Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 9 Oct 2008 14:08:13 +0200
From:      "Lukasz Jaroszewski" <sigtrm@gmail.com>
To:        freebsd-hackers@freebsd.org
Subject:   Sockstress
Message-ID:  <aed2bfaf0810090508t390e345bp4dfd051376a89f9c@mail.gmail.com>

next in thread | raw e-mail | index | archive | help
Hi,
I am wondering about sockstres informations recently published. I cant
really figure what new they could found. Do we have anything to worry about?
;-)

http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1332898,00.html

``(...)Sockstress computes and stores so-called client-side SYN cookies and
enables Lee and Louis to specify a destination port and IP address. The
method allows them to complete the TCP handshake without having to store any
values, which takes time and resources. "We can then say that we want to
establish X number of TCP connections on that address and that we want to
use this attack type, and it does it," Lee said.(...)''

``(...)Lee said that when and _if_ specific vendors develop workarounds for
the issues, they will release details of those issues.(...)''

Was FreeBSD team contacted? ;)

-- 
Regards/Pozdrawiam
LVJ
--------------------------------------------------------------------------------------------------
They must find it difficult, those that take authority as truth, instead of
truth as the authority



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?aed2bfaf0810090508t390e345bp4dfd051376a89f9c>