Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

1. Yes, you have to already be in position. That's limited to specific actors. Once that is achieved, you have to probe for specific IP addresses the victim might be connected to. IOW a list you are targetting. Then the port probing and seqno guessing.

These facts reduce the impact because it's not just "be a guy on the internet", eg like if there were an open database of PII sitting there for the taking, only needing discovery to find it. In no way am I claiming the attack isn't feasible. It's definitely a real risk, beyond the theoretical.

2. Thanks, got it. That makes more sense.

I think I actually like this vuln. It reinforces the need for defense in depth. It reduces a takeover to an annoyance (could be critical for some apps, yes) assuming you use TLS at the app layer.



> That's limited to specific actors.

1) Anyone who can compromise the residential gateway in your home

2) Anyone & anything connected to the same home network as you (incl. any IOT devices; and no, they don't need Internet access)

3) Anyone who can compromise the residential gateway in whatever coffee shop you happen to be in

4) Anyone & anything connected to the same coffee shop network as you

5) ...

... and, like I said, easily scriptable, with the tools already available to carry it out.

It's not a doomsday scenario, but it is pretty bad. The one saving grace is that most apps these days use some kind of application-level authentication and/or encryption, e.g. TLS.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: