From owner-freebsd-security Sat Jan 22 2:38: 3 2000 Delivered-To: freebsd-security@freebsd.org Received: from gate.az.com (gate.az.com [216.145.8.252]) by hub.freebsd.org (Postfix) with ESMTP id CE76015741 for ; Sat, 22 Jan 2000 02:38:01 -0800 (PST) (envelope-from yankee@gate.az.com) Received: (from yankee@localhost) by gate.az.com (8.8.5/8.8.5) id CAA14032; Sat, 22 Jan 2000 02:38:04 -0800 (PST) Date: Sat, 22 Jan 2000 02:38:04 -0800 (PST) From: "Dan Seafeldt, AZ.COM System Administrator" To: Don Lewis , security@FreeBSD.ORG Subject: Re: attack arbitration server In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Even if packets are spoofed, systems alerted to a particular could have a raised sensitivity to detect excessive incoming TCP connections, etc. sooner based on source address or quality type of packet while leaving outbound connections unaffected. > > are forged? The attacker can easily insert the addresses of *.cdrom.com > > and *.root-servers.net, which will cause you to automagically block access > > to important servers in the Internet. That's a pretty nifty DoS. > > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message