|
BugTraq
A new TCP/IP blind data injection technique? Dec 10 2003 11:28PM Michal Zalewski (lcamtuf ghettot org) (3 replies) Re: A new TCP/IP blind data injection technique? Dec 11 2003 07:37AM Nick Cleaton (nick cleaton net) (2 replies) Breaking the checksum (a new TCP/IP blind data injection technique) Dec 14 2003 02:38PM Michal Zalewski (lcamtuf ghettot org) Re: A new TCP/IP blind data injection technique? Dec 11 2003 05:06PM Valdis Kletnieks vt edu (1 replies) Re[2]: A new TCP/IP blind data injection technique? Dec 13 2003 09:59AM Marius Huse Jacobsen (mahuja c2i net) Re: A new TCP/IP blind data injection technique? Dec 10 2003 11:59PM Kris Kennaway (kris FreeBSD org) (1 replies) Re: A new TCP/IP blind data injection technique? Dec 11 2003 05:17PM Casper Dik (casper holland sun com) |
|
Privacy Statement |
> From: Michal Zalewski [mailto:lcamtuf (at) ghettot (dot) org [email concealed]]
>
<snip>
> 1. Path MTU discovery (DF set) prevents fragmentation [*]; some modern
> systems (Linux) default to this mode - although PMTU discovery is
> also known to cause problems in certain setups, so it is not always
> the best way to stop the attack.
>
> [*] Also note that certain types of routers or tunnels tend to
> ignore DF flag, possibly opening this vector again.
<snip>
> Note that this has nothing to do with old firewall bypassing techniques
> and other tricks that used fragmentation to fool IDSes and so on -
> mandatory defragmentation of incoming traffic on perimeter devices will
> not solve the problem.
I concluded some time back -- coming at it from an entirely different
angle from either of these -- that IP-layer fragmentation and reassembly
was fatally flawed. All sane implementations should set DF, and all but
the most secure of tunnels should honour it.
David Gillett
[ reply ]