From owner-freebsd-questions Mon Jan 27 03:10:34 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id DAA01134 for questions-outgoing; Mon, 27 Jan 1997 03:10:34 -0800 (PST) Received: from smtp.connectnet.com (smtp.connectnet.com [207.110.0.12]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id DAA01127; Mon, 27 Jan 1997 03:10:30 -0800 (PST) Received: from wink.connectnet.com (Studded@wink.connectnet.com [206.251.156.23]) by smtp.connectnet.com (8.8.4/Connectnet-2.2) with SMTP id DAA17834; Mon, 27 Jan 1997 03:11:19 -0800 (PST) Message-Id: <199701271111.DAA17834@smtp.connectnet.com> From: "That Doug Guy" To: "FreeBSD Security" , "FreeBSD Questions" Date: Mon, 27 Jan 97 03:08:39 -0800 Reply-To: "That Doug Guy" Priority: Normal X-Mailer: That Doug Guy's Registered PMMail 1.53 For OS/2 MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Subject: 2.2+ and sequence number guessing Sender: owner-questions@freebsd.org X-Loop: FreeBSD.org Precedence: bulk [Cross-posted to security and questions. Feel free to trim responses to the most appropriate group, I am subscribed to both.] Howdy, :) I have been doing some research on the security of various *nix's, and found some very interesting discussion in the mail archives regarding the security of freebsd vs. a sequence number guessing IP spoof attack. Without rehashing what seemed to be a rather heated discussion last spring, I am wondering if someone could fill me in on any changes, improvements, etc. that have been made in 2.2 regarding this problem. Also, if someone could highlight the changes regarding security against syn flooding promised in 2.2, it would help. Of course, if this information is already available on line, a pointer to it would be appreciated. Thank you, Doug