well,
The attacker has to: 1. sniff the connections and get one where he has the source port source ip where of course this is the linux machine. This is trivial especially if you connect to his machine. 2. He has to hijack the TCP session between the linux masquerade gateway and the server. This is the non trivial part. He will need to guess the tcp sequence numbers since such a hack can only work for TCP requests and not UDP. A port scan therefore will not work since he ahs to connect to that specific port on the masquerade gateway and the masquerade gateway will keep track of the original source port on the requesting machine in order to pass the reply back to the right application. I am not a guru in this but that is my basic understanding of the situation. I am yet to see a sucessful exploit of this. Noah. - To unsubscribe from this list: send the line "unsubscribe linux-admin" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html _______________________________________________ Linux-users mailing list Archives, Digests, etc at http://linux.nf/mailman/listinfo/linux-users