Date: Tue, 16 Sep 2014 15:10:31 +0100 From: Steven Chamberlain <steven@pyro.eu.org> To: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-14:19.tcp Message-ID: <541844D7.9090600@pyro.eu.org> In-Reply-To: <5418427B.9080909@delphij.net> References: <201409161014.s8GAE77Z070671@freefall.freebsd.org> <54180EBF.2050104@pyro.eu.org> <5418427B.9080909@delphij.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On 16/09/14 15:00, Xin Li wrote: > By default RST has to be within the window if the connection is in > ESTABLISHED state. So in order to do that the attacker still need to > guess or know the sequence number. Thanks, I didn't know that; that must be how a router or MITM attacker is able to do that so easily. Whereas, the attack described in this advisory could work blindly against two remote endpoints. I believe I understand now. Regards, -- Steven Chamberlain steven@pyro.eu.org
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?541844D7.9090600>