Date: Wed, 23 Aug 2000 00:39:52 -0600 (MDT) From: "David G. Andersen" <dga@pobox.com> To: cjclark@alum.mit.edu Cc: freebsd-security@FreeBSD.ORG Subject: Re: Blackhat Firewall-1 Codes Message-ID: <200008230639.AAA04483@faith.cs.utah.edu> In-Reply-To: <20000822233432.K28027@149.211.6.64.reflexcom.com> from "Crist J . Clark" at Aug 22, 2000 11:34:32 PM
next in thread | previous in thread | raw e-mail | index | archive | help
Without looking at all at the code, but speaking from having ported numerous of these things to FreeBSD, I'll hazard a few guesses: - differing levels of "rawness" between BSD and Linux; BSD raw sockets perform an htons() on the ip_len, ip_off, and ip_tos fields. - set sin_len in your struct sockaddr_in; not all systems have this field. - set IP_HDRINCLUDE and other friends when opening the raw socket, if they're not already. Happy porting. -Dave Lo and behold, Crist J . Clark once said: > > > I have been trying to get the 'fw1tun' codes to run under FreeBSD. I > have been getting, > > $ ./icmp [args] > sendto: Invalid argument > > Oh, just for the record, I am trying to see if some firewalls we have > (ones not on the Internet, so no games from any kids out there) can be > exploited. > -- > Crist J. Clark cjclark@alum.mit.com -- work: dga@lcs.mit.edu me: dga@pobox.com MIT Laboratory for Computer Science http://www.angio.net/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200008230639.AAA04483>