Subject: Re: $HOSTALIASES thing.
To: None <email@example.com>
From: Andrew Brown <firstname.lastname@example.org>
Date: 11/04/2000 02:01:23
>>that isn't so much the problem, but that joe user can do
>> s = socket();
>> sa.s_port = htons(23);
>> sa.s_addr = <your_ip_address>;
>> bind(s, &sa);
>>and catch all inbound telnet attempts since inetd only listens on
>>IN_ADDR_ANY. that's bad, and, for example, *anyone* can do that to
>>your x server since it listens on *.6000.
> the above (bind to specific address while someone is bound to
> wildcard) was banned with sys/netinet/in_pcb.c revision 1.58
> (Mar 1999).
okay...i'll admit to not checking, but relying on my memory of things
i've done. :)
does it also ban also affect sockets with SO_REUSEPORT set? does the
error occur on the bind() or the listen()?
|-----< "CODE WARRIOR" >-----|
email@example.com * "ah! i see you have the internet
firstname.lastname@example.org (Andrew Brown) that goes *ping*!"
email@example.com * "information is power -- share the wealth."