From owner-freebsd-questions Fri Mar 13 19:11:43 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id TAA14760 for freebsd-questions-outgoing; Fri, 13 Mar 1998 19:11:43 -0800 (PST) (envelope-from owner-freebsd-questions@FreeBSD.ORG) Received: from gdi.uoregon.edu (gdi.uoregon.edu [128.223.170.30]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id TAA14688 for ; Fri, 13 Mar 1998 19:11:22 -0800 (PST) (envelope-from dwhite@gdi.uoregon.edu) Received: from localhost (dwhite@localhost) by gdi.uoregon.edu (8.8.7/8.8.8) with SMTP id TAA19468; Fri, 13 Mar 1998 19:11:16 -0800 (PST) (envelope-from dwhite@gdi.uoregon.edu) Date: Fri, 13 Mar 1998 19:11:16 -0800 (PST) From: Doug White Reply-To: Doug White To: Donald Burr cc: FreeBSD Questions Subject: Re: FreeBSD affected by "teardrop" attack? Where's the patch? In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG On Fri, 13 Mar 1998, Donald Burr wrote: > -----BEGIN PGP SIGNED MESSAGE----- > > A while back a kernel patch came out for Linux to counteract what is known > as the "teardrop" attack. (I am not sure of the exact details of this > attack (how it is done, etc.) > > It wasn't clear to me whether this affected just Linux systems or most > TCP/IP implementations in general. If this affects more than just Linux > systems, then does it affect FreeBSD too? If so, is there a patch > available? FreeBSD doesn't appear to be vulnerable. Doug White | University of Oregon Internet: dwhite@resnet.uoregon.edu | Residence Networking Assistant http://gladstone.uoregon.edu/~dwhite | Computer Science Major To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message