Date: Tue, 21 Aug 2001 19:59:20 -0700 From: Kris Kennaway <kris@obsecurity.org> To: Mike Silbersack <silby@FreeBSD.org> Cc: cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: Re: cvs commit: src/sys/netinet tcp_input.c tcp_seq.h tcp_subr.c tcp_timer.c tcp_usrreq.c tcp_var.h Message-ID: <20010821195920.A23850@xor.obsecurity.org> In-Reply-To: <200108220058.f7M0wGf97070@freefall.freebsd.org>; from silby@FreeBSD.org on Tue, Aug 21, 2001 at 05:58:16PM -0700 References: <200108220058.f7M0wGf97070@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--3V7upXqbjpZ4EhLz Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Tue, Aug 21, 2001 at 05:58:16PM -0700, Mike Silbersack wrote: > silby 2001/08/21 17:58:16 PDT >=20 > Modified files: > sys/netinet tcp_input.c tcp_seq.h tcp_subr.c=20 > tcp_timer.c tcp_usrreq.c tcp_var.h=20 > Log: > Much delayed but now present: RFC 1948 style sequence numbers Yay! > In order to ensure security and functionality, RFC 1948 style > initial sequence number generation has been implemented. Barring > any major crypographic breakthroughs, this algorithm should be > unbreakable. Except by brute force. A 32-bit sequence number just isn't naturally very resistent to guessing, and on a fast connection, under favourable circumstances, an attacker could simply cycle through them all. Kris --3V7upXqbjpZ4EhLz Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE7gyAIWry0BWjoQKURAngFAKC55ZJ/2g9ZU+ZfOqLIf6e0SGUmzgCfU9dk JcRwHtxLwkhpmGPZWDi7Nn0= =6zwV -----END PGP SIGNATURE----- --3V7upXqbjpZ4EhLz-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010821195920.A23850>