Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 19 May 2005 11:37:36 +0200
From:      Christian Brueffer <chris@unixpages.org>
To:        freebsd-net@freebsd.org
Subject:   tcp timestamp vulnerability?
Message-ID:  <20050519093736.GA932@unixpages.org>

next in thread | raw e-mail | index | archive | help

--d6Gm4EdcadzBjdND
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Hi,

has anyone taken a look at http://www.kb.cert.org/vuls/id/637934?

Apparently OpenBSD has a fix for this:

http://openbsd.org/errata36.html#tcp

- Christian

--=20
Christian Brueffer	chris@unixpages.org	brueffer@FreeBSD.org
GPG Key:	 http://people.freebsd.org/~brueffer/brueffer.key.asc
GPG Fingerprint: A5C8 2099 19FF AACA F41B  B29B 6C76 178C A0ED 982D

--d6Gm4EdcadzBjdND
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (FreeBSD)

iD8DBQFCjF5fbHYXjKDtmC0RAmZRAJ9GOn9hGkmOshKEZwGcUqOmBHJY9gCgiSdu
14G0cIUZOAvcC6flBp0DIVA=
=0v/A
-----END PGP SIGNATURE-----

--d6Gm4EdcadzBjdND--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050519093736.GA932>