Nonsense. Throw out a protocol that is more resistant to
Man-In-The-Middle and DDoS attacks due to an implementation bug? This
is a protocol that is built on lessons learned from TCP.

What should be done is more work improving the implementation and
widening the usage and uptake of SCTP.

On Thu, Jan 29, 2015 at 9:31 AM, Gary Palmer <gpal...@freebsd.org> wrote:
> So even if you don't use SCTP, if someone got a shell on your box
> they could potentially use SCTP to get root or modify kernel memory
> to break out of a jail, etc.
>
> In other words, you don't necessarily need to use SCTP to be affected
> by vulnerabilities in it.
_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to