On 12 Aug 2008, at 14:50, Dean Anderson wrote:

On Tue, 12 Aug 2008, Mark Andrews wrote:
TCP, port randomisation, 0x20, EDNS PING etc. all leave gapping holes
in the security model which are being exploited today.

I don't know of any TCP exploits today.

Imagine being able to intercept arbitrary flows of packets between targeted remote ASes in such a way that the remote ASes could not easily tell that anything was going on. Imagine that traceroutes from the perspective of the remote ASes continue to look normal, or at least similar to normal.

  http://eng.5ninesdata.com/~tkapela/iphd-2.ppt

How much protection does the use of TCP buy you in that scenario?


Joe

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to