From owner-freebsd-questions Tue Dec 11 12:23:11 2001 Delivered-To: freebsd-questions@freebsd.org Received: from mail1.ruraltel.net (mail.ruraltel.net [24.225.0.34]) by hub.freebsd.org (Postfix) with ESMTP id E921D37B405 for ; Tue, 11 Dec 2001 12:23:07 -0800 (PST) Received: from darryl (p189n31.ruraltel.net [24.225.31.189]) by mail1.ruraltel.net (8.11.2/8.11.2) with SMTP id fBBKGOu02627 for ; Tue, 11 Dec 2001 14:16:24 -0600 Reply-To: From: "Darryl Hoar" To: Subject: Security problems Date: Tue, 11 Dec 2001 14:23:49 -0600 Message-ID: <001c01c18281$bf03bd90$0701a8c0@darryl> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook CWS, Build 9.0.2416 (9.0.2910.0) X-MimeOLE: Produced By Microsoft MimeOLE V5.00.3018.1300 Importance: Normal Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG Greeting, I had my ISP run a scan on my firewall/router. They used the Nessus software to test it. It found the following problems: . Warning found on port general/tcp The remote host uses non-random IP IDs, that is, it is possible to predict the next value of the ip_id field of the ip packets sent by this host. An attacker may use this feature to determine if the remote host sent a packet in reply to another request. This may be used for portscanning and other things. . Nmap found that this host is running Apple AirPort Wireless Hub Base Station v3.x . Vulnerability found on port general/udp : It was possible to crash the remote server using the linux 'zero fragment' bug. A cracker may use this flaw to prevent your network from working properly. Risk factor : High Do I have to worry about these? How do I fix them? Any help greatly appreciated. -Darryl To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message