Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 2 Nov 2000 14:55:39 -0500
From:      Bill Fumerola <billf@chimesnet.com>
To:        stable@freebsd.org
Cc:        Lauri Laupmaa <mauri@aripaev.ee>
Subject:   Re: TCP sequence prediction on freebsd
Message-ID:  <20001102145539.Z37870@jade.chc-chimes.com>
In-Reply-To: <20001102113247.A13873@dragon.nuxi.com>; from obrien@freebsd.org on Thu, Nov 02, 2000 at 11:32:47AM -0800
References:  <8E67E032AD23D4118F740050042F21F76F@lant.mbp.ee> <20001102113247.A13873@dragon.nuxi.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Nov 02, 2000 at 11:32:47AM -0800, David O'Brien wrote:
> On Thu, Nov 02, 2000 at 02:12:05PM +0200, Lauri Laupmaa wrote:
> > nmap reports something like:
> > > TCP Sequence Prediction: Class=random positive increments
> > >                          Difficulty=85682 (Worthy challenge)
> > 
> > is this tcp sequence prediction really an security issue ?
> 
> **YES**  Do a search for the Mitnick attack on Tsutomu Shimomura.  It was
> possible because of the ability to predict the TCP sequence numbers.

The question was if "_this_" prediction is really a securit issue (ie FreeBSD's),
not if tcp sequence prediction in general is a security issue.

At least that's how I read it.

-- 
Bill Fumerola - Network Architect, BOFH / Chimes, Inc.
                billf@chimesnet.com / billf@FreeBSD.org





To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-stable" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001102145539.Z37870>