This seems a security issue to me - you can have a backdoor listening on SCTP and it won't show in netstat. And even established connections - like a file transfer or shell.
Red Hat & SuSE have had SCTP patches in their netstat flavors for years. And the debian bug has patches. What's the holdup?
Simple tests:
netsend sctp receive (opens a listening socket on port 6666)
socat SCTP-LISTEN:8080 TCP-CONNECT:localhost:22 (proxies ssh on sctp/8080)
This seems a security issue to me - you can have a backdoor listening on SCTP and it won't show in netstat. And even established connections - like a file transfer or shell.
Red Hat & SuSE have had SCTP patches in their netstat flavors for years. And the debian bug has patches. What's the holdup?
Simple tests:
netsend sctp receive (opens a listening socket on port 6666) localhost: 22 (proxies ssh on sctp/8080)
socat SCTP-LISTEN:8080 TCP-CONNECT: