Date: Mon, 20 Oct 2014 14:39:22 -0700 From: hiren panchasara <hiren@FreeBSD.org> To: Matthias Apitz <guru@unixarea.de>, freebsd-current <freebsd-current@freebsd.org>, "freebsd-net@freebsd.org" <freebsd-net@freebsd.org> Subject: Re: FreeBSD && TCP stealth Message-ID: <CALCpEUFY=OeUzqaCM5AUF%2BCr8uohbGp4tYzh_GivCQNXi8prkg@mail.gmail.com> In-Reply-To: <20141020082345.GA2040@unixarea.DDR.dd> References: <20141020072528.GA1748@unixarea.DDR.dd> <20141020082345.GA2040@unixarea.DDR.dd>
next in thread | previous in thread | raw e-mail | index | archive | help
I am not aware of any work but adding -net to get more "networking" eyeball= s. On Mon, Oct 20, 2014 at 1:23 AM, Matthias Apitz <guru@unixarea.de> wrote: > El d=C3=ADa Monday, October 20, 2014 a las 09:25:28AM +0200, Matthias Api= tz escribi=C3=B3: > >> >> Hello, >> >> Is there any work started or in progress to implement TCP stealth in our >> kernel as proposed to IETF in >> >> https://datatracker.ietf.org/doc/draft-kirsch-ietf-tcp-stealth/ >> >> The idea is that the client put some magic value in the ISN of the first >> SYN pkg which is derived from a secret the client and the server share. >> The server can check the ISN and decide if it will answer the SYN pkg or >> do a RST, for example. > > For Linux wip see also: https://gnunet.org/knock > > matthias > -- > Matthias Apitz | /"\ ASCII Ribbon Campaign: > E-mail: guru@unixarea.de | \ / - No HTML/RTF in E-mail > WWW: http://www.unixarea.de/ | X - No proprietary attachments > phone: +49-170-4527211 | / \ - Respect for open standards > | en.wikipedia.org/wiki/ASCII_Ribbon_Campaig= n > _______________________________________________ > freebsd-current@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org= "
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CALCpEUFY=OeUzqaCM5AUF%2BCr8uohbGp4tYzh_GivCQNXi8prkg>