El 28/07/14 15:28, Eric Rescorla escribió:



On Mon, Jul 28, 2014 at 6:08 AM, Derek Fawcus <[email protected] <mailto:[email protected]>> wrote:

    On Mon, Jul 28, 2014 at 08:57:10AM +0200, marcelo bagnulo braun wrote:
    > One of them is whether to protect or not the TCP header.

    Yes.  At least the RST flag.


Unfortunately RST is precisely the situation that's most problematic,
because it's also how the other side behaves when it has lost state,
perhaps due to a reboot. So, it seems like we at least want RST
protection to be optional. And if we're not protecting RST, it's
generally not worth protecting other headers, AFAICT.


mmm, is there a sysmtematic study about attacks using the different TCP headers that we can look at to figure out if this is the case?




-Ekr


    > I would like to start the discussion on this topic. Arguments on
    one way
    > or the other?

    I'd like to be able to know that a RST was generated by the remote
    peer,
    and not simply spoofed by a middlebox.

    If the middlebox wants to break the connection,  it can do so by
    blackholing (and maybe ICMP unreachable) the traffic after it
    decides the connection should be dropped.

    At least that way,  the two scenarios are distinguishable.

    .pdf

    _______________________________________________
    Tcpinc mailing list
    [email protected] <mailto:[email protected]>
    https://www.ietf.org/mailman/listinfo/tcpinc




_______________________________________________
Tcpinc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tcpinc

_______________________________________________
Tcpinc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tcpinc

Reply via email to