Re: DoS bug on Tru64From: Scott Brewster (ScottBrewster@firsthealth.com)
- Previous message: Jarno Huuskonen: "Re: tac_plus version F4.0.4.alpha on at least Solaris 8 sparc"
- Maybe in reply to: Jason Johns - SAS(IT): "DoS bug on Tru64"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
Date: Wed, 30 Jan 2002 16:33:08 -0700 From: "Scott Brewster" <ScottBrewster@firsthealth.com> To: firstname.lastname@example.org, email@example.com
I ran the nmap command listed below against one of my 5.1 systems. It
didnt seem to have caused any problems. Not only could I still make
connections, the existing connections continued to function normally (no
freeze-ups). I wouldnt call this a conclusive test, but my system didnt
suffer any ill effects.
>>> "Bob Dog" <firstname.lastname@example.org> 01/30/02 12:55PM >>>
--- ellipse <email@example.com> wrote:
>> Today we were using nmap to scan our network and when we scanned
>> Tru64 machines, telnet and ftp froze and timed out. We could not
>> any connections to those ports and existing connections froze. New
>> connections were denied for about a minute after the scan was
>> I've checked with Compaq and on Securityfocus and neither place has
>> knowledge of this.
>> nmap -T Polite -O -p 23,139 -oM /tmp/lst 'xxx.xxx.16-44.*'
>Why does this sound so familiar? Would this not be an issue with
Support for 4.0D went away as of about September of '01.
Does anyone know if this is an issues with 5.1?
Have no box that I want to test this with.
Visit these sites today
Blink 182 Fan Site - www.blink182.co.nz
NZ Skateboarding - www.nzskate.com