|
Posted by The Natural Philosopher on 01/23/08 10:11
Baho Utot wrote:
> Willem Bogaerts wrote:
>
> [putolin]
>
>> What I mean is, could you send a stream of packages (even if a lot of
>> them are junked), such that some of them will always respond to the
>> server? I don't know how many possibilities or how much time this would
>> take, but I am just trying to see if the anonymous injection attack
>> mentioned earlier could work.
>>
>> Instead of:
>>> Client --- Host
>>> SYN -->
>>> <-- SYN+ACK
>>> ACK -->
>> Would it be possible to do:
>> Client --- Host
>> SYN -->
>> (pause)
>> ACK -->
>> Inother words, a "brute force ACKing"?
>>
>> Just curious,
>
> There is a "state machine" for every connection.
> For a detailed description on the state machine refer to RFC 793.
> TCP connections are in the CLOSED state (the default).
> TCP connections require the SYN+ACK from the "other end".
> You have 75 seconds to complete the TCP handshake , otherwise the "opening
> connection" is tossed.
>
> Your ACK would simply be tossed on the receiving side.
>
> If you send a batch of SYN packets in less than 75 seconds the "TCP state
> machine" for the host may become "full" and it will ignore any more SYN
> attempts. Your classic denial-of-service attack.
>
Its no use quonting facts at Jerry.
Like god, he is right, by *definition*. ;-)
[Back to original message]
|