[9390] in bugtraq

home help back first fref pref prev next nref lref last post

Re: More oshare testing.

daemon@ATHENA.MIT.EDU (Cristiano Lincoln Mattos)
Fri Feb 5 14:51:18 1999

Date: 	Fri, 5 Feb 1999 12:45:08 -0200
Reply-To: Cristiano Lincoln Mattos <lincoln@HOTLINK.COM.BR>
From: Cristiano Lincoln Mattos <lincoln@HOTLINK.COM.BR>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.BSI.3.91.990203232431.10689D-100000@chesapeake.net>

	The router's that would drop the packet based on the 1.1.1.1 src
address are the one's that have anti-ip-spoofing ACL's installed, which
(unfornately) not all have.  Since the oshare packet's have invalid
checksums for the IP header, that is a more concrete reason of why routers
drop them (in all my tests), obeying to the Router requirements
RFC.  Router's tested: Cisco, Ascend, and Linux 2.0.36 with ip-forwarding.

Cristiano Lincoln Mattos			   Recife / Brazil

On Wed, 3 Feb 1999, Jeff Roberson wrote:

> The ethernet adapter is on a completely different layer from IP, so I
> doubt the netcard has much to do with the attack.  Also, I notice in the
> original email, the author claims that the attack wont work if your not
> on the same segment.  This is simply because the packet's source address is
> 1.1.1.1, so most routers will drop this packet.  Finally, could
> people be more specific when they post about crashes?  By this I mean,
> what patches they have installed, what network protocols/services/and
> adapters they have?  This information might be usefull in understanding
> who this bug really affects.
>
> Jeff

home help back first fref pref prev next nref lref last post