openssh vulnerability WITH TCP DUMP!
Darren Tucker
dtucker at zip.com.au
Fri Nov 4 23:51:29 EST 2005
On Fri, Nov 04, 2005 at 11:18:59PM +1100, Darren Tucker wrote:
> [...] it looks like the ssh connection was being
> dropped immediately after establishment (such as would be expected if,
> eg, you are using tcpwrappers).
Damien's explanation of this as nmap-like half-open scanning is much
better than the one above (for one thing, a connection dropped by
tcpwrappers should have the entire 3way tcp handshake).
BTW I've decoded all of the first 2 packets: they're pretty vanilla TCP
syn/synack packets to/from port 22 with tcp options (MSS=1460 and "SACK
permitted"). Nothing of interest.
--
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69
Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.
More information about the openssh-unix-dev
mailing list