[3467] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Excellent host SYN-attack fix for BSD hosts

daemon@ATHENA.MIT.EDU (Darren Reed)
Tue Oct 15 15:01:11 1996

Date: 	Tue, 15 Oct 1996 23:02:26 +1000
Reply-To: Darren Reed <avalon@coombs.anu.edu.au>
From: Darren Reed <avalon@coombs.anu.edu.au>
X-To:         jaw@Op.Net
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@NETSPACE.ORG>
In-Reply-To:  <199610141743.NAA23076@sulcus.op.net> from "Jeff Weisberg" at Oct
              14, 96 01:43:09 pm

In some mail from Jeff Weisberg, sie said:
>
> "Charles M. Hannum" <mycroft@mit.edu> commented:
> | It also breaks TCP's algorithm for
> | recognizing stale data.
>
> how so?
>
> I admit that in writing the code, I was far more concerned with stopping
> the attack we were under, than I was in any theoretical reliability concerns,
> but the way we generate the iss (which I cannot take credit for), we will
> not get values that are slightly less than a previous one for a given set of
> {saddr,sport, daddr,dport} which should suffice for the above concern.

Hmmm, RFC1948 addresses the issue of generating a good ISS value.  Did you
implement this ?

Darren

home help back first fref pref prev next nref lref last post