lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
From: pauls at utdallas.edu (Paul Schmehl)
Subject: FW: Question for DNS pros

--On Wednesday, August 4, 2004 12:04 PM +1000 Ian Latter 
<Ian.Latter@...edu.au> wrote:

>
> I've been flat out here -- but I've tried to stay on this thread ..
>
> Are you guys sure that this isn't the server end of the
> ip-over-dns software (nstxd) trying to get data back to the
> now non-existent client?
>
> It would have made it through your statefull kit if it was
> initiated from that problem address of yours (Paul), originally.
>
The address involved is the PAT address for one subnet, so yes, it could 
well have been a conversation initiated by a host on our network, but when 
I checked the translation tables were empty.  Unfortunately, the logging is 
so verbose (for translataions) that we don't have it enabled, so we can 
only tell if a conversation is active.

In any case, it looks like my surmise about BigIP was correct.

Paul Schmehl (pauls@...allas.edu)
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ