Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 2 Mar 2004 11:40:27 -0600 (CST)
From:      Mike Silbersack <silby@silby.com>
To:        Darren Reed <avalon@caligula.anu.edu.au>
Cc:        freebsd-security@freebsd.org
Subject:   Re: mbuf vulnerability
Message-ID:  <20040302113600.V12133@odysseus.silby.com>
In-Reply-To: <200403021730.i22HUN1J025897@caligula.anu.edu.au>
References:  <200403021730.i22HUN1J025897@caligula.anu.edu.au>

next in thread | previous in thread | raw e-mail | index | archive | help

On Wed, 3 Mar 2004, Darren Reed wrote:

> Uh, what did you test and what did you test with ?

FreeBSD 4.9 with ipf.

> "strict" requires that the sequence number in packet n should match
> what that sequence number of the last byte in packet n-1 - i.e. no
> out of order delivery is permitted.
>
> Darren

strict isn't in the ipf manpage, and ipf complains when I try using it.

I did some more google searching which implies that "strict" is available
in ipfilter 4.x, not the 3.x series that ships with FreeBSD.

Mike "Silby" Silbersack



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040302113600.V12133>