patch applied, thanks!
Stipe
[EMAIL PROTECTED]
---
Wapme Systems AG
Vogelsanger Weg 80
40470 Düsseldorf
Tel: +49-211-74845-0
Fax: +49-211-74845-299
E-Mail: [EMAIL PROTECTED]
Internet: http://www.wapme-systems.de
Hi,
I think, this patch is clean enough.
I run kannel with this patch in commercial enviroment about a week
and have no problem.
Still remain problem with host resolving, but there is no portable solution
to avoid mutex. I suggest to use getaddrinfo for all systems which supports it.
Stipe Tolj
Hi Vjacheslav,
thanks a lot for the submission of the patch.
Could you please be so kind to use the unified diff format which is
invoked with the -u switch, like
$ diff -u oldfile newfile
and attach the output to the mail, please no inline. Could you resend
it that way and I will commit it
Hi, Stipe.
Stipe Tolj wrote:
Hi Vjacheslav,
thanks a lot for the submission of the patch.
Could you please be so kind to use the unified diff format which is
invoked with the -u switch, like
$ diff -u oldfile newfile
and attach the output to the mail, please no inline. Could you resend
Hi, Stipe.
Stipe Tolj wrote:
Hi Vjacheslav,
I want to discuss serious problem in Kannel WAP gateway.
It is about blocking connect(). Now any malicious user can
hang up kannel. It is too simple to do.
Anyone can send request from WAP phone to host which is configured
to drop SYN packets.
For
Scenario 1 (how to reproduce)
As I said it is very easy to reproduce if you have access to any web server
with public address (you can test it with private web server if wapgw has
access to it, of course).
Fisrt of all configure some port to DROP (not REJECT!) incoming SYN packets
(or all
Hi Vjacheslav,
I want to discuss serious problem in Kannel WAP gateway.
It is about blocking connect(). Now any malicious user can
hang up kannel. It is too simple to do.
Anyone can send request from WAP phone to host which is configured
to drop SYN packets.
For example: after simple
I want to discuss serious problem in Kannel WAP gateway.
It is about blocking connect(). Now any malicious user can
hang up kannel. It is too simple to do.
Anyone can send request from WAP phone to host which is configured
to drop SYN packets.
For example: after simple command (for 10.10.10.10