Date: Thu, 2 Nov 2000 14:55:39 -0500 From: Bill Fumerola <billf@chimesnet.com> To: stable@freebsd.org Cc: Lauri Laupmaa <mauri@aripaev.ee> Subject: Re: TCP sequence prediction on freebsd Message-ID: <20001102145539.Z37870@jade.chc-chimes.com> In-Reply-To: <20001102113247.A13873@dragon.nuxi.com>; from obrien@freebsd.org on Thu, Nov 02, 2000 at 11:32:47AM -0800 References: <8E67E032AD23D4118F740050042F21F76F@lant.mbp.ee> <20001102113247.A13873@dragon.nuxi.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Nov 02, 2000 at 11:32:47AM -0800, David O'Brien wrote: > On Thu, Nov 02, 2000 at 02:12:05PM +0200, Lauri Laupmaa wrote: > > nmap reports something like: > > > TCP Sequence Prediction: Class=random positive increments > > > Difficulty=85682 (Worthy challenge) > > > > is this tcp sequence prediction really an security issue ? > > **YES** Do a search for the Mitnick attack on Tsutomu Shimomura. It was > possible because of the ability to predict the TCP sequence numbers. The question was if "_this_" prediction is really a securit issue (ie FreeBSD's), not if tcp sequence prediction in general is a security issue. At least that's how I read it. -- Bill Fumerola - Network Architect, BOFH / Chimes, Inc. billf@chimesnet.com / billf@FreeBSD.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001102145539.Z37870>