Skip site navigation (1)Skip section navigation (2)
Date:      30 May 2001 03:36:16 +0200
From:      Dag-Erling Smorgrav <des@ofug.org>
To:        "Crist Clark" <crist.clark@globalstar.com>
Cc:        Liran Dahan <lirandb@netvision.net.il>, freebsd-security@FreeBSD.ORG
Subject:   Re: Syn+Fin (Setup) And TCP RST
Message-ID:  <xzpsnhnty7j.fsf@flood.ping.uio.no>
In-Reply-To: <3B141E8A.5AC7E84E@globalstar.com>
References:  <010f01c0e888$5ab3c120$b88f39d5@a> <200105291052100670.246E525C@smtp> <012601c0e88c$3e6efb20$b88f39d5@a> <3B141E8A.5AC7E84E@globalstar.com>

next in thread | previous in thread | raw e-mail | index | archive | help
"Crist Clark" <crist.clark@globalstar.com> writes:
> I would be surprised if TCP_RESTRICT_RST is interfering with this. IIRC,
> the code for "spoofing" these RSTs in the firewall lives in other parts 
> of the kernel from that generating "real" RSTs (where TCP_RESTRICT_RST 
> would have its effects).

I wrote the code, and I can guarantee you that TCP_RESTRICT_RST will
not affect RSTs sent by the firewall.

DES
-- 
Dag-Erling Smorgrav - des@ofug.org

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?xzpsnhnty7j.fsf>