Date: Thu, 13 Aug 1998 10:51:28 +1000 (EST) From: Nicholas Charles Brawn <ncb05@uow.edu.au> To: Brett Glass <brett@lariat.org> Cc: freebsd-security@FreeBSD.ORG Subject: Re: UDP port 31337 Message-ID: <Pine.SOL.4.02.9808131048280.17130-100000@banshee.cs.uow.edu.au> In-Reply-To: <199808121700.LAA00346@lariat.lariat.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 12 Aug 1998, Brett Glass wrote: > If someone's trying to BO you, they deserve worse. > > How about a daemon that sends fatal packets back TO the machine running BO? > I'm sure that these punks haven't protected their code adequately against > buffer overflows, etc. > > --Brett The company formerly known as SNI (now integrated into NAI) wrote a paper on Intrusion Detection Systems a while ago which discouraged this attitude. Their argument focused on the fact that what if someone *knows* that this is the response that will be sent if your daemon detects a connection attempt. Don't forget how easily udp packets can be forged... Nick -- Email: ncb05@uow.edu.au - http://rabble.uow.edu.au/~nick Key fingerprint = DE 30 33 D3 16 91 C8 8D A7 F8 70 03 B7 77 1A 2A "When in doubt, ask someone wiser than yourself..." -unknown To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.SOL.4.02.9808131048280.17130-100000>