[21409] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Small TCP packets == very large overhead == DoS?

daemon@ATHENA.MIT.EDU (Eric Vyncke)
Mon Jul 9 14:22:40 2001

Message-Id: <4.3.2.7.2.20010709172029.01fe5448@brussels.cisco.com>
Date: Mon, 09 Jul 2001 17:20:50 +0200
To: bugtraq@securityfocus.com
From: Eric Vyncke <evyncke@cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed

Darren,

Interesting email...

If the attack is done through bad client specifying a ultra small MSS, at 
least, the server should be able to track them. As doing IP spoofing with 
TCP is difficult if the ISN are random enough.

If the attack is done through generated ICMP unreachable cannot fragment 
(mimicking the PMTUD process), well, the attacker needs to be on the path 
to be able to include the failed IP packet (mainly for TCP ports). And if 
the attacker is on the path, I'm pretty sure that he/she could do more 
damage anyway.

Having said this, I'll go to my web servers and check what their smallest 
MSS is ;-)

Just my still falling (!) 0.01 EUR

-eric


home help back first fref pref prev next nref lref last post