Date: Thu, 17 Sep 1998 21:27:13 +1000 (EST) From: Darren Reed <avalon@coombs.anu.edu.au> To: phk@critter.freebsd.dk (Poul-Henning Kamp) Cc: jkb@best.com, john@unt.edu, freebsd-security@FreeBSD.ORG Subject: Re: Are we vulnerable to "stealth" port scans? Message-ID: <199809171134.EAA22203@hub.freebsd.org> In-Reply-To: <8631.906017885@critter.freebsd.dk> from "Poul-Henning Kamp" at Sep 17, 98 09:38:05 am
next in thread | previous in thread | raw e-mail | index | archive | help
In some mail from Poul-Henning Kamp, sie said: > > > patches ? hmmm, see if you can track down the code which makes the replies sent back different - i.e. all RST's go back with fields filled in by what was received. THe problem is leakage of internal information DEPENDING (<- which is what makes it possible) on what state (if any) the socket which matches the packet used to scan with. darren To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199809171134.EAA22203>