1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 <2018> 2019 2020 2021 2022 2023 2024 | Index | 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 <2018> 2019 2020 2021 2022 2023 2024 |
<== Date ==> | <== Thread ==> |
---|
Subject: | Re: Port scan with nmap causes infinite loop in casDGClient::processDG() [Re: CA gatway runs away when zero length PV name in UDP search request] |
From: | Ralph Lange <[email protected]> |
To: | EPICS Tech Talk <[email protected]> |
Date: | Tue, 16 Jan 2018 19:13:23 +0100 |
On 01/15, Ralph Lange wrote:
> [...]
> Note, though, that Channel Access never claimed to be hardened. Even after
> fixing this behavior, an attacker on the local network will be able to
> cause all sorts of havoc by sending malformed network packages to CA
> servers and clients.
> Channel Access is not intended for use in a hostile environment.
I wouldn't call a port scan hostile.