From owner-freebsd-hackers Sat Oct 7 13:06:06 1995 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.6.12/8.6.6) id NAA18029 for hackers-outgoing; Sat, 7 Oct 1995 13:06:06 -0700 Received: from ref.tfs.com (ref.tfs.com [140.145.254.251]) by freefall.freebsd.org (8.6.12/8.6.6) with ESMTP id NAA18014 for ; Sat, 7 Oct 1995 13:06:03 -0700 Received: (from julian@localhost) by ref.tfs.com (8.6.11/8.6.9) id NAA11885 for hackers@freebsd.org; Sat, 7 Oct 1995 13:05:54 -0700 From: Julian Elischer Message-Id: <199510072005.NAA11885@ref.tfs.com> Subject: TCP/IP Spoofing etc. To: hackers@freebsd.org Date: Sat, 7 Oct 1995 13:05:54 -0700 (PDT) X-Mailer: ELM [version 2.4 PL24] Content-Type: text Content-Length: 730 Sender: owner-hackers@freebsd.org Precedence: bulk I have to explain to someone the possible problems that might be encountered by using old software on a machine in the internet. One thing that came to mind is that it's possible this role might include some 'firewall' type duties. can someone explain to me the problem that was hinted at recently, to do with malicious fragmentation of packets, so as to get them through a firewall, and have them re-assemle on the other side.. I seem to remember it had something to do with getting a session to open from the outside or something.. julian (p.s. I need this info pretty quickl (as per normal)) (I.P.Spoofing is another thing I'm sorta curious about.. I guess there may be CERT notes on these right?) (got a cert URL?) j