2008/9/30 Oliver Fromme <[EMAIL PROTECTED]>:
>
> Bill Moran wrote:
>  > In response to Oliver Fromme <[EMAIL PROTECTED]>:
>  > > Pierre Riteau wrote:
>  > >
>  > > >      Because the 3-way handshake ensures that the source address is 
> not being
>  > > >      spoofed, more aggressive action can be taken based on these 
> limits.
>  > >
>  > > s/not being spoofed/more difficult to spoofe/  ;-)
>  >
>  > On a modern OS (like FreeBSD) where ISNs are random, the possibility of
>  > blindly spoofing an IP during a 3-way handshake is so low as to be
>  > effectively impossible.
>
> It depends a lot on the environment, for example whether
> the attacker has access (or can somehow get access) to
> the server's uplink and trace packets.  This can happen
> if the server is located with many other servers on the
> same network, which is often the case for co-location
> or so-called root servers.

Yes, but in that situation you probably have the capacity to inject
enough traffic into the pipe to cause a total blackout...

> Of course, if the network is regarded "secure", then
> you are right.  Spoofing a TCP handshake would be very
> difficult in that case.  (I try to avoid the word
> "impossible".  Nothing is impossible, especially in
> the security business.)

Security is always about the balance between the effort+risk to you vs
the effort+benefit to the attacker...


--
Igor
_______________________________________________
freebsd-hackers@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to