On Wed, 2003-09-03 at 13:21, Jason Dixon wrote:

> On Wed, 2003-09-03 at 13:16, Benjamin J. Weiss wrote:
> This is potentially a very bad idea, depending on the scenario.  It's
> trivial to spoof an innocent bystander's address, causing dynamic
> blocking of those systems/networks.  OpenBSD has a nice feature that has
> been imported to -current that works nicely against attacks like these: 
> developers have added the ability to filter based on TCP SYN signature. 
> It only requires the capture of the initial SYN packet, comparing it
> against a local list of known signatures.  As you might imagine, it's
> very effective at blocking initial connections from Windows hosts.  ;-)
> 
Ultimately, I think that the best idea is to make sure that Apache will
continue to withstand the attacks. 

Attachment: signature.asc
Description: This is a digitally signed message part



Reply via email to