Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 21 Jan 2000 13:55:46 -0700
From:      Wes Peters <wes@softweyr.com>
To:        TrouBle <trouble@netquick.net>
Cc:        security@freebsd.org
Subject:   Re: stream.c worst-case kernel paths
Message-ID:  <3888C7D2.D82BE362@softweyr.com>
References:  <200001211415.BAA12772@cairo.anu.edu.au> <20000121.16082400@bastille.netquick.net>

next in thread | previous in thread | raw e-mail | index | archive | help
TrouBle wrote:
> 
> So can i get a straight answer, is there yet a patch to fix this
> problem under current ?? does it affect current ???
> 
> and 3.3 and 3.4 ????? if so where can i get it cause i have 5 public
> boxes, and we gots enemies.... these boxes run 3.2, 3.3 3.4 and 4.0

My K6-2/333 is handling 100,000 packets/sec on a Fast Ethernet just fine.
(Well, as many as the PII/233 is capable of generating).

Be warned if you're using the exploit program: if you select random
addresses, it may (will) pick multicast IP addresses, which may have
unintended side affects on your network.  Augh!

-- 
            "Where am I, and what am I doing in this handbasket?"

Wes Peters                                                         Softweyr LLC
wes@softweyr.com                                           http://softweyr.com/


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3888C7D2.D82BE362>