aboutsummaryrefslogtreecommitdiff
path: root/share/examples/libifconfig/ifdestroy.c
diff options
context:
space:
mode:
authorMichael Tuexen <tuexen@FreeBSD.org>2025-08-09 12:17:38 +0000
committerMichael Tuexen <tuexen@FreeBSD.org>2025-08-09 12:17:38 +0000
commitf0f6e50388963cae44bb92bb69ed7a1135dd2eec (patch)
tree5048b8c364e5fb9bf53e428c424e46f2fd174f9a /share/examples/libifconfig/ifdestroy.c
parent2eb786d96e97a953d0256d1d622c4853964be2dc (diff)
tcp: mitigate a side channel for detection of TCP connectionsHEADmain
If a blind attacker wants to guess by sending ACK segments if there exists a TCP connection , this might trigger a challenge ACK on an existing TCP connection. To make this hit non-observable for the attacker, also increment the global counter, which would have been incremented if it would have been a non-hit. This issue was reported as issue number 11 in Keyu Man et al.: SCAD: Towards a Universal and Automated Network Side-Channel Vulnerability Detection Reviewed by: Nick Banks, Peter Lei MFC after: 1 week Sponsored by: Netflix, Inc. Differential Revision: https://reviews.freebsd.org/D51724
Diffstat (limited to 'share/examples/libifconfig/ifdestroy.c')
0 files changed, 0 insertions, 0 deletions