SHARE
SPREAD
HELP

The Tradition of Sharing

Help your friends and juniors by posting answers to the questions that you know. Also post questions that are not available.


To start with, Sr2Jr’s first step is to reduce the expenses related to education. To achieve this goal Sr2Jr organized the textbook’s question and answers. Sr2Jr is community based and need your support to fill the question and answers. The question and answers posted will be available free of cost to all.

 

#
Authors:
James F. Kurose, Keith W. Ross
Chapter:
Security In Computer Networks
Exercise:
Problems
Question:20 | ISBN:9780132856201 | Edition: 6

Question

In Section 8.6.1, it is shown that without sequence numbers, Trudy (a woman- in-the middle) can wreak havoc in an SSL session by interchanging TCPsegments. Can Trudy do something similar by deleting a TCP segment? What does she need to do to succeed at the deletion attack? What effect will it have?



TextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbook

Answer

Trudy is able to remove the data sent between Alice and Bob.

Reason is that  t is shown that without sequence numbers, Trudy (a woman- in-the middle) can wreak havoc in an SSL session by interchanging TCPsegments. In this case replace a dummy packet is repalced in the deleted packet and sent to some one.

0 0

Discussions

Post the discussion to improve the above solution.