Newsgroups: comp.security.unix,comp.protocols.tcp-ip Subject: netkill - generic remote DoS attack From: stanislav shalunov <[EMAIL PROTECTED]> Of possible interest for the gentle reader: I've posted a rather long message to BUGTRAQ mailing list that concerns a mechanism inherent to TCP that lets a remote user lock down tens of kilobytes of real RAM--non-pageable kernel memory--per second (with a demonstration script). Elias Levy has coined the term "FIN_WAIT flooding" to describe the attack. The original message can be found at: http://www.securityfocus.com/templates/archive.pike?list=1&[EMAIL PROTECTED] ------------------------------------------------------ Rohit Sharma [EMAIL PROTECTED] Public Relations Officer, IEEE K.J.Somaiya college of Engineering Student Branch. Ph: +91.022.5673390 Powered by FreeBSD, Attained Nirvana. To subscribe / unsubscribe goto the site www.ilug-bom.org ., click on the mailing list button and fill the appropriate information and submit. For any other queries contact the ML maintener
