well,

The attacker has to:

1. sniff the connections and get one where he has the source port source
ip where of course this is the linux machine. This is trivial especially
if you connect to his machine.

2. He has to hijack the TCP session between the linux masquerade gateway
and the server. This is the non trivial part. He will need to guess the
tcp sequence numbers since such a hack can only work for TCP requests and
not UDP. A port scan therefore will not work since he ahs to connect to
that specific port on the masquerade gateway and the masquerade gateway
will keep track of the original source port on the requesting machine in
order to pass the reply back to the right application.

I am not a guru in this but that is my basic understanding of the
situation. I am yet to see a sucessful exploit of this.

Noah.

-
To unsubscribe from this list: send the line "unsubscribe linux-admin" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

_______________________________________________
Linux-users mailing list
Archives, Digests, etc at http://linux.nf/mailman/listinfo/linux-users

Reply via email to