Guido van Rooij wrote:
> > > ipfilter with 'keep state' on the connections will automatically allow
> > > back in relevant ICMP messages such as mustfrag.
> >
> > Heh... I need to try to write a "mustfrag" daemon, which will
> > spoof them back whenever it sees traffic... and see what happens.
> 
> The sender will start sending smaller segments. That's it.
> But if you are in the patch between sender and receiver you can do worse
> things than that.

I knew that I could multiply the number of packets sent by a
factor of 5... I was pointing out a flaw in the idea of allowing
path MTU ICMP back in, unconditionally...

Now ask me how to DOS attack any server daemon that works by
using the "sendfile" interface...

PS: *Don't* ask me how the SYN-cache overflow SYN-cookie code
can be ACK-flooded, to make the kernel spend all its time doing
MD5 calculations, since that one is obvious...

-- Terry

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to