Date: Tue, 16 Sep 2014 11:19:43 +0100 From: Steven Chamberlain <steven@pyro.eu.org> To: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-14:19.tcp Message-ID: <54180EBF.2050104@pyro.eu.org> In-Reply-To: <201409161014.s8GAE77Z070671@freefall.freebsd.org> References: <201409161014.s8GAE77Z070671@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi, On 16/09/14 11:14, FreeBSD Security Advisories wrote: > An attacker who has the ability to spoof IP traffic can tear down a > TCP connection by sending only 2 packets, if they know both TCP port > numbers. This may be a silly question but, if the attacker can spoof IP traffic, can't the same be done with a single RST packet? Thanks Regards, -- Steven Chamberlain steven@pyro.eu.org
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?54180EBF.2050104>