diff options
| author | Jozsef Kadlecsik <[email protected]> | 2012-08-31 09:55:53 +0000 |
|---|---|---|
| committer | Pablo Neira Ayuso <[email protected]> | 2012-09-09 22:13:30 +0200 |
| commit | 64f509ce71b08d037998e93dd51180c19b2f464c (patch) | |
| tree | 3ccafa55245faaa0580e86f705548bbfe6cf3108 /tools/perf/scripts/python/syscall-counts.py | |
| parent | 0626af3139572610b56376580d11eb65d45d9dd7 (diff) | |
netfilter: Mark SYN/ACK packets as invalid from original direction
Clients should not send such packets. By accepting them, we open
up a hole by wich ephemeral ports can be discovered in an off-path
attack.
See: "Reflection scan: an Off-Path Attack on TCP" by Jan Wrobel,
http://arxiv.org/abs/1201.2074
Signed-off-by: Jozsef Kadlecsik <[email protected]>
Signed-off-by: Pablo Neira Ayuso <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/syscall-counts.py')
0 files changed, 0 insertions, 0 deletions