TCP RST attack

Jacques A. Vidrine nectar at FreeBSD.org
Wed Apr 21 04:51:35 PDT 2004


On Tue, Apr 20, 2004 at 01:32:40PM -0700, Dragos Ruiu wrote:
> Also keep in mind ports are predictable to varying degrees depending on
> the vendor or OS, which further reduces the brute force space you have to 
> go though without sniffing. 

This is exactly why I ported OpenBSD's TCP ephemeral port allocation
randomization to FreeBSD-CURRENT (although I asked Mike Silby to commit
it for me and take the blame if it broke :-).  It will also be MFC'd
shortly in time for 4.10-RELEASE.

Cheers,
-- 
Jacques Vidrine / nectar at celabo.org / jvidrine at verio.net / nectar at freebsd.org


More information about the freebsd-security mailing list