From owner-freebsd-security Fri Jan 21 5:45: 8 2000 Delivered-To: freebsd-security@freebsd.org Received: from ns1.via-net-works.net.ar (ns1.via-net-works.net.ar [200.10.100.10]) by hub.freebsd.org (Postfix) with ESMTP id 4E56C14E82 for ; Fri, 21 Jan 2000 05:45:03 -0800 (PST) (envelope-from fpscha@ns1.via-net-works.net.ar) Received: (from fpscha@localhost) by ns1.via-net-works.net.ar (8.9.3/8.9.3) id KAA01087; Fri, 21 Jan 2000 10:44:33 -0300 (GMT) From: Fernando Schapachnik Message-Id: <200001211344.KAA01087@ns1.via-net-works.net.ar> Subject: Re: bugtraq posts: stream.c - new FreeBSD exploit? In-Reply-To: <200001210421.PAA25285@cairo.anu.edu.au> from Darren Reed at "Jan 21, 0 03:21:35 pm" To: avalon@coombs.anu.edu.au (Darren Reed) Date: Fri, 21 Jan 2000 10:44:33 -0300 (GMT) Cc: freebsd-security@freebsd.org Reply-To: Fernando Schapachnik X-Mailer: ELM [version 2.4ME+ PL40 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 8bit Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org En un mensaje anterior, Darren Reed escribió: > btw, I think the better way to write the 3 rules is: > > block in quick proto tcp from any to any head 100 > pass in quick proto tcp from any to any flags S keep state group 100 > pass in all I usually work with ipfw, so I'm a newbie with ipfilter. I loaded a 3.3-R with an ipfilter enabled kernel. Then ipf -l block -f /file_with_rules Suprisingly: ipmon 21/01/2000 10:34:29.091976 ed0 @0:1 b server,22 -> mi_ip,1015 PR tcp len 20 60 -AP 21/01/2000 10:34:29.092047 ed0 @0:1 b server,22 -> mi_ip,1015 PR tcp len 20 40 -A This is from a established ssh session, of course. Every TCP conection to the machine renders impossible. I'm I doing something wrong? Fernando P. Schapachnik Administración de la red VIA NET.WORKS ARGENTINA S.A. fernando@via-net-works.net.ar (54-11) 4323-3333 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message