On Thu, Mar 15, 2007 at 11:52:44AM +0100, Claudio Jeker wrote:
> On Thu, Mar 15, 2007 at 10:26:23AM +0000, Gaby Vanhegan wrote:
> > Hi,
> > 
> > Reading the security advisory for the ipv6 buffer issue, the  
> > workaround is to block inet6 traffic in pf.conf.  My default block  
> > line is actually:
> > 
> > block in on $ext_if
> > 
> > Where $ext_if is the net connection (the only network connection the  
> > machine is plugged into).  Is the rule:
> > 
> > block in inet6

I have put block in inet6 into my /etc/pf.conf. Do I need to do anything
else (turn something on somewhere else) or does it already protect against
the overflow? How can I test that the protection really works? Is there
somewhere a Linux program I can run to test if I can log in remotely into
an OpenBSD machine as the root?

CL<

Reply via email to