Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 16 Sep 2014 11:19:43 +0100
From:      Steven Chamberlain <steven@pyro.eu.org>
To:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-14:19.tcp
Message-ID:  <54180EBF.2050104@pyro.eu.org>
In-Reply-To: <201409161014.s8GAE77Z070671@freefall.freebsd.org>
References:  <201409161014.s8GAE77Z070671@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi,

On 16/09/14 11:14, FreeBSD Security Advisories wrote:
> An attacker who has the ability to spoof IP traffic can tear down a
> TCP connection by sending only 2 packets, if they know both TCP port
> numbers.

This may be a silly question but, if the attacker can spoof IP traffic,
can't the same be done with a single RST packet?

Thanks
Regards,
-- 
Steven Chamberlain
steven@pyro.eu.org



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?54180EBF.2050104>