Bugtraq mailing list archives
Re: flash-inhibited talkd, and somewhat more secure fingerd
From: chowes () helix net (Charles Howes)
Date: Fri, 28 Oct 1994 06:41:41 -0700 (PDT)
On Fri, 28 Oct 1994, Karl Lehenbauer wrote:
I've put modified versions of the Berkeley talk daemon, talkd, and the Berkeley finger daemon, fingerd, on ftp.neosoft.com:/pub/security. The talkd should stop denial-of-service attacks that use "flash" to send unprintable characters, and it should make it significantly harder to get talkd to lie about the hostname of the sender. The fingerd makes it more difficult to collect usernames on a system by preventing the generic "finger @host" style of finger, restricting finger to reporting on exact matches of usernames only, plus it logs all requests in the syslog, as well as attempting RFC931/1431 authentication. You'll still need the wrappers if you want to limit access, twist, etc. If you're really concerned about it, you should shut off fingerd entirely. Karl
Lately, there's been a few denial-of-service attacks with a twist, using talkd. Apparently, if you send the right packet to a talkd port, you can get talkd to pick a fight with talkd on an arbitrary host. The network between the hosts quickly becomes unusable. 1) Anyone found the program (can flash do it?) to demonstrate? 2) Anyone fixed it yet? :-) -- Charles Howes -- chowes () helix net Always tell the truth, then you make it the other bloke's problem! - Sean Connery, 1971
Current thread:
- flash-inhibited talkd, and somewhat more secure fingerd Karl Lehenbauer (Oct 27)
- Re: flash-inhibited talkd, and somewhat more secure fingerd Charles Howes (Oct 28)