Greetings; It seems the kernel we are using for the latest installs, is subject to an attack as outlined in CVE-2016-5696, a serious flaw in the tcp protocol. A long standing bug introduced at kernel 3.2, & just now publicized.
See: <http://www.zdnet.com/article/linux-tcp-flaw-lets-anyone-hijack-internet-traffic> So everyone with a machine that has internet access (thats all of mine) should do the following: As 1st user so you have sudo rights, do: sudo bash (give your 1st user pw) nano /etc/sysctl.conf Add, at the bottom of the file: net.ipv4.tcp_challenge_ack_limit=999999999 ctl+o to write, ctl+x to exit. Then while still with root perms do: sysctl -p It should echo that addition to the console, and anything else you changed, like adding the machines FQDN to the kernel.domain line near the top of that file. dtl+d to exit root Thats it. Your stuff s/b be protected until a fixed kernel, 4.8 with patch or 4.9 when its out and patched for our use. Cheers, Gene Heskett -- "There are four boxes to be used in defense of liberty: soap, ballot, jury, and ammo. Please use in that order." -Ed Howdershelt (Author) Genes Web page <http://geneslinuxbox.net:6309/gene> ------------------------------------------------------------------------------ What NetFlow Analyzer can do for you? Monitors network bandwidth and traffic patterns at an interface-level. Reveals which users, apps, and protocols are consuming the most bandwidth. Provides multi-vendor support for NetFlow, J-Flow, sFlow and other flows. Make informed decisions using capacity planning reports. http://sdm.link/zohodev2dev _______________________________________________ Emc-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/emc-users
