diff options
author | Michael Tuexen <tuexen@FreeBSD.org> | 2025-08-09 12:17:38 +0000 |
---|---|---|
committer | Michael Tuexen <tuexen@FreeBSD.org> | 2025-08-09 12:17:38 +0000 |
commit | f0f6e50388963cae44bb92bb69ed7a1135dd2eec (patch) | |
tree | 5048b8c364e5fb9bf53e428c424e46f2fd174f9a /share/examples/libifconfig/ifdestroy.c | |
parent | 2eb786d96e97a953d0256d1d622c4853964be2dc (diff) |
If a blind attacker wants to guess by sending ACK segments if there
exists a TCP connection , this might trigger a challenge ACK on an
existing TCP connection. To make this hit non-observable for the
attacker, also increment the global counter, which would have been
incremented if it would have been a non-hit.
This issue was reported as issue number 11 in Keyu Man et al.:
SCAD: Towards a Universal and Automated Network Side-Channel
Vulnerability Detection
Reviewed by: Nick Banks, Peter Lei
MFC after: 1 week
Sponsored by: Netflix, Inc.
Differential Revision: https://reviews.freebsd.org/D51724
Diffstat (limited to 'share/examples/libifconfig/ifdestroy.c')
0 files changed, 0 insertions, 0 deletions