[3466] in bugtraq
Re: Excellent host SYN-attack fix for BSD hosts
daemon@ATHENA.MIT.EDU (Ollivier Robert)
Tue Oct 15 14:35:06 1996
Date: Tue, 15 Oct 1996 08:35:40 +0100
Reply-To: Ollivier Robert <ollivier.robert@eurocontrol.fr>
From: Ollivier Robert <ollivier.robert@eurocontrol.fr>
X-To: Avi Freedman <freedman@netaxs.com>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@NETSPACE.ORG>
In-Reply-To: <199610111357.JAA15305@access.netaxs.com>; from Avi Freedman on
Oct 11, 1996 12:10:08 -0500
According to Avi Freedman:
> contains a few bits for reference into a table of MSS values; window size
> and any initial data is discarded; and the rest of the ISS is the MD5 output
It will also break T/TCP I think. While it is not a big issue at the moment
it may become a real one later. Stevens in his thirs volume describe why
T/TCP is a good thing and it will be seen more and more in the future.
In FreeBSD-current, there is a fix too for the SYN attack. I don't remember
the details of what has been done but the source code is of course
available.
--
Ollivier ROBERT -=- Eurocontrol EEC/TS -=- Ollivier.Robert@eurocontrol.fr