Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 7 Jan 2002 13:57:26 +0200 
From:      Yonatan Bokovza <Yonatan@xpert.com>
To:        "'cjclark@alum.mit.edu'" <cjclark@alum.mit.edu>, Leo Bicknell <bicknell@ufp.org>
Cc:        "Rogier R. Mulhuijzen" <drwilco@drwilco.net>, freebsd-hackers@FreeBSD.ORG
Subject:   RE: path_mtu_discovery
Message-ID:  <EB513E68D3F5D41191CA000255588101B436F7@mailserv.xpert.com>

next in thread | raw e-mail | index | archive | help
> -----Original Message-----
> From: Crist J. Clark [mailto:cristjc@earthlink.net]
> Sent: Sunday, January 06, 2002 02:39
> To: Leo Bicknell
> Cc: Rogier R. Mulhuijzen; freebsd-hackers@FreeBSD.ORG
> Subject: Re: path_mtu_discovery
[snip] 
> I'd support it if anyone actually has any credible evidence that such
> attacks have ever occured. Or if there is are plausible ways to attack
> that don't require someone to sniff and inject into a connection in
> which the victim is participating (if you can do that, you can do much
> worse).

The original message of the "old thread" mentioned:
http://docs.freebsd.org/cgi/getmsg.cgi?fetch=4186+0+archive/2001/freebsd-sec
urity/20010715.freebsd-security

Darren Reed's post to BugTraq implied, IIRC, that an attacker can
kill (or slow down) a server if he requests a large file with low MSS.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?EB513E68D3F5D41191CA000255588101B436F7>