Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 21 Jan 2000 10:44:33 -0300 (GMT)
From:      Fernando Schapachnik <fpscha@ns1.via-net-works.net.ar>
To:        avalon@coombs.anu.edu.au (Darren Reed)
Cc:        freebsd-security@freebsd.org
Subject:   Re: bugtraq posts: stream.c - new FreeBSD exploit?
Message-ID:  <200001211344.KAA01087@ns1.via-net-works.net.ar>
In-Reply-To: <200001210421.PAA25285@cairo.anu.edu.au> from Darren Reed at "Jan 21, 0 03:21:35 pm"

next in thread | previous in thread | raw e-mail | index | archive | help
En un mensaje anterior, Darren Reed escribió:
> btw, I think the better way to write the 3 rules is:
> 
> block in quick proto tcp from any to any head 100
> pass in quick proto tcp from any to any flags S keep state group 100
> pass in all

I usually work with ipfw, so I'm a newbie with ipfilter.

I loaded a 3.3-R with an ipfilter enabled kernel.

Then ipf -l block -f /file_with_rules

Suprisingly:

ipmon

21/01/2000 10:34:29.091976 ed0 @0:1 b server,22 -> mi_ip,1015 PR tcp len 20 60 -AP
21/01/2000 10:34:29.092047 ed0 @0:1 b server,22 -> mi_ip,1015 PR tcp len 20 40 -A

This is from a established ssh session, of course. Every TCP conection 
to the machine renders impossible.

I'm I doing something wrong?


Fernando P. Schapachnik
Administración de la red
VIA NET.WORKS ARGENTINA S.A.
fernando@via-net-works.net.ar
(54-11) 4323-3333


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200001211344.KAA01087>