Date: Wed, 23 Jul 1997 19:30:01 -0700 (PDT) From: Garrett Wollman <wollman@khavrinen.lcs.mit.edu> To: freebsd-bugs Subject: kern/4153: New tcp initial send sequence number code Message-ID: <199707240230.TAA01483@hub.freebsd.org>
next in thread | raw e-mail | index | archive | help
The following reply was made to PR kern/4153; it has been noted by GNATS. From: Garrett Wollman <wollman@khavrinen.lcs.mit.edu> To: leres@ee.lbl.gov Cc: FreeBSD-gnats-submit@FreeBSD.ORG, vern@ee.lbl.gov Subject: kern/4153: New tcp initial send sequence number code Date: Wed, 23 Jul 1997 22:22:59 -0400 (EDT) <<On Wed, 23 Jul 1997 16:49:14 -0700 (PDT), leres@ee.lbl.gov (Craig Leres) said: > The following context diffs use a 32 bit random number that > is based on a seed that is not externally visible. (See > the comments in tcp_new_iss() for a more detailed explaination.) > While this version does technically violate the spec, it > doesn't do so in a manner that will impact any current or > future implementation. (We've been running a version of > this code on our SunOS 4 systems since the early days of > ip spoofing.) If you go to this extreme, you might as well just use the in-kernel secure random number generator instead. -GAWollman -- Garrett A. Wollman | O Siem / We are all family / O Siem / We're all the same wollman@lcs.mit.edu | O Siem / The fires of freedom Opinions not those of| Dance in the burning flame MIT, LCS, CRS, or NSA| - Susan Aglukark and Chad Irschick
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199707240230.TAA01483>