Re: [PATCH] TCP RST after firewall redirect fix (against 2.1.119)

Rik van Riel (H.H.vanRiel@phys.uu.nl)
Tue, 1 Sep 1998 21:18:18 +0200 (CEST)


On Tue, 1 Sep 1998, Alex Buell wrote:
> On Tue, 1 Sep 1998, Paul Rusty Russell wrote:
>
> > [NB: Fixing this enables a cool firewalling hack whereby people can
> > redirect unwanted TCP connections to an unused port to get
> > `Connection refused']
>
> Cool! Does that means I can redirect port 139 to a daemon that
> automatically kills the script-kiddie loser? :o)

It should certainly be possible to activate WinNuke every
time your software has identified a DoS attack _and_ has
trace the origin with certainty.

Just nuking the origin address opens up a whole new line
of DoS attacks ... just imagine sending out fake TCP
packets to your box in order to crash the neighbour's
Windows box :)

Rik.
+-------------------------------------------------------------------+
| Linux memory management tour guide. H.H.vanRiel@phys.uu.nl |
| Scouting Vries cubscout leader. http://www.phys.uu.nl/~riel/ |
+-------------------------------------------------------------------+

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.altern.org/andrebalsa/doc/lkml-faq.html