From owner-freebsd-current Tue May 21 13:52:03 1996 Return-Path: owner-current Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id NAA28640 for current-outgoing; Tue, 21 May 1996 13:52:03 -0700 (PDT) Received: from tfs.com (tfs.com [140.145.250.1]) by freefall.freebsd.org (8.7.3/8.7.3) with SMTP id NAA28603 for ; Tue, 21 May 1996 13:52:00 -0700 (PDT) Received: from critter.tfs.com by tfs.com (smail3.1.28.1) with SMTP id m0uLyPN-0003whC; Tue, 21 May 96 13:51 PDT Received: from critter.tfs.com (localhost [127.0.0.1]) by critter.tfs.com (8.7.5/8.6.12) with ESMTP id UAA00209; Tue, 21 May 1996 20:51:51 GMT To: Garrett Wollman cc: "Brett L. Hawn" , current@freebsd.org Subject: Re: freebsd + synfloods + ip spoofing In-reply-to: Your message of "Tue, 21 May 1996 11:27:29 -0400." <9605211527.AA32609@halloran-eldar.lcs.mit.edu> Date: Tue, 21 May 1996 20:51:49 +0000 Message-ID: <207.832711909@critter.tfs.com> From: Poul-Henning Kamp Sender: owner-current@freebsd.org X-Loop: FreeBSD.org Precedence: bulk > < sai d: > > > For kicks some time ago I built a spoofer and I can tell you this much, > > creating at least a pseudo-random number generator for sequencing will stop > > a large # of the spoofers. > > Which is why this was introduced in FreeBSD many months ago. Well, we don't use it for TCP yet do we ? Mark ? -- Poul-Henning Kamp | phk@FreeBSD.ORG FreeBSD Core-team. http://www.freebsd.org/~phk | phk@login.dknet.dk Private mailbox. whois: [PHK] | phk@ref.tfs.com TRW Financial Systems, Inc. Future will arrive by its own means, progress not so.