Date: Fri, 12 Oct 2001 13:30:13 +0200 From: Radoy Pavlov <pavlov@euroscript-ls.de> To: freebsd-security@freebsd.org Subject: Randomizing TCP sequence Message-ID: <3BC6D445.27C078CF@euroscript-ls.de>
next in thread | raw e-mail | index | archive | help
Hello, I'm trying to randomize my tcp sequence. Upon experimenting with portsentry i made couple of nmap scans and I was suprized to see that the value never exceeds the number of 30, which IMO is weak. I activated net.inet.tcp.strict_rfc1948=1, which should do the randomizing, still i get a value of 30 or so. Are there any particular steps that could be taken to make this happen ? cheers, Radoy To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3BC6D445.27C078CF>