From owner-freebsd-security Tue Jan 18 9:56: 2 2000 Delivered-To: freebsd-security@freebsd.org Received: from intranova.net (blacklisted.intranova.net [209.3.31.70]) by hub.freebsd.org (Postfix) with SMTP id 554CE14A00 for ; Tue, 18 Jan 2000 09:55:58 -0800 (PST) (envelope-from oogali@intranova.net) Received: (qmail 60797 invoked from network); 18 Jan 2000 12:58:07 -0000 Received: from hydrant.intranova.net (user8715@209.201.95.10) by blacklisted.intranova.net with SMTP; 18 Jan 2000 12:58:07 -0000 Date: Tue, 18 Jan 2000 12:53:04 -0500 (EST) From: Omachonu Ogali To: Jonathan Fortin Cc: freebsd-security@freebsd.org Subject: Re: TCP/IP In-Reply-To: <002801bf61de$b2663560$0900000a@server> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org 3kb in length? The maximum MTU on most links I think is 1500 bytes, toss in the headers and you're looking at about 1400 bytes to play with... And also, what protocol are you referring to? Omachonu Ogali Intranova Networking Group On Tue, 18 Jan 2000, Jonathan Fortin wrote: > > I noticed that most of the firewalls out there don't cover protection e.g, on a denial of service attack, it should ignore the whole protocol > but only allow packets with 3k in lenght. etc. > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message