Displaying 3 results from an estimated 3 matches for "th_seq".
Did you mean:
t1_seq
2005 May 20
1
Possible PAWS security vulnerability
...as a result of PAWS vulnerability
+ * documented in Cisco security notice cisco-sn-20050518-tcpts
+ * from OpenBSD patch for OpenBSD 3.6 015_tcp.patch
*/
if ((to.to_flags & TOF_TS) != 0 &&
SEQ_LEQ(th->th_seq, tp->last_ack_sent)) {
+ if (SEQ_LEQ(tp->last_ack_sent, th->th_seq + tlen
+
+ ((thflags & (TH_SYN|TH_FIN)) != 0)))
+ tp->ts_recent = to.to_tsval;
+ else
+...
2004 Apr 23
1
Proposed RST patch
...c/sys.old/netinet/tcp_input.c /usr/src/sys/netinet/tcp_input.c
--- /usr/src/sys.old/netinet/tcp_input.c Thu Apr 22 01:15:15 2004
+++ /usr/src/sys/netinet/tcp_input.c Fri Apr 23 22:13:18 2004
@@ -1570,6 +1570,10 @@
goto close;
case TCPS_ESTABLISHED:
+ if (tp->last_ack_sent != th->th_seq) {
+ tcpstat.tcps_badrst++;
+ goto drop;
+ }
case TCPS_FIN_WAIT_1:
case TCPS_FIN_WAIT_2:
case TCPS_CLOSE_WAIT:
diff -u -r /usr/src/sys.old/netinet/tcp_var.h /usr/src/sys/netinet/tcp_var.h
--- /usr/src/sys.old/netinet/tcp_var.h Thu Apr 22 01:15:16 2004
+++ /usr/src/sys/netinet...
2004 Apr 20
3
[Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
Forwarded message:
> From full-disclosure-admin@lists.netsys.com Wed Apr 21 11:49:12 2004
> To: full-disclosure@lists.netsys.com
> From: Darren Bounds <dbounds@intrusense.com>
> Subject: [Full-Disclosure] IETF Draft - Fix for TCP vulnerability
> Date: Tue, 20 Apr 2004 18:19:58 -0400
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
>