Date: 20 Feb 2000 12:12:40 -0500 From: Lowell Gilbert <lowell@world.std.com> To: Omachonu Ogali <oogali@intranova.net>, freebsd-security@freebsd.org Subject: Re: Random Sequence Numbers Message-ID: <rd6hff3yf07.fsf@world.std.com> In-Reply-To: Omachonu Ogali's message of Sun, 20 Feb 2000 10:58:22 -0500 (EST) References: <Pine.BSF.4.10.10002201057450.49727-100000@hydrant.intranova.net>
next in thread | previous in thread | raw e-mail | index | archive | help
Omachonu Ogali <oogali@intranova.net> writes: > That was dropped a while ago and I saw that post Steven did, and secondly > Dan told me he's done it already so there was no need to go on as it was > only about 4-5 lines of code. Actually, what Dan had done was randomizing the *initial* sequence numbers in a TCP session, as (in fact) Bellovin described in RFC 1948. What *your* code did was randomize *every* packet's sequence number. I still insist on believing that you had to be kidding, because the idea and the execution both qualify among the best spoofs I've seen in weeks. - Lowell Gilbert To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?rd6hff3yf07.fsf>