Date: Sat, 22 Jan 2000 02:38:04 -0800 (PST) From: "Dan Seafeldt, AZ.COM System Administrator" <yankee@az.com> To: Don Lewis <gdonl@tsc.tdk.com>, security@FreeBSD.ORG Subject: Re: attack arbitration server Message-ID: <Pine.BSF.3.91.1000122023458.13757A-100000@gate.az.com> In-Reply-To: <Pine.BSF.3.91.1000122012833.7170G-100000@gate.az.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Even if packets are spoofed, systems alerted to a particular could have a raised sensitivity to detect excessive incoming TCP connections, etc. sooner based on source address or quality type of packet while leaving outbound connections unaffected. > > are forged? The attacker can easily insert the addresses of *.cdrom.com > > and *.root-servers.net, which will cause you to automagically block access > > to important servers in the Internet. That's a pretty nifty DoS. > > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.91.1000122023458.13757A-100000>