From owner-freebsd-current Wed May 22 14:04:20 1996 Return-Path: owner-current Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id OAA27353 for current-outgoing; Wed, 22 May 1996 14:04:20 -0700 (PDT) Received: from apocalypse.superlink.net (root@apocalypse.superlink.net [205.246.27.150]) by freefall.freebsd.org (8.7.3/8.7.3) with ESMTP id OAA27337 for ; Wed, 22 May 1996 14:04:14 -0700 (PDT) Received: (from marxx@localhost) by apocalypse.superlink.net (8.7.5/8.7.3) id NAA03892; Wed, 22 May 1996 13:13:10 -0400 (EDT) Date: Wed, 22 May 1996 13:13:09 -0400 (EDT) From: "Charles C. Figueiredo" To: "Brett L. Hawn" cc: Paul Traina , Garrett Wollman , Poul-Henning Kamp , current@FreeBSD.ORG Subject: Re: freebsd + synfloods + ip spoofing In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-current@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk On Wed, 22 May 1996, Brett L. Hawn wrote: > On Wed, 22 May 1996, Charles C. Figueiredo wrote: > > > You may be right, but other implementations don't randomize on every > > connection either. FreeBSD, at the moment, just has what other > > implementations have wrong. > > > > So we're to say 'well, they're wrong so its ok for us to be' ? I think not > > Brett > > Of course not! The only point I was touching on, is the fact that you were wrong in making FreeBSD's implementation seem archaic and extremely insecure in comparison to others. Which it isn't. Marxx