Date: Thu, 20 Jan 2000 18:23:34 -0700 (MST) From: marcs@go2net.com To: Brett Glass <brett@lariat.org> Cc: freebsd-security@FreeBSD.ORG Subject: Re: bugtraq posts: stream.c - new FreeBSD exploit? Message-ID: <Pine.BSF.4.20.0001201820450.355-100000@alive.znep.com> In-Reply-To: <4.2.2.20000120180821.0188d5c0@localhost>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 20 Jan 2000, Brett Glass wrote: > My guess is that there's a long code path, or other inefficiency, > in the way the ACK is handled. Perhaps a linear search for the > right socket instead of one that's more clevery implemented > (e.g. search by port, then address, etc.). How about you stop making random guess after random guess about what the fixes are when you don't even know what the problem is, and leave it to someone who knows the details of exactly what it does and what impact it has? Seems like every two minutes you send a new message to the list with a new guess at what could fix it. No useful purpose is served by flooding mailing lists with speculation after speculation. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.20.0001201820450.355-100000>