RE: TCP/IP vulnerability

From: Baltissen, GJPAA (Ruud) (
Date: 2005-04-18 10:26:26

Hallo Raymond,

> Is the tcp/ip stack for the c64 at all vulnerable to the
> flaw in ICMP?

Sorry for answering a bit late but I was away for a week on a course for
Cisco routers. And there was ICMP a part of the lessons as well.

I don't know if there is a flaw in ICMP but the problem you are refering to
is the use of ICMP itself. ICMP can be compared with email: normal email
traffic is accepted, SPAM isn't. Normal ICMP traffic is acceptable but a
continous stream of ICMP commands isn't. And most of the time there are
hackers behind those streams. And that's why nowadays more and more routers
start to ban ICMP. Most firewalls don't accept it anymore at all.

Regarding the C64: ICMP is handled by software. So it is completely up to
you whether you want to handle ICMP requests or not.

    / __|__
   / /  |_/     Groetjes, Ruud
   \ \__|_\
    \___|       URL:


De informatie in dit e-mailbericht is vertrouwelijk en uitsluitend bestemd voor de geadresseerde. Wanneer u dit bericht per abuis ontvangt, verzoeken wij u contact op te nemen met de afzender per kerende e-mail. Verder verzoeken wij u in dat geval dit e-mailbericht te vernietigen en de inhoud ervan aan niemand openbaar te maken. Wij aanvaarden geen aansprakelijkheid voor onjuiste, onvolledige dan wel ontijdige overbrenging van de inhoud van een verzonden e-mailbericht, noch voor daarbij overgebrachte virussen.

The information contained in this e-mail is confidential and may be privileged. It may be read, copied and used only by the intended recipient. If you have received it in error, please contact the sender immediately by return e-mail; please delete in this case the e-mail and do not disclose its contents to any person. We don't accept liability for any errors, omissions, delays of receipt or viruses in the contents of this message which arise as a result of e-mail transmission.

       Message was sent through the cbm-hackers mailing list

Archive generated by hypermail pre-2.1.8.