Date: Sat, 7 Jul 2001 20:52:12 +0200 (MEST) From: Michael Nottebrock <MichaelNottebrock@gmx.net> To: freebsd-security@freebsd.org Subject: IPSEC & TCP sequence number generation Message-ID: <1199.994531932@www25.gmx.net>
next in thread | raw e-mail | index | archive | help
This is a MIME encapsulated multipart message - please use a MIME-compliant e-mail program to open it. Dies ist eine mehrteilige Nachricht im MIME-Format - bitte verwenden Sie zum Lesen ein MIME-konformes Mailprogramm. --========GMXBoundary1199994531932 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit I recently recompiled my FreeBSD 4.3-STABLE kernel with options IPSEC options IPSEC_ESP options IPSEC_DEBUG in order to experiment with a IPSEC-VPN. When I scanned myself from a few remote machines today, I noticed that nmap -O reports a tcp sequence prediction class "trivial time dependency", difficulty=0 (trivial joke), before enabling IPSEC it used to be all 9's. Has anyone else experienced this? Have I overlooked something or is this normal behaviour? Greetings, Michael Nottebrock -- GMX - Die Kommunikationsplattform im Internet. http://www.gmx.net GMX Tipp: Machen Sie Ihr Hobby zu Geld bei unserem Partner 1&1! http://profiseller.de/info/index.php3?ac=OM.PS.PS003K00596T0409a --========GMXBoundary1199994531932 Content-Type: application/octet-stream; name=" " Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename=" " --========GMXBoundary1199994531932-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1199.994531932>