From owner-freebsd-security Mon Aug 17 02:52:53 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id CAA14947 for freebsd-security-outgoing; Mon, 17 Aug 1998 02:52:53 -0700 (PDT) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from ns0.fast.net.uk (ns0.fast.net.uk [194.207.104.1]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id CAA14939 for ; Mon, 17 Aug 1998 02:52:50 -0700 (PDT) (envelope-from netadmin@fastnet.co.uk) Received: from bofh.fast.net.uk (bofh.fast.net.uk [194.207.104.22]) by ns0.fast.net.uk (8.9.0/8.8.7) with ESMTP id KAA29332; Mon, 17 Aug 1998 10:52:14 +0100 (BST) Received: from bofh.fast.net.uk (bofh.fast.net.uk [194.207.104.22]) by bofh.fast.net.uk (8.8.8/8.8.8) with SMTP id KAA09107; Mon, 17 Aug 1998 10:52:18 +0100 (BST) (envelope-from netadmin@fastnet.co.uk) Date: Mon, 17 Aug 1998 10:52:18 +0100 (BST) From: Jay Tribick X-Sender: netadmin@bofh.fast.net.uk To: "Jasper O'Malley" cc: Joao Paulo Campello , security@FreeBSD.ORG Subject: Re: hosts.deny/allow & ICMP Attacks In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org | > #1 | > | > Does anybody here know if there's any way to break hosts.deny/allow | > protection in BSD or even Linux Systems? | | Find an exploit in tcpd or otherwise gain root on the system in question. There's always IP spoofing (although you'd have to do it blind as the packets wouldn't be able to get back to you) - plus, it's hard to implement. Regards, Jay Tribick -- [| Network Administrator | FastNet International | http://fast.net.uk/ |] [| Finger netadmin@fastnet.co.uk for contact information |] [| T: +44 (0)1273 677633 F: +44 (0)1273 621631 e: netadmin@fast.net.uk |] To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message