[SOLVED] What happens when a machine receive unwanted packets?
Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I want to know what parts of kernel are involving in managing the packet, and specially on receiving an unwanted packet. If I receive such a packet, Is it possible any dangerous event occurs to my PC?
You use firewalls to manage packets - read about iptables. All the kernel does is assign resources to the transport, eg. through the nic driver and the various protocols the packet could be using.
If you look through the help files for the networking section of your kernel config, you'll get a good overview of the sorts of things the kernel does with tcp/ip packets.
It sounds like there is something on your mind - what's troubling you?
Now I am interested in knowing is there any way to a packet to be processed and became active?. In other words can a packet refuse that routine specially the third part mentioned in the article and goes another way?
The main question is:
Is the schema vulnerable or the implementations of it are insecure? which result in hacking attacks?
Be aware that the article, while at the time a pretty good one, concerns a rather old system by today's standards. In particular, the firewall system has had a significant makeover since then.
Quote:
In other words can a packet refuse
No, the packet never becomes active in that sense. The packet's 'payload' is data, not execution (or executability). Now, the user, or some other program can take that data and treat it as an executable, but the data itself can't directly do that. And that could be a problem, if done wrong/maliciously, but I'm not sure whether that is what you are asking about
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.