On 12 Aug 2008, at 14:50, Dean Anderson wrote:
On Tue, 12 Aug 2008, Mark Andrews wrote:
TCP, port randomisation, 0x20, EDNS PING etc. all leave gapping holes
in the security model which are being exploited today.
I don't know of any TCP exploits today.
Imagine being able to intercept arbitrary flows of packets between
targeted remote ASes in such a way that the remote ASes could not
easily tell that anything was going on. Imagine that traceroutes from
the perspective of the remote ASes continue to look normal, or at
least similar to normal.
http://eng.5ninesdata.com/~tkapela/iphd-2.ppt
How much protection does the use of TCP buy you in that scenario?
Joe
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop