From owner-freebsd-hackers Sat Nov 29 08:52:47 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id IAA08441 for hackers-outgoing; Sat, 29 Nov 1997 08:52:47 -0800 (PST) (envelope-from owner-freebsd-hackers) Received: from zippy.dyn.ml.org (garbanzo@tokyo-35.ppp.hooked.net [206.169.229.35]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id IAA08436 for ; Sat, 29 Nov 1997 08:52:42 -0800 (PST) (envelope-from garbanzo@hooked.net) Received: from localhost (garbanzo@localhost) by zippy.dyn.ml.org (8.8.7/8.8.7) with SMTP id IAA00448; Sat, 29 Nov 1997 08:52:28 -0800 (PST) X-Authentication-Warning: zippy.dyn.ml.org: garbanzo owned process doing -bs Date: Sat, 29 Nov 1997 08:52:26 -0800 (PST) From: Alex X-Sender: garbanzo@zippy.dyn.ml.org To: "Daniel J. O'Connor" cc: Daniel Leeds , hackers@freebsd.org Subject: Re: land patch? In-Reply-To: <199711290847.TAA14519@holly.rd.net> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk On Sat, 29 Nov 1997, Daniel J. O'Connor wrote: > > > is there a patch for freebsd 2.2.5 to defeat the land attack? > > is it just one file in the kernel source tree that needs to be > > rebuilt with the newest code? > I tried this on my 2.2.2 machine, and it survived with no problems! :) > Ditto for teardrop. According to someone on BugTraq, a bug was "fixed" with the tcp-stack after 2.2.2, that makes 2.2.5 machines vunerable to these attacks. Patches should have already been checked into the source tree, and can be retreived via cvsup or ctm (see the handbook http://www.freebsd.org/handbook). - alex