Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 12 Feb 2005 16:27:43 -0500 (EST)
From:      Garrett Wollman <wollman@khavrinen.lcs.mit.edu>
To:        Andre Oppermann <oppermann@networx.ch>
Cc:        freebsd-current@FreeBSD.ORG
Subject:   Re: known TCP vulnerability ??
Message-ID:  <200502122127.j1CLRhJ6018329@khavrinen.lcs.mit.edu>
In-Reply-To: <420D1344.9DAC70D0@networx.ch>
References:  <00CDF9AA240E204FA6E923BD35BC64360879060E@bcs-mail.internal.cacheflow.com> <420D1344.9DAC70D0@networx.ch>

next in thread | previous in thread | raw e-mail | index | archive | help
<<On Fri, 11 Feb 2005 21:19:16 +0100, Andre Oppermann <oppermann@networx.ch> said:

> "Li, Qing" wrote:
>> Ran the packet tests against FreeBSD 5.3 and 6-CURRENT and both
>> respond to the SYN+FIN packets with SYN+ACK.

> This is expected behaviour because of FreeBSD used to implement T/TCP
> according to RFC1644.

Actually, it is expected behavior because FreeBSD used to implement
TCP according to RFC 793.

-GAWollman



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200502122127.j1CLRhJ6018329>