Is the current version of Ipchains still vulnerable to packet fragmentation attacks? I.E, using packet fragmentation to initiate a connection with a server on a port that the firewall allows, and then overriding the original service port in a subsequent packet with a service port not allowed by the firewall? Or has this vulnerability since been fixed by Ipchains?