From owner-freebsd-security Fri Jan 21 9:47:58 2000 Delivered-To: freebsd-security@freebsd.org Received: from lariat.lariat.org (lariat.lariat.org [206.100.185.2]) by hub.freebsd.org (Postfix) with ESMTP id 5ACC215503 for ; Fri, 21 Jan 2000 09:47:55 -0800 (PST) (envelope-from brett@lariat.org) Received: from workhorse (IDENT:ppp0.lariat.org@lariat.lariat.org [206.100.185.2]) by lariat.lariat.org (8.9.3/8.9.3) with ESMTP id KAA21163; Fri, 21 Jan 2000 10:47:42 -0700 (MST) Message-Id: <4.2.2.20000121104707.016b3f00@localhost> X-Sender: brett@localhost X-Mailer: QUALCOMM Windows Eudora Pro Version 4.2.2 Date: Fri, 21 Jan 2000 10:47:38 -0700 To: Intranova Networking Group From: Brett Glass Subject: Re: bugtraq posts: stream.c - new FreeBSD exploit? Cc: Fernando Schapachnik , Bob Madden , freebsd-security@FreeBSD.ORG In-Reply-To: References: <4.2.2.20000121095431.01a23a90@localhost> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Try tcp_restrict_rst in rc.conf. Not ideal but a good fast fix. --Brett At 05:24 AM 1/21/2000 , Intranova Networking Group wrote: >I think my machine was hit with it this morning. Rebooted at 8:20am and >the logs display nothing but ICMP bandwidth limiting messages, we have to >find some way to do this efficiently, in the mean time, can we violate the >protocol with somewhat of an 'emergency' patch before we get down to >business? > >Imachonu Ogali >Intranova Networking Group To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message