[tor-relays] network scan results for CVE-2016-5696 / rfc 5961

Petrusko petrusko at riseup.net
Thu Nov 17 19:42:14 UTC 2016


On a Debian 8 updated relay too :
# netstat -s | grep -i challenge
    TCPChallengeACK: 19497
    TCPSYNChallenge: 12991

Linux 3.16.0-4-amd64 #1 SMP Debian 3.16.36-1+deb8u2 (2016-10-19) x86_64
GNU/Linux

Something else for being sure ?


Le 17/11/2016 à 20:24, Univibe a écrit :
> $ ansible tor -a 'bash -c "netstat -s | grep -i challenge"' -b
> --ask-become-pass
>
> lon | SUCCESS | rc=0 >>
>     TCPChallengeACK: 14197
>     TCPSYNChallenge: 2926
>
> fra | SUCCESS | rc=0 >>
>     TCPChallengeACK: 12907
>     TCPSYNChallenge: 3461

-- 
Petrusko
EBE23AE5


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20161117/5cb3d7b5/attachment.sig>


More information about the tor-relays mailing list