[69991] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: TCP/BGP vulnerability - easier than you think

daemon@ATHENA.MIT.EDU (Leo Bicknell)
Fri Apr 23 11:18:22 2004

Date: Fri, 23 Apr 2004 11:15:11 -0400
From: Leo Bicknell <bicknell@ufp.org>
To: nanog@merit.edu
Mail-Followup-To: nanog@merit.edu
In-Reply-To: <683D2462-950B-11D8-B78B-000A95CD987A@muada.com>
Errors-To: owner-nanog-outgoing@merit.edu



--pf9I7BMVVzbSWLtt
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable


I point out NetBSD released this:

ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.a=
sc

Of interest is this paragraph:

] Additionally, the 4.4BSD stack from which NetBSD's stack is derived, did
] not even check that a RST's sequence number was inside the window. RSTs
] anywhere to the left of the window were treated as valid.

It's a good thing the 4.4BSD stack was unpopular, otherwise it might be
in a lot of programs.

--=20
       Leo Bicknell - bicknell@ufp.org - CCIE 3440
        PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - tmbg-list-request@tmbg.org, www.tmbg.org

--pf9I7BMVVzbSWLtt
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (FreeBSD)

iD8DBQFAiTL/Nh6mMG5yMTYRAq2/AJ0RZUhxvnKeNkQjlAnrkvGZb4SQMwCeInSB
WxzSNePMsv1j+I4rEXFWIiE=
=vON/
-----END PGP SIGNATURE-----

--pf9I7BMVVzbSWLtt--

home help back first fref pref prev next nref lref last post