Subject: Re: $HOSTALIASES thing.
To: None <>
From: Andrew Brown <>
List: tech-kern
Date: 11/04/2000 02:01:23
>>that isn't so much the problem, but that joe user can do
>>	s = socket();
>>	sa.s_port = htons(23);
>>	sa.s_addr = <your_ip_address>;
>>	bind(s, &sa);
>>	listen(s);
>>and catch all inbound telnet attempts since inetd only listens on
>>IN_ADDR_ANY.  that's bad, and, for example, *anyone* can do that to
>>your x server since it listens on *.6000.
>	the above (bind to specific address while someone is bound to
>	wildcard) was banned with sys/netinet/in_pcb.c revision 1.58
>	(Mar 1999).

okay...i'll admit to not checking, but relying on my memory of things
i've done.  :)

does it also ban also affect sockets with SO_REUSEPORT set?  does the
error occur on the bind() or the listen()?

|-----< "CODE WARRIOR" >-----|             * "ah!  i see you have the internet (Andrew Brown)                that goes *ping*!"       * "information is power -- share the wealth."