Jared Stanbrough <jaredsat_private> writes: > This doesn't address the issue of keeping the originating machine from > trying to take part in the replayed TCP session. The question isn't how to > replay the data, it's how to keep the originating host from screwing it up > by tearing down the illigitimate connection. Old question: http://www.whitefang.com/rin/rawfaq.html#12 " If you don't firewall it, and reply yourself you'll wind up having additional responses from your operating system! " > One easy way to do this would be to setup iptables to block outbound TCP > packets that have the RST flag set I'd rather block incoming packets and set my filter on the source address & ports.
This archive was generated by hypermail 2b30 : Thu Oct 31 2002 - 08:45:18 PST