Nonsense. Throw out a protocol that is more resistant to Man-In-The-Middle and DDoS attacks due to an implementation bug? This is a protocol that is built on lessons learned from TCP.
What should be done is more work improving the implementation and widening the usage and uptake of SCTP. On Thu, Jan 29, 2015 at 9:31 AM, Gary Palmer <gpal...@freebsd.org> wrote: > So even if you don't use SCTP, if someone got a shell on your box > they could potentially use SCTP to get root or modify kernel memory > to break out of a jail, etc. > > In other words, you don't necessarily need to use SCTP to be affected > by vulnerabilities in it. _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"