From owner-freebsd-security Fri Oct 16 10:53:06 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id KAA02836 for freebsd-security-outgoing; Fri, 16 Oct 1998 10:53:06 -0700 (PDT) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from dt053nb4.san.rr.com (dt053nb4.san.rr.com [204.210.34.180]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id KAA02830 for ; Fri, 16 Oct 1998 10:53:03 -0700 (PDT) (envelope-from Studded@gorean.org) Received: from gorean.org (Studded@localhost [127.0.0.1]) by dt053nb4.san.rr.com (8.8.8/8.8.8) with ESMTP id KAA09450; Fri, 16 Oct 1998 10:52:36 -0700 (PDT) (envelope-from Studded@gorean.org) Message-ID: <362787E3.3884E136@gorean.org> Date: Fri, 16 Oct 1998 10:52:35 -0700 From: Studded Organization: Triborough Bridge & Tunnel Authority X-Mailer: Mozilla 4.5b2 [en] (X11; I; FreeBSD 2.2.7-STABLE-1015 i386) X-Accept-Language: en MIME-Version: 1.0 To: Khetan Gajjar CC: security@FreeBSD.ORG Subject: Re: Recent RST DoS References: Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Khetan Gajjar wrote: > > Hi. > > I just wanted to know if a gateway PC running ipfw would be > resistant against the RST attack that there was recently a advisory > for. The machine I'm dealing with is a vintage 2.2.6-RELEASE > box. It is vulnerable. You should upgrade to 2.2.7-Stable. Good luck, Doug -- *** Chief Operations Officer, DALnet IRC network *** Go PADRES! To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message