Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 8 Jul 2004 09:03:11 -0400
From:      Craig Rodrigues <rodrigc@crodrigues.org>
To:        amith bc <amithbc_in@yahoo.com>
Cc:        freebsd-questions@FreeBSD.org
Subject:   Re: free bsd4.4 lite
Message-ID:  <20040708130311.GA69588@crodrigues.org>
In-Reply-To: <20040708124837.48978.qmail@web40412.mail.yahoo.com>
References:  <xzpk6xe94p7.fsf@dwp.des.no> <20040708124837.48978.qmail@web40412.mail.yahoo.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Jul 08, 2004 at 05:48:37AM -0700, amith bc wrote:
> And how is TCP Reset spoofing vulnerability taken care
> in BSD? Pl. refer this site which talks of this
> vulnerability.
> http://www.osvdb.org/displayvuln.php?osvdb_id=4030.
> Related issue to this is
> http://www.osvdb.org/displayvuln.php?osvdb_id=6094 for
> which BSD has given patches. Please help as this is
> critical to our project.


Do you work for IBM, or under contract to IBM?
I remember when I used OS/2 about 7 years ago that
the people at IBM in North Carolina had ported their TCP
stack from BSD Unix.  IBM's port may be earlier than when FreeBSD 4.4 was
released.  You may be using the "4.4 BSD Lite version", which would
map to FreeBSD 2.2 or so.

Look at: http://www.freebsd.org/cgi/cvsweb.cgi/src/share/misc/bsd-family-tree?rev=1.81 
for a comprehensive list of BSD versions out there.



For a CVS log of the FreeBSD version of the file which you are interested in,
look at:
http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet/tcp_input.c

There have been some TCP reset changes since FreeBSD 2.2 (which is quite
an old version).


-- 
Craig Rodrigues        
http://crodrigues.org
rodrigc@crodrigues.org



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040708130311.GA69588>