IKE resource exhaustion at 2 to 10 packets per second

2006-07-27 Thread William Allen Simpson
http://www.nta-monitor.com/posts/2006/07/cisco-concentrator-dos.html The vulnerability allows an attacker to exhaust the IKE resources on a remote VPN concentrator by starting new IKE sessions faster than the concentrator expires them from its queue. By doing this, the attacker fills up the

Re: Crypto to defend chip IP: snake oil or good idea?

2006-07-27 Thread Anne Lynn Wheeler
a related article (that also mentions certicom crypto): How Secure Is That Device? As device software joins the larger world, security becomes ever more vital http://dso.com/news/showArticle.jhtml?articleID=191501076 and some general comments in another thread

Re: Crypto to defend chip IP: snake oil or good idea?

2006-07-27 Thread Thor Lancelot Simon
On Tue, Jul 25, 2006 at 03:49:11PM -0600, Anne Lynn Wheeler wrote: Perry E. Metzger wrote: EE Times is carrying the following story: http://www.eetimes.com/news/latest/showArticle.jhtml?articleID=190900759 It is about attempts to use cryptography to protect chip designs from