Greetings;

It seems the kernel we are using for the latest installs, is subject to 
an attack as outlined in CVE-2016-5696, a serious flaw in the tcp 
protocol. A long standing bug introduced at kernel 3.2, & just now 
publicized.

See:
<http://www.zdnet.com/article/linux-tcp-flaw-lets-anyone-hijack-internet-traffic>

So everyone with a machine that has internet access (thats all of mine) 
should do the following:

As 1st user so you have sudo rights, do:
sudo bash (give your 1st user pw)

nano /etc/sysctl.conf

Add, at the bottom of the file:
net.ipv4.tcp_challenge_ack_limit=999999999

ctl+o to write, ctl+x to exit. Then while still with root perms do:

sysctl -p

It should echo that addition to the console, and anything else you 
changed, like adding the machines FQDN to the kernel.domain line near 
the top of that file.

dtl+d to exit root

Thats it.  Your stuff s/b be protected until a fixed kernel, 4.8 with 
patch or 4.9 when its out and patched for our use.

Cheers, Gene Heskett
-- 
"There are four boxes to be used in defense of liberty:
 soap, ballot, jury, and ammo. Please use in that order."
-Ed Howdershelt (Author)
Genes Web page <http://geneslinuxbox.net:6309/gene>

------------------------------------------------------------------------------
What NetFlow Analyzer can do for you? Monitors network bandwidth and traffic
patterns at an interface-level. Reveals which users, apps, and protocols are 
consuming the most bandwidth. Provides multi-vendor support for NetFlow, 
J-Flow, sFlow and other flows. Make informed decisions using capacity 
planning reports. http://sdm.link/zohodev2dev
_______________________________________________
Emc-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/emc-users

Reply via email to