lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <6.2.0.14.0.20050721233608.020307d0@pop.frh.utn.edu.ar>
Date: Fri Jul 22 04:49:30 2005
From: fernando at frh.utn.edu.ar (Fernando Gont)
Subject: Re: (ICMP attacks against TCP) (was Re:
	HPSBUX01137 SSRT5954

At 02:50 a.m. 21/07/2005, Darren Reed wrote:

> > >I think it is reasonable to say anyone trying to advertise an MTU less
> > >than 576 has nefarious purposes in mind.
> >
> > There are still some radio links with MTUs of 296 bytes.
>
>Go search with google....people still actively use smaller MTUs.
>
>What do you do?  Where do you draw the line in the sand?

Again and again: Read the draft at 
http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html

It fixes the problem without having to draw any line.

--
Fernando Gont
e-mail: fernando@...t.com.ar || fgont@....org





Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ