search for: th_seq

Displaying 3 results from an estimated 3 matches for "th_seq".

Did you mean: t1_seq
2005 May 20
1
Possible PAWS security vulnerability
...as a result of PAWS vulnerability + * documented in Cisco security notice cisco-sn-20050518-tcpts + * from OpenBSD patch for OpenBSD 3.6 015_tcp.patch */ if ((to.to_flags & TOF_TS) != 0 && SEQ_LEQ(th->th_seq, tp->last_ack_sent)) { + if (SEQ_LEQ(tp->last_ack_sent, th->th_seq + tlen + + ((thflags & (TH_SYN|TH_FIN)) != 0))) + tp->ts_recent = to.to_tsval; + else +...
2004 Apr 23
1
Proposed RST patch
...c/sys.old/netinet/tcp_input.c /usr/src/sys/netinet/tcp_input.c --- /usr/src/sys.old/netinet/tcp_input.c Thu Apr 22 01:15:15 2004 +++ /usr/src/sys/netinet/tcp_input.c Fri Apr 23 22:13:18 2004 @@ -1570,6 +1570,10 @@ goto close; case TCPS_ESTABLISHED: + if (tp->last_ack_sent != th->th_seq) { + tcpstat.tcps_badrst++; + goto drop; + } case TCPS_FIN_WAIT_1: case TCPS_FIN_WAIT_2: case TCPS_CLOSE_WAIT: diff -u -r /usr/src/sys.old/netinet/tcp_var.h /usr/src/sys/netinet/tcp_var.h --- /usr/src/sys.old/netinet/tcp_var.h Thu Apr 22 01:15:16 2004 +++ /usr/src/sys/netinet...
2004 Apr 20
3
[Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
Forwarded message: > From full-disclosure-admin@lists.netsys.com Wed Apr 21 11:49:12 2004 > To: full-disclosure@lists.netsys.com > From: Darren Bounds <dbounds@intrusense.com> > Subject: [Full-Disclosure] IETF Draft - Fix for TCP vulnerability > Date: Tue, 20 Apr 2004 18:19:58 -0400 > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > >