From owner-freebsd-hackers Mon Jan 7 3:58:28 2002 Delivered-To: freebsd-hackers@freebsd.org Received: from void.xpert.com (xpert.com [199.203.132.1]) by hub.freebsd.org (Postfix) with ESMTP id 7CEEA37B41C for ; Mon, 7 Jan 2002 03:58:22 -0800 (PST) Received: from mailserv.xpert.com ([199.203.132.135]) by void.xpert.com with esmtp (Exim 3.22 #1) id 16NYJf-0006Ie-00; Mon, 07 Jan 2002 13:51:47 +0200 Received: by mailserv.xpert.com with Internet Mail Service (5.5.2650.21) id ; Mon, 7 Jan 2002 13:57:33 +0200 Message-ID: From: Yonatan Bokovza To: "'cjclark@alum.mit.edu'" , Leo Bicknell Cc: "Rogier R. Mulhuijzen" , freebsd-hackers@FreeBSD.ORG Subject: RE: path_mtu_discovery Date: Mon, 7 Jan 2002 13:57:26 +0200 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2650.21) Content-Type: text/plain; charset="iso-8859-1" Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG > -----Original Message----- > From: Crist J. Clark [mailto:cristjc@earthlink.net] > Sent: Sunday, January 06, 2002 02:39 > To: Leo Bicknell > Cc: Rogier R. Mulhuijzen; freebsd-hackers@FreeBSD.ORG > Subject: Re: path_mtu_discovery [snip] > I'd support it if anyone actually has any credible evidence that such > attacks have ever occured. Or if there is are plausible ways to attack > that don't require someone to sniff and inject into a connection in > which the victim is participating (if you can do that, you can do much > worse). The original message of the "old thread" mentioned: http://docs.freebsd.org/cgi/getmsg.cgi?fetch=4186+0+archive/2001/freebsd-sec urity/20010715.freebsd-security Darren Reed's post to BugTraq implied, IIRC, that an attacker can kill (or slow down) a server if he requests a large file with low MSS. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message