From owner-freebsd-security Thu Jun 5 22:15:45 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id WAA28011 for security-outgoing; Thu, 5 Jun 1997 22:15:45 -0700 (PDT) Received: from mailserv.tversu.ac.ru (vadim@mailserv.tversu.ac.ru [193.233.128.3]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id WAA28000 for ; Thu, 5 Jun 1997 22:15:34 -0700 (PDT) Received: (from vadim@localhost) by mailserv.tversu.ac.ru (8.8.5/8.8.5) id JAA02523; Fri, 6 Jun 1997 09:15:37 +0400 (MSD) Message-ID: <19970606091536.08429@tversu.ac.ru> Date: Fri, 6 Jun 1997 09:15:36 +0400 From: Vadim Kolontsov To: security@FreeBSD.ORG Subject: Re: sequence predictability (fwd) References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 0.74 In-Reply-To: ; from Robert N Watson on Thu, Jun 05, 1997 at 09:26:31AM -0400 Sender: owner-security@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk On Thu, Jun 05, 1997 at 09:26:31AM -0400, Robert N Watson wrote: > > Having seen this post on the ntbugtraq mailing list, I was wondering how > preditcabkle sequence numbers in FreeBSD TCP connections were.. And is > this an accurate measurement? > > Thanks > How about implementing random choosing of start TCP sequence number? Of course, it need crypotographicaly strong random numbers generator.. I think it will help a lot against TCP seq.numbers predictability attacks.. Best regards sb -------------------------------------------------------------------------- Vadim Kolontsov SysAdm/Programmer Tver Regional Center of New Information Technologies Networks Lab