1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 <2018> 2019 2020 2021 2022 2023 2024 | Index | 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 <2018> 2019 2020 2021 2022 2023 2024 |
<== Date ==> | <== Thread ==> |
---|
Subject: | Re: Port scan with nmap causes infinite loop in casDGClient::processDG() [Re: CA gatway runs away when zero length PV name in UDP search request] |
From: | "J. Lewis Muir" <[email protected]> |
To: | Ralph Lange <[email protected]> |
Cc: | EPICS Tech Talk <[email protected]> |
Date: | Tue, 16 Jan 2018 10:06:22 -0600 |
On 01/15, Ralph Lange wrote: > Dear Shuei, > > I have created https://bugs.launchpad.net/epics-base/+bug/1743321 to track > this issue. > > Note, though, that Channel Access never claimed to be hardened. Even after > fixing this behavior, an attacker on the local network will be able to > cause all sorts of havoc by sending malformed network packages to CA > servers and clients. > Channel Access is not intended for use in a hostile environment. I wouldn't call a port scan hostile. Lewis