Date: Sat, 12 Feb 2005 16:27:43 -0500 (EST) From: Garrett Wollman <wollman@khavrinen.lcs.mit.edu> To: Andre Oppermann <oppermann@networx.ch> Cc: freebsd-current@FreeBSD.ORG Subject: Re: known TCP vulnerability ?? Message-ID: <200502122127.j1CLRhJ6018329@khavrinen.lcs.mit.edu> In-Reply-To: <420D1344.9DAC70D0@networx.ch> References: <00CDF9AA240E204FA6E923BD35BC64360879060E@bcs-mail.internal.cacheflow.com> <420D1344.9DAC70D0@networx.ch>
next in thread | previous in thread | raw e-mail | index | archive | help
<<On Fri, 11 Feb 2005 21:19:16 +0100, Andre Oppermann <oppermann@networx.ch> said: > "Li, Qing" wrote: >> Ran the packet tests against FreeBSD 5.3 and 6-CURRENT and both >> respond to the SYN+FIN packets with SYN+ACK. > This is expected behaviour because of FreeBSD used to implement T/TCP > according to RFC1644. Actually, it is expected behavior because FreeBSD used to implement TCP according to RFC 793. -GAWollman
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200502122127.j1CLRhJ6018329>