On Wed, 1 Oct 2008 15:58:22 +0200
Claudio Jeker <[EMAIL PROTECTED]> wrote:

> On Wed, Oct 01, 2008 at 03:31:00PM +0200, Stephan A. Rickauer wrote:
> > On Wed, 2008-10-01 at 14:52 +0200, Leon Dippenaar wrote:
> > > Hi there,
> > > 
> > > is there any weight to this new story on slashdot 
> > > http://it.slashdot.org/it/08/10/01/0127245.shtml
> > > 
> > > about a new attacker possible to break any tcp stack? Sounds rather 
> > > shady, so here I am, perhaps you guys have your ears closer to the ground
> > 
> > A little bit less vage info can be found here
> > 
> > http://tinyurl.com/3hv3kf
> > 
> 
> This article is mostly about exploiting SYN cookies to bring servers into
> resource starvation. OpenBSD does not implement SYN cookies. We have a SYN
> cache with a upper limit of open handshakes. Together with random initial
> sequence numbers it is hard to finish the 3-way handshake without getting
> the SYN/ACK from the server on OpenBSD systems.
> 

It seems to me the "problem" is with SYN cookies.

Dhu

> I'm not too concerned about this "fundamental problem with TCP" but as
> usual the mentioned article is less informative then the back side of my
> breakfast cereals box.
> -- 
> :wq Claudio

Reply via email to