From owner-freebsd-security@FreeBSD.ORG Tue Sep 16 14:10:50 2014 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 62EB264E for ; Tue, 16 Sep 2014 14:10:50 +0000 (UTC) Received: from manchester-1.man.uk.cluster.ok24.net (manchester-1.man.uk.cluster.ok24.net [213.138.100.64]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 1BFD42A2 for ; Tue, 16 Sep 2014 14:10:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=simple/simple; d=pyro.eu.org; s=09.2014; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:References:Subject:To:MIME-Version:From:Date:Message-ID; bh=uebN9znn3TlAFvHMlf/P2BPHeTCsLVL9uoqaORShnPA=; b=iIzs13vzGGXNHqXfO+WrBcxH158a1jvf7Q4gXNMsSi5AVDJwr/pcrIee6VTCD37p1YF11PRDhMzCkut1YoS+6U0uyArju8aKQZBJeQXfSKfob2eHl/hkiwlDQL94GAPKVylBfghNX27LCU7jMQ4BGpt6zB4xYxYvupGXj0zeQK4=; X-Spam-Status: No, score=-1.1 required=2.0 tests=ALL_TRUSTED, BAYES_00, DKIM_ADSP_DISCARD Received: from guisborough-1.rcc.uk.cluster.ok24.net ([217.155.40.118]) by manchester-1.man.uk.cluster.ok24.net with esmtps (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.80) (envelope-from ) id 1XTtSj-0002Bb-5s for freebsd-security@freebsd.org; Tue, 16 Sep 2014 15:10:43 +0100 Received: from [10.0.1.191] by guisborough-1.rcc.uk.cluster.ok24.net with esmtpsa (TLSv1:DHE-RSA-AES128-SHA:128) (Exim 4.80) (envelope-from ) id 1XTtSi-0007QF-5i for freebsd-security@freebsd.org; Tue, 16 Sep 2014 15:10:32 +0100 Message-ID: <541844D7.9090600@pyro.eu.org> Date: Tue, 16 Sep 2014 15:10:31 +0100 From: Steven Chamberlain User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Icedove/24.7.0 MIME-Version: 1.0 To: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-14:19.tcp References: <201409161014.s8GAE77Z070671@freefall.freebsd.org> <54180EBF.2050104@pyro.eu.org> <5418427B.9080909@delphij.net> In-Reply-To: <5418427B.9080909@delphij.net> X-Enigmail-Version: 1.6 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 8bit X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 16 Sep 2014 14:10:50 -0000 On 16/09/14 15:00, Xin Li wrote: > By default RST has to be within the window if the connection is in > ESTABLISHED state. So in order to do that the attacker still need to > guess or know the sequence number. Thanks, I didn't know that; that must be how a router or MITM attacker is able to do that so easily. Whereas, the attack described in this advisory could work blindly against two remote endpoints. I believe I understand now. Regards, -- Steven Chamberlain steven@pyro.eu.org