lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: edp.lists at acerbis.it (edp) Subject: R: Loopback packets Bad idea to set that dns entry to loopback, you are still DoS'ing yourself. The worm try to syn flood 127.0.0.1 with spoofed addresses, resulting in lotta of RST packets back from loopback. Just create a fake empty zone, no need here of loopback addresses. >>> ***A*R** Seq: 0x0 Ack: 0x57810001 Win: 0x0 TcpLen: 20
Powered by blists - more mailing lists