From owner-freebsd-bugs Wed Oct 1 18:16:39 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id SAA21182 for bugs-outgoing; Wed, 1 Oct 1997 18:16:39 -0700 (PDT) Received: from usr04.primenet.com (tlambert@usr04.primenet.com [206.165.6.204]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id SAA21177; Wed, 1 Oct 1997 18:16:26 -0700 (PDT) Received: (from tlambert@localhost) by usr04.primenet.com (8.8.5/8.8.5) id SAA01906; Wed, 1 Oct 1997 18:15:57 -0700 (MST) From: Terry Lambert Message-Id: <199710020115.SAA01906@usr04.primenet.com> Subject: Re: FreeBSD TCP stack and RST processing [subj changed] To: dg@root.com Date: Thu, 2 Oct 1997 01:15:57 +0000 (GMT) Cc: Don.Lewis@tsc.tdk.com, richard@a42.deep-thought.org, pst@FreeBSD.ORG, hackers@FreeBSD.ORG, bugs@FreeBSD.ORG In-Reply-To: <199710011151.EAA08698@implode.root.com> from "David Greenman" at Oct 1, 97 04:51:35 am X-Mailer: ELM [version 2.4 PL23] Content-Type: text Sender: owner-freebsd-bugs@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk > This appears to have been broken in rev 1.52: [ ... diff ... ] Forget my other posting -- I see the problem now. I still think it requires a trojan connect to trigger it: the attacking system has to get you to connect to it. For normal traffic, sendmail is the only push-model interface, where the sever connects, I think. Terry Lambert terry@lambert.org --- Any opinions in this posting are my own and not those of my present or previous employers.