Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 8 Jul 2004 05:48:37 -0700 (PDT)
From:      amith bc <amithbc_in@yahoo.com>
To:        "Dag-Erling_Smørgrav" <des@des.no>
Cc:        freebsd-questions@FreeBSD.org
Subject:   Re: free bsd4.4 lite
Message-ID:  <20040708124837.48978.qmail@web40412.mail.yahoo.com>
In-Reply-To: <xzpk6xe94p7.fsf@dwp.des.no>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi,
Thanks for your early response.
But what about the solution for TCP reset spoofing?
I also do not see any sequence number checking being
done in the code I am using. The tcp_input.c that I am
using is dated  8.12 (Berkeley) 5/24/95. Can you
please help us in finding which BSD level/version this
belongs to?As far as I know, we use FreeBSD4.4.
Please correct us if we are wrong.

And how is TCP Reset spoofing vulnerability taken care
in BSD? Pl. refer this site which talks of this
vulnerability.
http://www.osvdb.org/displayvuln.php?osvdb_id=4030.
Related issue to this is
http://www.osvdb.org/displayvuln.php?osvdb_id=6094 for
which BSD has given patches. Please help as this is
critical to our project.

Regards,
Amith



--- Dag-Erling_Smørgrav <des@des.no> wrote:
> amith bc <amithbc_in@yahoo.com> writes:
> > We have ported TCP/IP Stack from FreeBSD4.4 Lite
> to OS/2.
> 
> There is no such thing as FreeBSD 4.4 Lite.
> 
> DES
> -- 
> Dag-Erling Smørgrav - des@des.no
> 



		
__________________________________
Do you Yahoo!?
Read only the mail you want - Yahoo! Mail SpamGuard.
http://promotions.yahoo.com/new_mail 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040708124837.48978.qmail>