Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 21 May 1996 10:49:36 -0500 (CDT)
From:      "Brett L. Hawn" <blh@nol.net>
To:        Garrett Wollman <wollman@lcs.mit.edu>
Cc:        current@FreeBSD.ORG
Subject:   Re: freebsd + synfloods + ip spoofing
Message-ID:  <Pine.SOL.3.93.960521104738.27243A-100000@dazed.nol.net>
In-Reply-To: <9605211544.AA32102@halloran-eldar.lcs.mit.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 21 May 1996, Garrett Wollman wrote:

> <<On Tue, 21 May 1996 10:39:08 -0500 (CDT), "Brett L. Hawn" <blh@nol.net> said:
> 
> > You'll have to pardon me if I don't see it, as part of the discussion we
> > played with my spoofing utility and I found 2.2 -current just as easy to
> > spoof as 2.0.5.
> 
> Presumably your burglars' tools already have knowledge of the 4.4 RNG.
> 

Actually no, I haven't updated the program in some months, its remained
pretty much static since 2.1 was released. Basically fbsd'd sequencing is
too easy to match.

Brett




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.SOL.3.93.960521104738.27243A-100000>