Re: TCP-RST Vulnerability - Doubt
From: Florian Weimer
Date: Mon Jun 28 2004 - 14:19:49 EST
* Andre Tomt:
> I have not seen anything conclusive on this yet. How sensitive is
> Linux to the attack?
The original RST-based attack was against a mixed Cisco/Linux+Quagga
environment, IIRC. This combination is especially vulnerable if the
BGP connection is established in the right direction.
However, nobody has probably bothered to replicate that attack in the
lab. As published, the attack just doesn't work against Cisco/Cisco
peerings. Unfortunately, there is another that *might* actually work,
that's why there was so much fuss about it.
If you have some window checking bugs (like the BSDs had), it can be
quite worse, of course. But such issues are usually way overrated.
Most DoS potential remains unexploited anyway, and I don't think the
disruption from people frantically enabling the TCP MD5 option payed
off in the end.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/