From mboxrd@z Thu Jan 1 00:00:00 1970 From: Florian Weimer Subject: Re: tcp vulnerability? haven't seen anything on it here... Date: Thu, 22 Apr 2004 15:58:40 +0200 Sender: netdev-bounce@oss.sgi.com Message-ID: <87zn94w1v3.fsf@deneb.enyo.de> References: <1082640135.1059.93.camel@jzny.localdomain> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Giuliano Pochini , "David S. Miller" , linux-kernel@vger.kernel.org, netdev@oss.sgi.com, cfriesen@nortelnetworks.com, =?iso-8859-1?q?J=F6rn_Engel?= Return-path: To: hadi@cyberus.ca In-Reply-To: <1082640135.1059.93.camel@jzny.localdomain> (hadi@cyberus.ca's message of "22 Apr 2004 09:22:16 -0400") Errors-to: netdev-bounce@oss.sgi.com List-Id: netdev.vger.kernel.org jamal writes: > OTOH, long lived BGP sessions are affected assuming you are going across > hostile path to your peer. Hostile path is not required. Not at all. 8-( And it's not BGP specific. You might be able to use this attack to split IRC networks, too. However, it's a bit harder in this case because IRC servers usually use more random source ports. -- Current mail filters: many dial-up/DSL/cable modem hosts, and the following domains: atlas.cz, bigpond.com, postino.it, tiscali.co.uk, tiscali.cz, tiscali.it, voila.fr.