[69991] in North American Network Operators' Group
Re: TCP/BGP vulnerability - easier than you think
daemon@ATHENA.MIT.EDU (Leo Bicknell)
Fri Apr 23 11:18:22 2004
Date: Fri, 23 Apr 2004 11:15:11 -0400
From: Leo Bicknell <bicknell@ufp.org>
To: nanog@merit.edu
Mail-Followup-To: nanog@merit.edu
In-Reply-To: <683D2462-950B-11D8-B78B-000A95CD987A@muada.com>
Errors-To: owner-nanog-outgoing@merit.edu
--pf9I7BMVVzbSWLtt
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
I point out NetBSD released this:
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.a=
sc
Of interest is this paragraph:
] Additionally, the 4.4BSD stack from which NetBSD's stack is derived, did
] not even check that a RST's sequence number was inside the window. RSTs
] anywhere to the left of the window were treated as valid.
It's a good thing the 4.4BSD stack was unpopular, otherwise it might be
in a lot of programs.
--=20
Leo Bicknell - bicknell@ufp.org - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - tmbg-list-request@tmbg.org, www.tmbg.org
--pf9I7BMVVzbSWLtt
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (FreeBSD)
iD8DBQFAiTL/Nh6mMG5yMTYRAq2/AJ0RZUhxvnKeNkQjlAnrkvGZb4SQMwCeInSB
WxzSNePMsv1j+I4rEXFWIiE=
=vON/
-----END PGP SIGNATURE-----
--pf9I7BMVVzbSWLtt--