From owner-freebsd-security Sat Jan 16 19:58:29 1999 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id TAA28233 for freebsd-security-outgoing; Sat, 16 Jan 1999 19:58:29 -0800 (PST) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from fulcrum (fulcrum.ie.cw.net [204.70.128.22]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id TAA28228 for ; Sat, 16 Jan 1999 19:58:27 -0800 (PST) (envelope-from yjj@cw.net) Received: from cletus.cw.net ([204.71.41.1]) by cw.net (PMDF V5.2-29 #34495) with SMTP id <0F5O0075LR11WQ@cw.net> for freebsd-security@FreeBSD.ORG; Sat, 16 Jan 1999 22:58:13 -0500 (EST) Received: by cletus.cw.net (SMI-8.6/SMI-SVR4) id WAA29400; Sat, 16 Jan 1999 22:58:13 -0500 Date: Sat, 16 Jan 1999 22:58:13 -0500 From: yjj@cw.net (Yuan John Jiang) Subject: How to do DOS checking without crashing the system? To: freebsd-security@FreeBSD.ORG Message-id: <199901170358.WAA29400@cletus.cw.net> Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org I'm think of using a vulnerability scanner, e.g. ISS, CyberCop, SATA or a homemade, to automate part of my security auditing of the boxes in service. However, how should I check for denial-of-service type of vulnerabilities, such as Land or Teardrop without crashing boxes and disrupting the service? I guess a simple thing to do is to check the OS version. However, I hope someone can suggest something more reliable. John To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message