Date: Tue, 21 May 1996 10:49:36 -0500 (CDT) From: "Brett L. Hawn" <blh@nol.net> To: Garrett Wollman <wollman@lcs.mit.edu> Cc: current@FreeBSD.ORG Subject: Re: freebsd + synfloods + ip spoofing Message-ID: <Pine.SOL.3.93.960521104738.27243A-100000@dazed.nol.net> In-Reply-To: <9605211544.AA32102@halloran-eldar.lcs.mit.edu>
index | next in thread | previous in thread | raw e-mail
On Tue, 21 May 1996, Garrett Wollman wrote: > <<On Tue, 21 May 1996 10:39:08 -0500 (CDT), "Brett L. Hawn" <blh@nol.net> said: > > > You'll have to pardon me if I don't see it, as part of the discussion we > > played with my spoofing utility and I found 2.2 -current just as easy to > > spoof as 2.0.5. > > Presumably your burglars' tools already have knowledge of the 4.4 RNG. > Actually no, I haven't updated the program in some months, its remained pretty much static since 2.1 was released. Basically fbsd'd sequencing is too easy to match. Bretthome | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.SOL.3.93.960521104738.27243A-100000>
