Date: Tue, 09 Dec 2014 16:28:43 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 195828] New: security/tor and security/tor-devel pkg-message for enabling random IP IDs Message-ID: <bug-195828-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=195828 Bug ID: 195828 Summary: security/tor and security/tor-devel pkg-message for enabling random IP IDs Product: Ports Tree Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: Normal Component: Individual Port(s) Assignee: bf@FreeBSD.org Reporter: george@nycbug.org Assignee: bf@FreeBSD.org Flags: maintainer-feedback?(bf@FreeBSD.org) There is significant concern in the Tor community (torproject.org) that there is a potential weakness in Tor relays that do not randomize IP IDs. FreeBSD by default does not enable randomized IP IDs. Adding this to the pkg-message would provide the simple steps to enable: For those concerned about the potential of traffic analysis with sequential IP ID numbers, you can enable randomized IP IDs on a running system with 'sysctl net.inet.ip.random=1'. To maintain this setting after reboots, add 'net.inet.ip.random=1' to /etc/sysctl.conf. --- Comment #1 from Bugzilla Automation <bugzilla@FreeBSD.org> --- Auto-assigned to maintainer bf@FreeBSD.org -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-195828-13>