Security Basics mailing list archives

RE: TCP vs UDP II


From: "Schouten, Diederik (Diederik)" <dschout () lucent com>
Date: Wed, 13 Nov 2002 21:18:57 +0100

Dear list:
It's possible that a intruder could take active part of a TCP 
connection after this was established?
In UPD I know this is true because is a connectionless 
protocol. But I have doubts about TCP.

Depending on the location of the attacker this would indeed be possible.

He/She's either needs to be able to trace the connection or be able to guess
values like port numbers, fragment ID's, timestamps etc.

But it is definitly possible.

Greetings,

        Diederik


Current thread: