Hi,
I have been playing around with kernel 2.4.2 lately, and suddenly my TCP
packets get rejected by some firewalls with the error:
TCP packet dropped (195.249.21.201-firewall.ao-vvs.dk[129.142.86.2]:
Protocol=TCP[SYN 0xc0] Port 58355-25): Bad TCP flags combination (received
on interface
Kozman,
SAFT is a nifty little protocol that lets you send a file to some other
user on the internet without them having to explicitly accept it. Instead,
the SAFT server will receive the file and place it in a queue for access
later on. The protocol itself is quite new; an implementation is in
There is some discussion about possible /usr/bin/Mail buffer overflow.
The link is from http://lwn.net/2001/0308/security.php3
http://securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D82%26threads%3D1%26end%3D2001-03-03%26tid%3D166333%26fromthread%3D0%26start%3D2001-02-25%26
Hi there,
what is the funny saft (487 - udp/tcp) port? Is that a possible security
hole?
Reagrds,
Balint
On Thu, Mar 08, 2001 at 02:32:12PM +, Kozman Balint wrote:
Hi there,
what is the funny saft (487 - udp/tcp) port? Is that a possible security
hole?
its from sendfile, read the output of apt-cache show sendfile for some
info on it. if you don't want/need it apt-get --purge remove
Hi,
I have been playing around with kernel 2.4.2 lately, and suddenly my TCP
packets get rejected by some firewalls with the error:
TCP packet dropped (195.249.21.201-firewall.ao-vvs.dk[129.142.86.2]:
Protocol=TCP[SYN 0xc0] Port 58355-25): Bad TCP flags combination (received
on interface
*
| This error is taken from a firewall branded Raptor or something.
| Is the 2.4.2 kernel's TCP/IP stack non-standard, the firewall just plain
| stupid, or is there a security problem somewhere??
Have you chosen to use 'Explicit Congestion Notification' when you
compiled the kernel? If so,
On Thu, Mar 08, 2001 at 04:13:15PM +0100, Tollef Fog Heen wrote:
Have you chosen to use 'Explicit Congestion Notification' when you
compiled the kernel? If so, many firewalls and routers drop packages
with this set. It bit me, and I couldn't find out what it was - look
at whether
*
| But a good one, it works!!
| Thanks!!
Nice to hear. :)
| Now, I wonder why this problem occours. I'll have to take a look at some RFC
| to figure out.. anyone who can point me in the right direction??
RFC 2481, iirc.
--
Tollef Fog Heen
Unix _IS_ user friendly... It's just selective
On Thu, Mar 08, 2001 at 04:43:14PM +0100, [EMAIL PROTECTED] wrote:
Now, I wonder why this problem occours. I'll have to take a look at some RFC
to figure out.. anyone who can point me in the right direction??
Best would be to take a look at linux-net mailinglist archives or
netfilter, the issue
Daniel,
Wouldn't surprise me. Often these kinds of things are done from
compromised hosts, so that they don't reveal the true identity of the
attacker (who, obviously, doesn't want to go to jail ;).
Regards,
Alex.
On Mon, 5 Mar 2001, [iso-8859-2] Szabó Dániel wrote:
Hello.
My packet filter
Kozman,
SAFT is a nifty little protocol that lets you send a file to some other
user on the internet without them having to explicitly accept it. Instead,
the SAFT server will receive the file and place it in a queue for access
later on. The protocol itself is quite new; an implementation is in
12 matches
Mail list logo