Welcome! Log In Create A New Profile


Block TCP reset packets. All of them!

Posted by Anonymous User 
Anonymous User
Block TCP reset packets. All of them!
September 05, 2010 05:05PM
No need to get fancy, like detecting if they are forged or only when configured P2P apps are running.
I just want all of those reset packets to disappear before the stack sees them and closes the connection.
With that in place ISPs like Comcast will have to find other, less illegal ways to interfere with our internets.
Re: Block TCP reset packets. All of them!
October 06, 2010 12:57PM
Hmm, is malicious RST packet injection still a problem?  I thought Comcast stopped doing that a couple years ago... The issue is that TCP RST (Reset) packets do serve a legitimate purpose, and dropping 'em all wholesale could cause assorted network issues...

        ---  Mark  ---

Lead developer of PeerBlock
Anonymous User
October 07, 2010 11:19AM
The hardware they used to do that is still in production and that option could be used again.
I'm sure that somebody somewhere is using that tactic right now, if not to block P2P it could
be one of those national firewalls like China's or Iran's.

Allowing the resets on web browsing sessions while HTTP is allowed could be done if you like
but aside from browsing resets are pretty rare.

Just having that option on millions of computers could discourage malicious ISPs from doing it again.
Sorry, only registered users may post in this forum.

Click here to login