Hi, In the docs you mention you were able to crash some IOS versions using the SAA requests. For those of you who plan to use this feature I recommend reading the Cisco Vulnerability article from May, which lists this SAA/RTR bug as a known problem. The bug is corrected in newer IOS's, which I assume you already use after the IPv4 DoS vulnerability was announced in July...
http://www.cisco.com/warp/public/707/cisco-sa-20030515-saa.shtml Cheers, TT -- Unsubscribe mailto:[EMAIL PROTECTED] Help mailto:[EMAIL PROTECTED] Archive http://www.ee.ethz.ch/~slist/smokeping-users WebAdmin http://www.ee.ethz.ch/~slist/lsg2.cgi
