Skip to content

[TLDK-4] RST handling as per RFC 5961 #3

@vvalderrv

Description

@vvalderrv

Handling of RST as per RFC793 is not safe in terms of protection against "Blind Reset Attack". See the RFC 5961 (3.2) for details:

https://tools.ietf.org/html/rfc5961#section-3

In short, implementation should reset connection only if the SEQ of RST packet equals to RCV.NXT. For other in-window cases special challenge-ack procedure should be performed.

 

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions