Date: Fri, 11 Feb 2005 21:31:19 +0100 From: Andy Hilker <ah@crypta.net> To: "Li, Qing" <qing.li@bluecoat.com>, freebsd-current@freebsd.org Subject: Re: known TCP vulnerability ?? Message-ID: <20050211203119.GA76141@mail.crypta.net> In-Reply-To: <00CDF9AA240E204FA6E923BD35BC64360879060E@bcs-mail.internal.cacheflow.com> References: <00CDF9AA240E204FA6E923BD35BC64360879060E@bcs-mail.internal.cacheflow.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi, You (Li, Qing) wrote: > > http://www.kb.cert.org/vuls/id/464113 > > http://www.linuxsecurity.com/content/view/104980/98/ > > Ran the packet tests against FreeBSD 5.3 and 6-CURRENT and both > respond to the SYN+FIN packets with SYN+ACK. do you have "options TCP_DROP_SYNFIN" in your kernel config? bye, Andy
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050211203119.GA76141>