From owner-freebsd-current Sat Oct 24 00:16:05 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id AAA22293 for freebsd-current-outgoing; Sat, 24 Oct 1998 00:16:05 -0700 (PDT) (envelope-from owner-freebsd-current@FreeBSD.ORG) Received: from gatekeeper.tsc.tdk.com (gatekeeper.tsc.tdk.com [207.113.159.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id AAA22288 for ; Sat, 24 Oct 1998 00:16:04 -0700 (PDT) (envelope-from gdonl@tsc.tdk.com) Received: from sunrise.gv.tsc.tdk.com (root@sunrise.gv.tsc.tdk.com [192.168.241.191]) by gatekeeper.tsc.tdk.com (8.8.8/8.8.8) with ESMTP id AAA23552; Sat, 24 Oct 1998 00:15:27 -0700 (PDT) (envelope-from gdonl@tsc.tdk.com) Received: from salsa.gv.tsc.tdk.com (salsa.gv.tsc.tdk.com [192.168.241.194]) by sunrise.gv.tsc.tdk.com (8.8.5/8.8.5) with ESMTP id AAA12970; Sat, 24 Oct 1998 00:15:25 -0700 (PDT) Received: (from gdonl@localhost) by salsa.gv.tsc.tdk.com (8.8.5/8.8.5) id AAA23010; Sat, 24 Oct 1998 00:15:24 -0700 (PDT) From: Don Lewis Message-Id: <199810240715.AAA23010@salsa.gv.tsc.tdk.com> Date: Sat, 24 Oct 1998 00:15:22 -0700 In-Reply-To: Kris Kennaway "nestea v2 against freebsd 3.0-Release (fwd)" (Oct 24, 12:07pm) X-Mailer: Mail User's Shell (7.2.6 alpha(3) 7/19/95) To: Kris Kennaway , current@FreeBSD.ORG Subject: Re: nestea v2 against freebsd 3.0-Release (fwd) Sender: owner-freebsd-current@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG On Oct 24, 12:07pm, Kris Kennaway wrote: } Subject: nestea v2 against freebsd 3.0-Release (fwd) } I tested this against myself this morning and it panicked the machine - I had } to run as root to hit the 127.0.0.1 target, but perhaps someone could confirm } whether it works against remote machines? Huh? The copy of nestea2 that I've got (from a bugtraq message) won't even run under 3.0. The last sendto() fails with errno == EINVAL. If I bypass the sanity check in rip_output() that looks for the bogus length in the IP header, then the program runs but I don't see any crashes. All that happens is that the equivalent sanity check in ip_input() detects the problem and increments ipstat.ips_tooshort. I can see this in netstat -s ip: 6814 total packets received 0 bad header checksums ---> 2000 with size smaller than minimum ---> 2000 with data size < data length To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message