Hi, Thanks for your early response. But what about the solution for TCP reset spoofing? I also do not see any sequence number checking being done in the code I am using. The tcp_input.c that I am using is dated 8.12 (Berkeley) 5/24/95. Can you please help us in finding which BSD level/version this belongs to?As far as I know, we use FreeBSD4.4. Please correct us if we are wrong.
And how is TCP Reset spoofing vulnerability taken care in BSD? Pl. refer this site which talks of this vulnerability. http://www.osvdb.org/displayvuln.php?osvdb_id=4030. Related issue to this is http://www.osvdb.org/displayvuln.php?osvdb_id=6094 for which BSD has given patches. Please help as this is critical to our project. Regards, Amith --- Dag-Erling_Sm�rgrav <[EMAIL PROTECTED]> wrote: > amith bc <[EMAIL PROTECTED]> writes: > > We have ported TCP/IP Stack from FreeBSD4.4 Lite > to OS/2. > > There is no such thing as FreeBSD 4.4 Lite. > > DES > -- > Dag-Erling Sm�rgrav - [EMAIL PROTECTED] > __________________________________ Do you Yahoo!? Read only the mail you want - Yahoo! Mail SpamGuard. http://promotions.yahoo.com/new_mail _______________________________________________ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "[EMAIL PROTECTED]"
