From mboxrd@z Thu Jan 1 00:00:00 1970 From: Chris Friesen Subject: Re: tcp vulnerability? haven't seen anything on it here... Date: Thu, 22 Apr 2004 11:42:51 -0400 Sender: netdev-bounce@oss.sgi.com Message-ID: <4087E7FB.7000400@nortelnetworks.com> References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Cc: jamal , linux-kernel@vger.kernel.org, netdev@oss.sgi.com Return-path: To: alex@pilosoft.com In-Reply-To: Errors-to: netdev-bounce@oss.sgi.com List-Id: netdev.vger.kernel.org alex@pilosoft.com wrote: > Nevertheless, number of packets to kill the session is still *large* > (under "best-case" for attacker, you need to send 2^30 packets)... I though the whole point of this vulnerability was that you "only" needed to send 64K packets, not 2^30. Chris