http://arstechnica.com/information-technology/2015/05/the-discovery-of-apache-zookeepers-poison-packet/

This article describes a set of four bugs that caused a serious problem for one 
open source project:

"RFC 3948 tells the tale. It states that while using IPSec in NAT-T Transport 
mode, the client MAY forgo the validation of the TCP/UDP checksum under the 
assumption that packet integrity is already protected by ESP. ... The 
assumption made by the authors is invalid, as there is clearly ample 
opportunity for corruption prior to ESP/IP formation. While checksumming is a 
great way to detect in-flight corruption, it can also be used as a tool to 
detect corruption during the formation of the packet. It is the latter point 
that was overlooked, and this optimization has come to bite us. ... We claim 
this is a bug—intentional or not."

Russ
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to