[69919] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: TCP RST attack (the cause of all that MD5-o-rama)

daemon@ATHENA.MIT.EDU (Simon Lockhart)
Wed Apr 21 14:30:17 2004

Date: Tue, 20 Apr 2004 20:00:33 +0100
From: Simon Lockhart <simon.lockhart@bbc.co.uk>
To: James <haesu@towardex.com>
Cc: Mike Tancsa <mike@sentex.net>, nanog@merit.edu
In-Reply-To: <20040420185416.GA78419@scylla.towardex.com>
Errors-To: owner-nanog-outgoing@merit.edu


On Tue Apr 20, 2004 at 02:54:16PM -0400, James wrote:
> now the question is... would this also affect single-hop bgp sessions?
> my understanding would be no, as single-hops require ttl set to 1.

All it requires is for the TTL to be 1 (or 0, I can't remember which)
when it's received. Just launch your packets with a TTL of the number of
hops between you and the victim, and that's that bit sorted...

Simon

home help back first fref pref prev next nref lref last post