From owner-freebsd-security Fri Jan 21 13:10:42 2000 Delivered-To: freebsd-security@freebsd.org Received: from lariat.lariat.org (lariat.lariat.org [206.100.185.2]) by hub.freebsd.org (Postfix) with ESMTP id DDFEB15503 for ; Fri, 21 Jan 2000 13:10:38 -0800 (PST) (envelope-from brett@lariat.org) Received: from workhorse (IDENT:ppp0.lariat.org@lariat.lariat.org [206.100.185.2]) by lariat.lariat.org (8.9.3/8.9.3) with ESMTP id OAA23728; Fri, 21 Jan 2000 14:10:24 -0700 (MST) Message-Id: <4.2.2.20000121140941.01a68b30@localhost> X-Sender: brett@localhost X-Mailer: QUALCOMM Windows Eudora Pro Version 4.2.2 Date: Fri, 21 Jan 2000 14:10:23 -0700 To: Wes Peters , TrouBle From: Brett Glass Subject: Re: stream.c worst-case kernel paths Cc: security@FreeBSD.ORG In-Reply-To: <3888C7D2.D82BE362@softweyr.com> References: <200001211415.BAA12772@cairo.anu.edu.au> <20000121.16082400@bastille.netquick.net> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org At 01:55 PM 1/21/2000 , Wes Peters wrote: >Be warned if you're using the exploit program: if you select random >addresses, it may (will) pick multicast IP addresses, which may have >unintended side affects on your network. Augh! Geeze. Is it even LEGAL to ACK multicast packets? --Brett To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message