Date: Mon, 23 Jul 2001 05:30:51 +0900 (JST) From: Hajimu UMEMOTO <ume@mahoroba.org> To: brian@Awfulhak.org Cc: ras@e-gerbil.net, roam@orbitel.bg, freebsd-security@FreeBSD.org, freebsd-gnats-submit@FreeBSD.org Subject: Re: bin/22595: telnetd tricked into using arbitrary peer ip Message-ID: <20010723.053051.88524825.ume@mahoroba.org> In-Reply-To: <200107212234.f6LMYUg79964@hak.lan.Awfulhak.org> References: <ras@e-gerbil.net> <200107212234.f6LMYUg79964@hak.lan.Awfulhak.org>
next in thread | previous in thread | raw e-mail | index | archive | help
>>>>> On Sat, 21 Jul 2001 23:34:30 +0100 >>>>> Brian Somers <brian@Awfulhak.org> said: brian> Yes, there is a problem where we've basically trusted a DNS that we brian> don't own -- and that is a risk. But I can't see why 9.8.7.6 is brian> relevant, *except* that ``w -n'' may be mentioning it. brian> Am I misinterpreting things or is the real problem that a forward and brian> reverse DNS can both conspire against you ? Or is the real problem brian> just ``w''s -n flag ? It is problem of w(1). `w -n' does forward lookup for IPv4 only and IPv6 is not supported at all. When available, login(1) writes hostname into utmp instead of IP address. If hostname is saved, `w -n' queries A RR for the hostname. Real problem is that UT_HOSTSIZE is too short to hold IPv6 address. Is there any chance to expand UT_HOSTSIZE in time to 5.0-RELEASE. It apparently breaks binary compatibility. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan ume@mahoroba.org ume@bisd.hitachi.co.jp ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010723.053051.88524825.ume>