What happens when a machine receive unwanted packets?
Hi
Assume this: Machine A sends a packet to machine B, no application in machine B is waiting for the packet, Now: What happens in kernel? what happens to this packet exactly? Could you please explain me step by step? Or introduce me some books, web pages and ...? Thanks |
If there is nothing at all to use or respond to the packet, it is ignored.
What is the context here? |
I want to know what parts of kernel are involving in managing the packet, and specially on receiving an unwanted packet. If I receive such a packet, Is it possible any dangerous event occurs to my PC?
|
You use firewalls to manage packets - read about iptables. All the kernel does is assign resources to the transport, eg. through the nic driver and the various protocols the packet could be using.
If you look through the help files for the networking section of your kernel config, you'll get a good overview of the sorts of things the kernel does with tcp/ip packets. It sounds like there is something on your mind - what's troubling you? |
OK
I read the following (first lines), yesterday: http://www.linuxjournal.com/article/4852 Now I am interested in knowing is there any way to a packet to be processed and became active?. In other words can a packet refuse that routine specially the third part mentioned in the article and goes another way? The main question is: Is the schema vulnerable or the implementations of it are insecure? which result in hacking attacks? |
Quote:
Quote:
|
But then, in case you were looking for something like this, there is portknocking:
http://www.portknocking.org/ |
All times are GMT -5. The time now is 03:37 PM. |