Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 17 Sep 1998 21:27:13 +1000 (EST)
From:      Darren Reed <avalon@coombs.anu.edu.au>
To:        phk@critter.freebsd.dk (Poul-Henning Kamp)
Cc:        jkb@best.com, john@unt.edu, freebsd-security@FreeBSD.ORG
Subject:   Re: Are we vulnerable to "stealth" port scans?
Message-ID:  <199809171134.EAA22203@hub.freebsd.org>
In-Reply-To: <8631.906017885@critter.freebsd.dk> from "Poul-Henning Kamp" at Sep 17, 98 09:38:05 am

next in thread | previous in thread | raw e-mail | index | archive | help
In some mail from Poul-Henning Kamp, sie said:
> 
> 
> patches ?

hmmm, see if you can track down the code which makes the replies
sent back different - i.e. all RST's go back with fields filled in
by what was received.  THe problem is leakage of internal information
DEPENDING (<- which is what makes it possible) on what state (if any)
the socket which matches the packet used to scan with.

darren

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199809171134.EAA22203>