Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 20 Jan 2000 18:23:34 -0700 (MST)
From:      marcs@go2net.com
To:        Brett Glass <brett@lariat.org>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: bugtraq posts: stream.c - new FreeBSD exploit?
Message-ID:  <Pine.BSF.4.20.0001201820450.355-100000@alive.znep.com>
In-Reply-To: <4.2.2.20000120180821.0188d5c0@localhost>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 20 Jan 2000, Brett Glass wrote:

> My guess is that there's a long code path, or other inefficiency, 
> in the way the ACK is handled. Perhaps a linear search for the
> right socket instead of one that's more clevery implemented
> (e.g. search by port, then address, etc.).

How about you stop making random guess after random guess about what the
fixes are when you don't even know what the problem is, and leave it to
someone who knows the details of exactly what it does and what impact it
has?  Seems like every two minutes you send a new message to the list with
a new guess at what could fix it.

No useful purpose is served by flooding mailing lists with speculation
after speculation.



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.20.0001201820450.355-100000>