On Tuesday 20 November 2001 11:36, qgiorgiat_private wrote: > hello, > > I am trying to figure out a problem i have seen with a > tcp/ip stack of an equipement, but i need some help in > order to finish my C code :) I read this mailing-list > for quite a long time and i am sure there are some > gurus here :)) > > I successfully emulate a tcp client for the three > handshake with raw-ip socket (with all the tcp options, > seq num etc.. i wanted ), but when i received the > second packet the system send also a RST back to the > host i am trying to connect to, which is for my system > point of view an unsollicited SYN/ACK packet. > > so i have > -> SYN > <- SYN/ACK > -> RST ( system part ) :( > -> ACK ( my prog ) > ... > > Does anybody have a mean to prevent the system to send > this RST ? > > Any help will be appreciated :) > > Quentin. > Use some form of IP filtering. IPchains or iptables (on Linux) can be used to cause the OS to ignore all packets from your target. Worked for me, Mordy -- Mordy Ovits Bad Password: Network Security nds09813-050 Bloomberg L.P.
This archive was generated by hypermail 2b30 : Tue Nov 20 2001 - 09:57:25 PST