Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 21 Jan 2000 10:47:38 -0700
From:      Brett Glass <brett@lariat.org>
To:        Intranova Networking Group <oogali@intranova.net>
Cc:        Fernando Schapachnik <fpscha@via-net-works.net.ar>, Bob Madden <bobm@atgsystems.com>, freebsd-security@FreeBSD.ORG
Subject:   Re: bugtraq posts: stream.c - new FreeBSD exploit?
Message-ID:  <4.2.2.20000121104707.016b3f00@localhost>
In-Reply-To: <Pine.BSF.4.10.10001211222150.48361-100000@blacklisted.intr anova.net>
References:  <4.2.2.20000121095431.01a23a90@localhost>

next in thread | previous in thread | raw e-mail | index | archive | help
Try tcp_restrict_rst in rc.conf. Not ideal but a good fast fix.

--Brett

At 05:24 AM 1/21/2000 , Intranova Networking Group wrote:
   
>I think my machine was hit with it this morning. Rebooted at 8:20am and
>the logs display nothing but ICMP bandwidth limiting messages, we have to
>find some way to do this efficiently, in the mean time, can we violate the
>protocol with somewhat of an 'emergency' patch before we get down to
>business?
>
>Imachonu Ogali
>Intranova Networking Group



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.2.2.20000121104707.016b3f00>