[63456] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Kiss-o'-death packets?

daemon@ATHENA.MIT.EDU (Sean Donelan)
Mon Oct 6 06:08:47 2003

Date: Mon, 6 Oct 2003 06:08:10 -0400 (EDT)
From: Sean Donelan <sean@donelan.com>
To: Peter Galbavy <peter.galbavy@knowtion.net>
Cc: Valdis.Kletnieks@vt.edu, <nanog@merit.edu>
In-Reply-To: <002901c38be9$72b37430$2f28a8c0@cblan.mblox.com>
Errors-To: owner-nanog-outgoing@merit.edu


On Mon, 6 Oct 2003, Peter Galbavy wrote:
> Erm, I can see a huge DoS hole waiting to happen to any protocol that
> doesn't in turn implement some sort of authentication of the server. The
> more protocols you allow to do this, the more potential for DoS of important
> (possibly) client information.

Uhm, you are also aware that if the attacker can spoof the kiss-o'-death
packets; the same attacker could spoof all sorts of other packets
including the time protocol packets to change the clock on your computer.



home help back first fref pref prev next nref lref last post