Date: Wed, 30 Apr 2003 16:05:39 -0700 From: "Crist J. Clark" <crist.clark@attbi.com> To: "."@babolo.ru Cc: net@FreeBSD.org Subject: Re: Reducing ip_id information leakage Message-ID: <20030430230539.GB3912@blossom.cjclark.org> In-Reply-To: <1051741424.259802.1572.nullmailer@cicuta.babolo.ru> References: <200304302142.h3ULgZ0i056433@khavrinen.lcs.mit.edu> <1051741424.259802.1572.nullmailer@cicuta.babolo.ru>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, May 01, 2003 at 02:23:44AM +0400, "."@babolo.ru wrote: > > <<On Wed, 30 Apr 2003 16:35:24 -0500 (CDT), Mike Silbersack <silby@silby.com> said: [snip] > > The trouble is that we need sequences that are guaranteed not to > > repeat too fast -- and even then we'll still break on modern networks > > anyway, as I noted in my comment. > Why not to use 16 bit of 32 bit pseudorandom generator? Uhh... I might be missing a joke here, but the problem is that after you put 65536 packets onto the wire, the next one _must_ have a repeated IP ID (since there are only 65536 possible). Choosing a random IP ID only can make this problem worse. As many of the references perviously discussed or a very simple calculation on your own will show, with a perfect random generator, after about 300 packets, there is a 50-50 chance the next packet's IP ID will collide (good ol' "birthday paradox"). -- Crist J. Clark | cjclark@alum.mit.edu | cjclark@jhu.edu http://people.freebsd.org/~cjc/ | cjc@freebsd.org
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030430230539.GB3912>