[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Off-Path TCP Exploits: Global Rate Limit Considered Dangerous,



2016-08-10 14:20 GMT+02:00 fatal <fatal@xxxxxxxxxxx>:
> "[...] Such a weakness could be used to launch targeted attacks that
> track users’ online activity, forcibly terminate a communication, hijack
> a conversation between hosts or degrade the privacy guarantee by
> anonymity networks such as Tor.[...]"

Temporary workaround (source: https://ucrtoday.ucr.edu/39030):
1. Open /etc/sysctl.conf, append a command
“net.ipv4.tcp_challenge_ack_limit = 999999999”.
2. Use “sysctl -p” to update the configuration.

C
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk