From: “Perry E. Metzger” <perry@piermont.com>
To: Simon Spero <ses@tipper.oit.unc.edu>
Message Hash: fba98deab9cc83a4fc5bfeda80dea0a2cc7951c4c0cf40b721e441192532992d
Message ID: <199609122021.QAA07296@jekyll.piermont.com>
Reply To: <Pine.SUN.3.91.960912152105.966A-100000@tipper.oit.unc.edu>
UTC Datetime: 1996-09-12 23:12:29 UTC
Raw Date: Fri, 13 Sep 1996 07:12:29 +0800
From: "Perry E. Metzger" <perry@piermont.com>
Date: Fri, 13 Sep 1996 07:12:29 +0800
To: Simon Spero <ses@tipper.oit.unc.edu>
Subject: Re: Panix attack
In-Reply-To: <Pine.SUN.3.91.960912152105.966A-100000@tipper.oit.unc.edu>
Message-ID: <199609122021.QAA07296@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain
Simon Spero writes:
> This ensures that there's at least a traceable return address for the
> connection. Sort of like photuris cookies but without the forced RTT delay
Not really. The genius of the Photuris cookie is that it induces no
state at all in the responder, thanks to crypto tricks.
I agree, though, that you can harden hosts against TCP floods.
Perry
Return to September 1996
Return to “Simon Spero <ses@tipper.oit.unc.edu>”