Subject: Re: $HOSTALIASES thing.
To: None <itojun@iijlab.net>
From: Andrew Brown <atatat@atatdot.net>
List: tech-kern
Date: 11/04/2000 02:01:23
>>that isn't so much the problem, but that joe user can do
>>
>> s = socket();
>> sa.s_port = htons(23);
>> sa.s_addr = <your_ip_address>;
>> bind(s, &sa);
>> listen(s);
>>
>>and catch all inbound telnet attempts since inetd only listens on
>>IN_ADDR_ANY. that's bad, and, for example, *anyone* can do that to
>>your x server since it listens on *.6000.
>
> the above (bind to specific address while someone is bound to
> wildcard) was banned with sys/netinet/in_pcb.c revision 1.58
> (Mar 1999).
okay...i'll admit to not checking, but relying on my memory of things
i've done. :)
does it also ban also affect sockets with SO_REUSEPORT set? does the
error occur on the bind() or the listen()?
--
|-----< "CODE WARRIOR" >-----|
codewarrior@daemon.org * "ah! i see you have the internet
twofsonet@graffiti.com (Andrew Brown) that goes *ping*!"
andrew@crossbar.com * "information is power -- share the wealth."