Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S264813AbUDWNzo (ORCPT ); Fri, 23 Apr 2004 09:55:44 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S264816AbUDWNzo (ORCPT ); Fri, 23 Apr 2004 09:55:44 -0400 Received: from mail.enyo.de ([212.9.189.167]:22543 "EHLO mail.enyo.de") by vger.kernel.org with ESMTP id S264813AbUDWNzn (ORCPT ); Fri, 23 Apr 2004 09:55:43 -0400 To: hadi@cyberus.ca Cc: Giuliano Pochini , "David S. Miller" , linux-kernel@vger.kernel.org, netdev@oss.sgi.com, cfriesen@nortelnetworks.com, =?iso-8859-1?q?J=F6rn_Engel?= Subject: Re: tcp vulnerability? haven't seen anything on it here... References: <1082640135.1059.93.camel@jzny.localdomain> From: Florian Weimer Date: Fri, 23 Apr 2004 15:55:33 +0200 In-Reply-To: <1082640135.1059.93.camel@jzny.localdomain> (hadi@cyberus.ca's message of "22 Apr 2004 09:22:16 -0400") Message-ID: <87u0zare7e.fsf@deneb.enyo.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 873 Lines: 22 jamal writes: > OTOH, long lived BGP sessions are affected assuming you are going across > hostile path to your peer. Jamal, please forget that "hostile path to your peer" part. It's just wrong. You are entitled to your opinion that this isssue is being overhyped (I tend to share it, at least until some evidence shows up that there's also a 4.4BSD-like RST bug), but please try to understand the issue before making any judgement. -- Current mail filters: many dial-up/DSL/cable modem hosts, and the following domains: atlas.cz, bigpond.com, postino.it, tiscali.co.uk, tiscali.cz, tiscali.it, voila.fr. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/