On Mon, Jan 07, 2002 at 01:57:26PM +0200, Yonatan Bokovza wrote:
> > -----Original Message-----
> > From: Crist J. Clark [mailto:[EMAIL PROTECTED]]
> > Sent: Sunday, January 06, 2002 02:39
> > To: Leo Bicknell
> > Cc: Rogier R. Mulhuijzen; [EMAIL PROTECTED]
> > Subject: Re: path_mtu_discovery
> [snip] 
> > I'd support it if anyone actually has any credible evidence that such
> > attacks have ever occured. Or if there is are plausible ways to attack
> > that don't require someone to sniff and inject into a connection in
> > which the victim is participating (if you can do that, you can do much
> > worse).
> 
> The original message of the "old thread" mentioned:
> http://docs.freebsd.org/cgi/getmsg.cgi?fetch=4186+0+archive/2001/freebsd-sec
> urity/20010715.freebsd-security
> 
> Darren Reed's post to BugTraq implied, IIRC, that an attacker can
> kill (or slow down) a server if he requests a large file with low MSS.

I took part in that discussion and there was no mention of real
exploits. And TCP MSS is not the same thing as the PMTU (though they
can be related).

As I pointed out in that thread, there are much more devistating TCP
attacks to worry about that are still threats like "Daytona" attacks.
-- 
"It's always funny until someone gets hurt. Then it's hilarious."

Crist J. Clark                     |     [EMAIL PROTECTED]
                                   |     [EMAIL PROTECTED]
http://people.freebsd.org/~cjc/    |     [EMAIL PROTECTED]

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to