Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[TLDK-4] RST handling as per RFC 5961 #3

Open
vvalderrv opened this issue Jan 2, 2025 · 0 comments
Open

[TLDK-4] RST handling as per RFC 5961 #3

vvalderrv opened this issue Jan 2, 2025 · 0 comments

Comments

@vvalderrv
Copy link
Contributor

Handling of RST as per RFC793 is not safe in terms of protection against "Blind Reset Attack". See the RFC 5961 (3.2) for details:

https://tools.ietf.org/html/rfc5961#section-3

In short, implementation should reset connection only if the SEQ of RST packet equals to RCV.NXT. For other in-window cases special challenge-ack procedure should be performed.

 

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant