FINDING · DEFENSE

Different operating systems apply different precedence rules when TCP segments overlap—some implementations use 'first data wins,' others 'last data wins.' An IDS applying a single universal reassembly policy will systematically diverge from the actual target end-system whenever overlapping segments appear, creating a predictable and repeatable evasion surface that is an inherent consequence of policy misalignment rather than a configuration flaw.

From 1998-ptacek-insertionInsertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection · §4 · 1998

Implications

Tags

censors
generic
techniques
dpimiddlebox-interference
defenses
geneva

Extracted by claude-sonnet-4-6 — review before relying.