Re: remote DoS against inetd and ssh

1999-09-23 Thread Stas Kisel
Sorry for old news - but there is no still any patch against this DoS on an official ssh site. > From: Jose Nazario <[EMAIL PROTECTED]> > > yeah, i noted this to the ssh development team in march, 1999. this was > under version 1.2.26, and then 1.2.27 came out and there was no fix for > it. i did

Re: remote DoS against inetd and ssh

1999-09-10 Thread Derek Callaway
On Fri, 3 Sep 1999, Grzegorz Stelmaszek wrote: > Both DoS`s use something known as portfuck (e.g. `while true; do telnet > host port & done`). > 1. If you use it against any inetd service, inetd will shoutdown that > service for about 30 minutes (i did not checked, but it seems to be about > th

Re: remote DoS against inetd and ssh

1999-09-10 Thread Jose Nazario
hi, yeah, i noted this to the ssh development team in march, 1999. this was under version 1.2.26, and then 1.2.27 came out and there was no fix for it. i didn't BUGTRAQ it as i find such info without a real fix to be irresponsible. my coding sucks and i haven't been able to get my MaxClients para

Re: remote DoS against inetd and ssh

1999-09-10 Thread Jedi/Sector One
Grzegorz Stelmaszek wrote: > At the beginning i'd like to excuse all of you if it is commonly well > known (hmm, i guess it is, but noone patched it ;>. > > Both DoS`s use something known as portfuck (e.g. `while true; do telnet > host port & done`). > 1. If you use it against any inetd service, i

Re: remote DoS against inetd and ssh

1999-09-09 Thread Vincent Janelle
This works against a lot of other stuff too.. Thats the problem with inetd, unless you use xinetd. It doesn't really support the limiting of the number of processes that can be open. Its quite easy to fill the process table if you can make enough of the processes linger around. Why run ssh from

Re: remote DoS against inetd and ssh

1999-09-09 Thread Alexander Boutkhoudze
patching: in rc.conf above inetd_flags type -l -R 1024? :) >Hi, > >At the beginning i'd like to excuse all of you if it is commonly well >known (hmm, i guess it is, but noone patched it ;>. > >Both DoS`s use something known as portfuck (e.g. `while true; do telnet >host port & done`). >1. If yo

remote DoS against inetd and ssh

1999-09-07 Thread Grzegorz Stelmaszek
Hi, At the beginning i'd like to excuse all of you if it is commonly well known (hmm, i guess it is, but noone patched it ;>. Both DoS`s use something known as portfuck (e.g. `while true; do telnet host port & done`). 1. If you use it against any inetd service, inetd will shoutdown that service