Displaying 20 results from an estimated 10000 matches similar to: "[Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)"
2004 Apr 23
1
Proposed RST patch
Here's my proposed patch to change RST handling so that ESTABLISHED
connections are subject to strict RST checking, but connections in other
states are only subject to the "within the window" check. Part 2 of the
patch is simply a patch to netstat so that it displays the statistic.
As expected, it's very straightforward, the only real question is what to
call the statistic...
2004 Sep 18
2
Random source ports in FreeBSD?
Hello, all!
In the beginning I want to say, that this question seems to be a
security one, isn't it so?..
Recently I was googling for the subject and coulnd't find anything...
Even in the opennet.ru forum nobody answered me about this.
So, as far as I got to know, randomizing source ports in FreeBSD is
impossible now? (to be exact - is not implemented?)
It's very interesting to me
2004 Feb 29
5
mbuf vulnerability
In
http://docs.freebsd.org/cgi/mid.cgi?200402260743.IAA18903
it seems RELENG_4 is vulnerable. Is there any work around to a system that
has to have ports open ?
Version: 1 2/18/2004@03:47:29 GMT
>Initial report
>
<<https://ialert.idefense.com/KODetails.jhtml?irId=207650>https://ialert.idefense.com/KODetails.jhtml?irId=207650;
>ID#207650:
>FreeBSD Memory Buffer
2005 Apr 04
1
Strange messages in dmesg after DDoS-attack.
Dear list,
A few days ago one of my machines were attacked by a DDoS-attack using UDP
on random ports.. When I later on analyzed the logs, I found this in my
dmesg:
xl0: initialization of the rx ring failed (55)
xl0: initialization of the rx ring failed (55)
xl0: initialization of the rx ring failed (55)
I tried to find out on google what it ment, but without any luck. What
does that mean and
2003 Apr 08
3
fstack protector
hi is there any way to build 4.8 release with this fstack protection?
or atleast some ports is there any good info on this? the only page i found was that ibm page but it seemed outdated.
//martin
2003 Apr 14
2
(OT) rfc1948 question
Hi, folks @ freebsd-security.
First, I am not sure if this is apropriate topic for that list, so
sorry, if it is not.
Some time ago I have read rfc1948 (protection from blind TCP spoofing)
and became interested in the way how it is implemented in FreeBSD.
After some googling (BTW if you like Google you might be interested in
this: http://register.spectator.ru/img/bart.gif ), I found this:
2004 Aug 13
1
ICMP attacks against TCP
Has anyone seen the recently published IETF draft regarding ICMP attacks
against TCP?
[http://www.ietf.org/internet-drafts/draft-gont-tcpm-icmp-attacks-00.txt]
I'm interested in any comments as to the vulnerability of FreeBSD's TCP
to such attacks and the need for or usefulness of the various solutions
proposed in the paper.
Thanks, all
- Steve
--
Steve Zweep
Senior Software
2003 Sep 16
3
Release Engineering Status Report
Mike Silbersack wrote:
> On Tue, 16 Sep 2003, Scott Long wrote:
>
>
>>Patches have been floated on the mailing list that revert PAE in its
>>various stages. Maybe those need to be brought back up. Silby? Tor?
>>
>>Scott
>
>
> I believe that Tor's commit on August 30th resolved the PAE-related
> problems, so there is no need for a reversion.
2005 Jul 02
3
packets with syn/fin vs pf_norm.c
Hi,
First of all, I know that not dropping SYN/FIN isn't really a big deal, it
just makes no sense. But since it doesn't make any sense, I don't see
the reason why not to discard them.
I'm running pf on FreeBSD 5.4-RELEASE-p3 and I scrub any traffic. I've
read some other posts on google and as far as I can tell, clearly invalid
packets (like packets with SYN/RST set) is
2004 Apr 20
10
TCP RST attack
http://www.uniras.gov.uk/vuls/2004/236929/index.htm
----Quote----
"The impact of this vulnerability varies by vendor and application, but in
some deployment scenarios it is rated critical. Please see the vendor
section below for further information. Alternatively contact your vendor
for product specific information.
If exploited, the vulnerability could allow an attacker to create a
2007 Dec 25
3
ProPolice/SSP in 7.0
Hi there,
I'm still running 6.2 on various servers without any tweaks (GENERIC
kernel, binary updates via freebsd-update etc.) but lots of ports
(apache, postgresql, diablo-jdk etc.) and would like to use stack
smashing protection in order to harden my boxes and avoid many potential
exploits.
I've known about ProPolice/SSP for a while now (from the Gentoo world)
and am aware that
2016 Jun 30
3
[CENTOS ]IPTABLES - How Secure & Best Practice
Ned,
Thank you very much for the response.
Great example following through on the premise.
It sounds like I need to have a better understanding of the traffic
patterns on my network to know the optimal order for iptables
filtering rules.
My brief example -
Premise: I want to limit outsiders from interfering with LAN client machines.
So, I have the following rules regarding forwarding traffic:
2004 Feb 18
1
[Fwd: [gentoo-announce] [ GLSA 200402-07 ] Clamav 0.65 DoS vulnerability]
Attached is a security alert from Gentoo pertaining to clam antivirus.
It seems that as of this morning, FreeBSD's ports still contain the
affected version.
Thank in advance,
Tom Veldhouse
-------------- next part --------------
An embedded message was scrubbed...
From: Tim Yamin <plasmaroo@gentoo.org>
Subject: [gentoo-announce] [ GLSA 200402-07 ] Clamav 0.65 DoS vulnerability
Date:
2003 Nov 13
2
What could be on udp:48152
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi, I'm running stock FreeBSD with services running: samba (connections
allowed only from local network), lpd (same), bind (all interfaces), apache
(all), zope (local)
This machine is home gateway/http/printserver.
Recently some strange things happened as my printer all of sudden started to
print stuff when nobody prints... luckily (or
2016 Jun 30
2
[CENTOS ]IPTABLES - How Secure & Best Practice
On Wed, Jun 29, 2016 at 1:49 PM, Gordon Messmer
<gordon.messmer at gmail.com> wrote:
>
> By putting these rules first, before the "ESTABLISHED,RELATED" rule, you're
> applying additional processing (CPU time) to the vast majority of your
> packets for no reason. The "E,R" rule should be first. It won't match the
> invalid packets you're trying
2010 Jan 25
3
Issue using tapply
Hello all,
I am trying to use the tapply function to sum some values and change the
column names of the resulting vector.
I input
Emp Et
1 10565 ACC
2 7515 ADM
3 625 AGF
4 6243 CNS
5 12721 EDU
6 3924 FIN
7 18140 HLH
8 3686 INF
9 15841 MFG
10 243 MIN
11 1864 MNG
12 4664 OSV
13 5496 PRF
14 4988 PUB
15 2166 REC
16 2153 REL
17 16082 RTL
18 3582 TRN
19 757 UTL
20
2004 May 26
6
Newnotsyn Behavior
Hello,
I''ve been doing some tests on a firewall system running Shorewall 1.4, and
have been getting some unexpected behavior when enabling the "newnotsyn"
option.
In the test setup, I have:
----------------------------------------
/etc/shorewall/interfaces
net eth0 detect routefilter,tcpflags,blacklist
loc eth1 10.0.0.255 dhcp,tcpflags,newnotsyn
2003 Mar 31
5
rfc3514 - Security Flag in the IPv4 Header
Any chance of this being implemented in fbsd? Could be usefull ;-)
ftp://ftp.rfc-editor.org/in-notes/rfc3514.txt
--
:{ andyf@speednet.com.au
Andy Farkas
System Administrator
Speednet Communications
http://www.speednet.com.au/
2003 Aug 10
2
Heads up: New if_xl committed
As promised, the updated if_xl with full busdma support / other
improvements has been MFC'd to 4.8-stable. While I have put this driver
through extensive testing, it is possible that there may be bugs which are
either present in the -current version or that I added in the MFC process.
So, if you cvsup to -stable anytime in the future and notice problems with
if_xl, please tell me ASAP!
2003 Aug 30
4
Heads up: panics should be fixed!
As others have noted, Tor's patch appears to be a total solution to the
recent instability the PAE patch introduced. So, if you're experiencing
panics with a recent kernel, or are in a position to stress a machine,
please cvsup and give it a test!
Thanks,
Mike "Silby" Silbersack
---------- Forwarded message ----------
Date: Sat, 30 Aug 2003 08:39:08 -0700 (PDT)
From: Tor Egge