tcp timestamp vulnerability?

Christian Brueffer chris at unixpages.org
Thu May 19 02:50:20 PDT 2005


On Thu, May 19, 2005 at 11:42:33AM +0200, Andre Oppermann wrote:
> Christian Brueffer wrote:
> > 
> > Hi,
> > 
> > has anyone taken a look at http://www.kb.cert.org/vuls/id/637934?
> 
> sys/netinet/tcp_input.c Revision 1.270, Sun Apr 10 05:24:59 2005 UTC
>  (5 weeks, 4 days ago) by ps
>  Branch: MAIN
>  Changes since 1.269: +23 -3 lines
> 
>  - Tighten up the Timestamp checks to prevent a spoofed segment from
>    setting ts_recent to an arbitrary value, stopping further
>    communication between the two hosts.
>  - If the Echoed Timestamp is greater than the current time,
>    fall back to the non RFC 1323 RTT calculation.
> 
>  Submitted by:	Raja Mukerji (raja at moselle dot com)
>  Reviewed by:	Noritoshi Demizu, Mohan Srinivasan
> 

Thanks.  Since I got this from the Heise Newsticker I'll see if I can
get them to update their story.

- Christian

-- 
Christian Brueffer	chris at unixpages.org	brueffer at FreeBSD.org
GPG Key:	 http://people.freebsd.org/~brueffer/brueffer.key.asc
GPG Fingerprint: A5C8 2099 19FF AACA F41B  B29B 6C76 178C A0ED 982D
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
Url : http://lists.freebsd.org/pipermail/freebsd-net/attachments/20050519/70f66955/attachment.bin


More information about the freebsd-net mailing list