ok i got this error when i was running my nessus security check. they call it a general tcp vulnerability:
***************************************************
The remote host does not discard TCP SYN packets which
have the FIN flag set.
Depending on the kind of firewall you are using, an
attacker may use this flaw to bypass its rules.
See also :
http://archives.neohapsis.com/archiv...2-10/0266.html
http://www.kb.cert.org/vuls/id/464113
Solution : Contact your vendor for a patch
***************************************************
i'm not really sure what to do about this. at the moment i'm running running ****. is this just the way my kernel handles packets? is there a danger? is there something i should do in ipchains to make sure certain flags are up before excepting a rejecting/accepting?
what exactly is the problem. if anyone has any good background with this stuff or has an idea. i'd appreciate. thnx