Date: Thu, 8 Jul 2004 05:48:37 -0700 (PDT) From: amith bc <amithbc_in@yahoo.com> To: "Dag-Erling_Smørgrav" <des@des.no> Cc: freebsd-questions@FreeBSD.org Subject: Re: free bsd4.4 lite Message-ID: <20040708124837.48978.qmail@web40412.mail.yahoo.com> In-Reply-To: <xzpk6xe94p7.fsf@dwp.des.no>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi, Thanks for your early response. But what about the solution for TCP reset spoofing? I also do not see any sequence number checking being done in the code I am using. The tcp_input.c that I am using is dated 8.12 (Berkeley) 5/24/95. Can you please help us in finding which BSD level/version this belongs to?As far as I know, we use FreeBSD4.4. Please correct us if we are wrong. And how is TCP Reset spoofing vulnerability taken care in BSD? Pl. refer this site which talks of this vulnerability. http://www.osvdb.org/displayvuln.php?osvdb_id=4030. Related issue to this is http://www.osvdb.org/displayvuln.php?osvdb_id=6094 for which BSD has given patches. Please help as this is critical to our project. Regards, Amith --- Dag-Erling_Smørgrav <des@des.no> wrote: > amith bc <amithbc_in@yahoo.com> writes: > > We have ported TCP/IP Stack from FreeBSD4.4 Lite > to OS/2. > > There is no such thing as FreeBSD 4.4 Lite. > > DES > -- > Dag-Erling Smørgrav - des@des.no > __________________________________ Do you Yahoo!? Read only the mail you want - Yahoo! Mail SpamGuard. http://promotions.yahoo.com/new_mail
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040708124837.48978.qmail>