Date: Wed, 27 May 1998 11:20:37 -0400 (EDT) From: Snob Art Genre <benedict@echonyc.com> To: "J.A. Terranson" <sysadmin@mfn.org> Cc: "'FreeBSD Security'" <freebsd-security@FreeBSD.ORG> Subject: Re: Possible DoS opportunity via ping implementation error? Message-ID: <Pine.GSO.3.96.980527111833.12774B-100000@echonyc.com> In-Reply-To: <01BD88F2.6DDD3A40@w3svcs.mfn.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 26 May 1998, J.A. Terranson wrote: > I had a very interesting day today! I found out that FBSD (2.2.5R) > machines will always respond to a broadcasted echo request. For > example: > > W2>ping 10.1.1.255 > PING 10.1.1.255 (10.1.1.255): 56 data bytes > 64 bytes from 10.1.1.20: icmp_seq=1 ttl=255 time=4.746 ms > 64 bytes from 10.1.1.23: icmp_seq=1 ttl=255 time=45.864 ms (DUP!) > lots of these dups... I've always found this useful, for when I want to build a complete ARP cache for the local network. I use it with NeXTStep all the time. Perhaps the behavior should be modified to respond to broadcast pings iff they're from a directly connected network, otherwise ignore? Ben "You have your mind on computers, it seems." To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.GSO.3.96.980527111833.12774B-100000>