Actions
Bug #3844
closed
VJ
VJ
tcp: possible bypass with TCP ssn reuse
Bug #3844:
tcp: possible bypass with TCP ssn reuse
Affected Versions:
Effort:
Difficulty:
Label:
Description
Scenario:
client: TCP SYN packet 1
server: RST with 'broken ACK' (so ACK field non-zero while ACK flag not set)
client: TCP SYN packet 2
...
The 2nd SYN packet is not considered for TCP ssn reuse as the "state" of the session is not progressed enough.
So the SYNs with their odd RSTs seem to trigger a condition where the apparently valid session following it is not picked up.
PA Updated by Philippe Antoine almost 3 years ago
- Target version set to 8.0.0-beta1
VJ Updated by Victor Julien about 1 year ago
- Target version changed from 8.0.0-beta1 to 8.0.0-rc1
VJ Updated by Victor Julien 10 months ago
- Target version changed from 8.0.0-rc1 to 9.0.0-beta1
PA Updated by Philippe Antoine 9 months ago
- Affected Versions 8.0.0 added
VJ Updated by Victor Julien 7 months ago
- Status changed from Assigned to In Progress
- Target version changed from 9.0.0-beta1 to 8.0.1
- Label Needs backport to 7.0 added
OT Updated by OISF Ticketbot 7 months ago
- Subtask #7876 added
OT Updated by OISF Ticketbot 7 months ago
- Label deleted (
Needs backport to 7.0)
VJ Updated by Victor Julien 7 months ago
- Status changed from In Progress to In Review
VJ Updated by Victor Julien 7 months ago
- Status changed from In Review to Resolved
VJ Updated by Victor Julien 7 months ago
- Status changed from Resolved to Closed
VJ Updated by Victor Julien 6 months ago
- Private changed from Yes to No
Actions