Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

IP hack theorizing



On Tue, Oct 10, 2006 at 02:36:17PM -0400, Tom Metro wrote:
> Or corrected. I believe modern software firewalls, like iptables, 
> perform a number of sanity checks on packets before they hit the kernel. 
> For example, here's a recent log entry triggered by iptables when it 
> didn't like the window size specified in a packet:
> 
>  ... TCP: Treason uncloaked! Peer 192.168.0.200:873/59982 shrinks 
> window 1150916075:1150916611. Repaired.

That message is from the underlying Linux TCP/IP stack, not iptables
(I get similar messages on my system, which does not have iptables).

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.





BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org