Date: 30 May 2001 03:36:16 +0200 From: Dag-Erling Smorgrav <des@ofug.org> To: "Crist Clark" <crist.clark@globalstar.com> Cc: Liran Dahan <lirandb@netvision.net.il>, freebsd-security@FreeBSD.ORG Subject: Re: Syn+Fin (Setup) And TCP RST Message-ID: <xzpsnhnty7j.fsf@flood.ping.uio.no> In-Reply-To: <3B141E8A.5AC7E84E@globalstar.com> References: <010f01c0e888$5ab3c120$b88f39d5@a> <200105291052100670.246E525C@smtp> <012601c0e88c$3e6efb20$b88f39d5@a> <3B141E8A.5AC7E84E@globalstar.com>
next in thread | previous in thread | raw e-mail | index | archive | help
"Crist Clark" <crist.clark@globalstar.com> writes: > I would be surprised if TCP_RESTRICT_RST is interfering with this. IIRC, > the code for "spoofing" these RSTs in the firewall lives in other parts > of the kernel from that generating "real" RSTs (where TCP_RESTRICT_RST > would have its effects). I wrote the code, and I can guarantee you that TCP_RESTRICT_RST will not affect RSTs sent by the firewall. DES -- Dag-Erling Smorgrav - des@ofug.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?xzpsnhnty7j.fsf>