lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060807222413.13035.qmail@securityfocus.com> Date: 7 Aug 2006 22:24:13 -0000 From: henry.sieff@...il.com To: bugtraq@...urityfocus.com Subject: Re: Re: Cisco VPN Concentrator IKE resource exhaustion DoS Advisory Cisco recommends a workaround which essentially sets a limit on the number of outstanding SA's and drops new SA requests if they exceed that limit (outlined in http://www.cisco.com/en/US/products/sw/iosswrel/ps5207/products_feature_guide09186a0080229125.html) It seems to me that this will not accomplish much - presumably the determined attacker will simply continue to send packets - as soon as the number of SA'ss drops below that limit the attacker will simply fill up the queue again. Am I missing something about the vulnerability or the supposed fix from Cisco?