Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 21 May 1996 10:39:08 -0500 (CDT)
From:      "Brett L. Hawn" <blh@nol.net>
To:        Garrett Wollman <wollman@lcs.mit.edu>
Cc:        current@FreeBSD.ORG
Subject:   Re: freebsd + synfloods + ip spoofing
Message-ID:  <Pine.SOL.3.93.960521103733.26710B-100000@dazed.nol.net>
In-Reply-To: <9605211527.AA32609@halloran-eldar.lcs.mit.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 21 May 1996, Garrett Wollman wrote:

> <<On Tue, 21 May 1996 07:21:14 -0500 (CDT), "Brett L. Hawn" <blh@nol.net> said:
> 
> > For kicks some time ago I built a spoofer and I can tell you this much,
> > creating at least a pseudo-random number generator for sequencing will stop
> > a large # of the spoofers.
> 
> Which is why this was introduced in FreeBSD many months ago.

You'll have to pardon me if I don't see it, as part of the discussion we
played with my spoofing utility and I found 2.2 -current just as easy to
spoof as 2.0.5. I tried to spoof 3 linux boxes, 2 Solaris boxes, and one
HP-UX box, all of which failed miserably, this tells me something very
important.. the sequencing routines are still very easy to guess.

Brett




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.SOL.3.93.960521103733.26710B-100000>