lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20080805210935.17237.qmail@securityfocus.com> Date: 5 Aug 2008 21:09:35 -0000 From: jyoung01@...ricafirst.com To: bugtraq@...urityfocus.com Subject: Re: 8e6 Technologies R3000 Internet Filter Bypass with Host Decoy I've been testing this and it appears that *any* HTTP 1.0 request will bypass the 8e6 filter (if there is not an IP in the library). I've been testing this by using scapy to generate the HTTP GET request. 1.0 succeeds and 1.1 fails.