2004)
转信站ptt!FreeBSD.csie.NCTU!not-for-mail
On 21 Apr, Mike Silbersack wrote:
>
> On Wed, 21 Apr 2004, Don Lewis wrote:
>
>> > 1. Accept all RSTs meeting the criteria you just listed above.
>>
>> At this step, it would be better if we used the window size that was
>> advertised it the last packet sent, since that is what the sequence
>> number of the RST packet will be calculated from, while the window size
>> could have increased if data was consumed from the receive queue between
>> the time we sent the last packet and when we received the RST.
>>
>> It doesn't look like we keep the necessary data for this. Probably the
>> easiest thing to do would be to calculate the expected sequence number
>> in tcp_output() and stash it in the pcb.
>
> Do you have access to a system that exhibits the "RST at end of window"
> syndrome so that you could code up and test out this part of the patch?
Nope. The only report of this that I saw was from jayanth. Judging by
the tcpdump timestamps, it looks like whatever this wierd piece of
hardware was, it was nearby.
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "
[email protected]"