Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 22 Jan 2000 02:38:04 -0800 (PST)
From:      "Dan Seafeldt, AZ.COM System Administrator" <yankee@az.com>
To:        Don Lewis <gdonl@tsc.tdk.com>, security@FreeBSD.ORG
Subject:   Re: attack arbitration server
Message-ID:  <Pine.BSF.3.91.1000122023458.13757A-100000@gate.az.com>
In-Reply-To: <Pine.BSF.3.91.1000122012833.7170G-100000@gate.az.com>

next in thread | previous in thread | raw e-mail | index | archive | help

Even if packets are spoofed, systems alerted to a particular could have a
raised sensitivity to detect excessive incoming TCP connections, etc. 
sooner based on source address or quality type of packet while leaving
outbound connections unaffected. 


> > are forged?  The attacker can easily insert the addresses of *.cdrom.com
> > and *.root-servers.net, which will cause you to automagically block access
> > to important servers in the Internet.  That's a pretty nifty DoS.
> > 


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.91.1000122023458.13757A-100000>