Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 23 Jul 1997 19:30:01 -0700 (PDT)
From:      Garrett Wollman <wollman@khavrinen.lcs.mit.edu>
To:        freebsd-bugs
Subject:   kern/4153: New tcp initial send sequence number code
Message-ID:  <199707240230.TAA01483@hub.freebsd.org>

next in thread | raw e-mail | index | archive | help
The following reply was made to PR kern/4153; it has been noted by GNATS.

From: Garrett Wollman <wollman@khavrinen.lcs.mit.edu>
To: leres@ee.lbl.gov
Cc: FreeBSD-gnats-submit@FreeBSD.ORG, vern@ee.lbl.gov
Subject: kern/4153: New tcp initial send sequence number code
Date: Wed, 23 Jul 1997 22:22:59 -0400 (EDT)

 <<On Wed, 23 Jul 1997 16:49:14 -0700 (PDT), leres@ee.lbl.gov (Craig Leres) said:
 
 > 	The following context diffs use a 32 bit random number that
 > 	is based on a seed that is not externally visible. (See
 > 	the comments in tcp_new_iss() for a more detailed explaination.)
 > 	While this version does technically violate the spec, it
 > 	doesn't do so in a manner that will impact any current or
 > 	future implementation. (We've been running a version of
 > 	this code on our SunOS 4 systems since the early days of
 > 	ip spoofing.)
 
 If you go to this extreme, you might as well just use the in-kernel
 secure random number generator instead.
 
 -GAWollman
 
 --
 Garrett A. Wollman   | O Siem / We are all family / O Siem / We're all the same
 wollman@lcs.mit.edu  | O Siem / The fires of freedom 
 Opinions not those of| Dance in the burning flame
 MIT, LCS, CRS, or NSA|                     - Susan Aglukark and Chad Irschick



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199707240230.TAA01483>