From owner-freebsd-questions Thu Nov 7 23:31:30 1996 Return-Path: owner-questions Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id XAA15045 for questions-outgoing; Thu, 7 Nov 1996 23:31:30 -0800 (PST) Received: from mystic.exile.net (root@mystic.exile.net [199.3.234.16]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id XAA15038 for ; Thu, 7 Nov 1996 23:31:27 -0800 (PST) Received: from mystic.exile.net (localhost [127.0.0.1]) by mystic.exile.net (8.7.6/8.7.3) with SMTP id AAA01696 for ; Fri, 8 Nov 1996 00:31:02 -0600 Message-ID: <3282D3A5.7ECC160D@exile.net> Date: Fri, 08 Nov 1996 00:31:01 -0600 From: "Ben L. Perkins" Organization: Exile Network Technologies X-Mailer: Mozilla 3.01Gold (X11; I; Linux 2.0.23 i586) MIME-Version: 1.0 To: questions@freebsd.org Subject: anti spoofing patches for freebsd Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: owner-questions@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Hello there. I did some searches through the mail archives and found quite a bit of conversation about the way spoofing attacks work and the weakness in the bsd kernel which makes them easy. Has anyone created a kernel patch to make this more difficult? If so, where might I find it? Thanks! Ben Perkins -- Ben L. Perkins /\ Houston, TX, USA blp@exile.net \/ http://www.io.com/~blp finger blp@io.com for PGP public key.