Hello,
When a TCP connection is established between 2 computers, it is known that 
it can be broken with an hand-made icmp packet sent to one of the computers 
by a third one, saying that the port it is connected to is unreachable (this 
one works, maybe other errors work too).
The ICMP packet must contain the IP header of the packet which triggered its 
emission plus the height first bytes of ip data.
This is enough to identify which connection is concerned.
My question is why the network layer doesn't take more care of some other 
fields than the ones strictly necessary (like ip identification field, or 
TCP sequence number for TCP connections) to prevent these attacks to success 
(they just have the client port to guess if they know what service you are 
using (without sniffing, of course)).
Phil

ps: theses attacks doesn't seem to work on the (buggy) windows 95 telnet 
client, but i don't know whether it's because of a network layer that take 
care about id fields or it is because of a network layer that doesn't care 
about icmp for tcp connections. Ideas?


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com
-
To unsubscribe from this list: send the line "unsubscribe linux-net" in
the body of a message to [EMAIL PROTECTED]

Reply via email to