Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 22 Mar 1999 17:27:50 +0100
From:      Erwan Arzur <erwan@netvalue.fr>
To:        security@freebsd.org
Subject:   natd + nmap ?
Message-ID:  <36F66F86.88FA36E3@netvalue.fr>

next in thread | raw e-mail | index | archive | help
I just tried to scan a FreeBDS3.0 w/ natd, and it appears that using the
-sU flag with nmap seems to completely lock natd at 100% cpu. Thus,
there is no way to send any packet in or out of the gateway.

I am right assuming this is a kind of DOS attack ? Is there any way to
prevent this kind of thing to happen, like an option to natd to make it
drop incoming packets when reaching a given load ?






To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?36F66F86.88FA36E3>