On Tue, 26 Dec 2000, Mark J. Roberts wrote:
> I've been annoyed by FProxy's promiscuous behavior for a while now, and
> nothing's been done about it, even though it's really easy to restrict the
> connection to localhost, and only a little harder to read a configuration
> file.
I'm no expert on TCP/IP connections and such, but even if FProxy rejects
all non-localhost connections, can the attacker still find out that
there's something running on port 8080, and then portscan for the node?
If so, we absolutely must randomize the fproxy listener port as well as
the node port. Right?
--
Mark Roberts
[EMAIL PROTECTED]
_______________________________________________
Freenet-dev mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/mailman/listinfo/freenet-dev