[tor-relays] network scan results for CVE-2016-5696 / rfc 5961

Petrusko petrusko at riseup.net
Thu Nov 17 19:44:43 UTC 2016


On a Raspberry pi... Linux 4.4.26+ #915 Thu Oct 20 17:02:14 BST 2016
armv6l GNU/Linux

$ netstat -s | grep -i challenge
    TCPChallengeACK: 10

(no TCPSYNChallenge result ??)



Le 17/11/2016 à 20:24, Univibe a écrit :
> My relays have been patched to the latest available kernels, and
> aren't in the list of vulnerable relays, however they still show high
> values for TCPSYNChallenge:
>
> ----
>
> $ ansible tor -a 'bash -c "netstat -s | grep -i challenge"' -b
> --ask-become-pass
>
> lon | SUCCESS | rc=0 >>
>     TCPChallengeACK: 14197
>     TCPSYNChallenge: 2926
>
> fra | SUCCESS | rc=0 >>
>     TCPChallengeACK: 12907
>     TCPSYNChallenge: 3461
>
> ----
>
> $ ansible tor -a 'bash -c "cat /etc/lsb-release && uname -rv"' -b
> --ask-become-pass
>
> fra | SUCCESS | rc=0 >>
> DISTRIB_ID=Ubuntu
> DISTRIB_RELEASE=14.04
> DISTRIB_CODENAME=trusty
> DISTRIB_DESCRIPTION="Ubuntu 14.04.5 LTS"
> 3.13.0-101-generic #148-Ubuntu SMP Thu Oct 20 22:08:32 UTC 2016
>
> lon | SUCCESS | rc=0 >>
> DISTRIB_ID=Ubuntu
> DISTRIB_RELEASE=14.04
> DISTRIB_CODENAME=trusty
> DISTRIB_DESCRIPTION="Ubuntu 14.04.5 LTS"
> 3.13.0-101-generic #148-Ubuntu SMP Thu Oct 20 22:08:32 UTC 2016
>
> ----
>
>
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

-- 
Petrusko
EBE23AE5


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20161117/b4205205/attachment.sig>


More information about the tor-relays mailing list