[tor-relays] network scan results for CVE-2016-5696 / rfc 5961
Petrusko
petrusko at riseup.net
Thu Nov 17 19:42:14 UTC 2016
On a Debian 8 updated relay too :
# netstat -s | grep -i challenge
TCPChallengeACK: 19497
TCPSYNChallenge: 12991
Linux 3.16.0-4-amd64 #1 SMP Debian 3.16.36-1+deb8u2 (2016-10-19) x86_64
GNU/Linux
Something else for being sure ?
Le 17/11/2016 à 20:24, Univibe a écrit :
> $ ansible tor -a 'bash -c "netstat -s | grep -i challenge"' -b
> --ask-become-pass
>
> lon | SUCCESS | rc=0 >>
> TCPChallengeACK: 14197
> TCPSYNChallenge: 2926
>
> fra | SUCCESS | rc=0 >>
> TCPChallengeACK: 12907
> TCPSYNChallenge: 3461
--
Petrusko
EBE23AE5
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20161117/5cb3d7b5/attachment.sig>
More information about the tor-relays
mailing list