Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 12 Oct 2001 10:37:57 -0500 (CDT)
From:      Mike Silbersack <silby@silby.com>
To:        Radoy Pavlov <pavlov@euroscript-ls.de>
Cc:        <freebsd-security@freebsd.org>
Subject:   Re: Randomizing TCP sequence
Message-ID:  <20011012103330.F29732-100000@achilles.silby.com>
In-Reply-To: <3BC6D445.27C078CF@euroscript-ls.de>

next in thread | previous in thread | raw e-mail | index | archive | help


On Fri, 12 Oct 2001, Radoy Pavlov wrote:

> I'm trying to randomize my tcp sequence. Upon
> experimenting with portsentry i made couple of
> nmap scans and I was suprized to see that the
> value never exceeds the number of 30, which IMO
> is weak. I activated net.inet.tcp.strict_rfc1948=1,
> which should do the randomizing, still i get a
> value of 30 or so.

Scan your box from another box; there's something funky with nmaping
localhost.  When I try it, nmap says that there aren't enough responses
for a good identification.  Alternately, run tcpdump and watch the
sequence numbers; the output is quite pseudo-random.

Mike "Silby" Silbersack


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011012103330.F29732-100000>