Date: Mon, 7 Jan 2002 13:57:26 +0200 From: Yonatan Bokovza <Yonatan@xpert.com> To: "'cjclark@alum.mit.edu'" <cjclark@alum.mit.edu>, Leo Bicknell <bicknell@ufp.org> Cc: "Rogier R. Mulhuijzen" <drwilco@drwilco.net>, freebsd-hackers@FreeBSD.ORG Subject: RE: path_mtu_discovery Message-ID: <EB513E68D3F5D41191CA000255588101B436F7@mailserv.xpert.com>
next in thread | raw e-mail | index | archive | help
> -----Original Message----- > From: Crist J. Clark [mailto:cristjc@earthlink.net] > Sent: Sunday, January 06, 2002 02:39 > To: Leo Bicknell > Cc: Rogier R. Mulhuijzen; freebsd-hackers@FreeBSD.ORG > Subject: Re: path_mtu_discovery [snip] > I'd support it if anyone actually has any credible evidence that such > attacks have ever occured. Or if there is are plausible ways to attack > that don't require someone to sniff and inject into a connection in > which the victim is participating (if you can do that, you can do much > worse). The original message of the "old thread" mentioned: http://docs.freebsd.org/cgi/getmsg.cgi?fetch=4186+0+archive/2001/freebsd-sec urity/20010715.freebsd-security Darren Reed's post to BugTraq implied, IIRC, that an attacker can kill (or slow down) a server if he requests a large file with low MSS. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?EB513E68D3F5D41191CA000255588101B436F7>