Thanks for your early response.
But what about the solution for TCP reset spoofing?
I also do not see any sequence number checking being
done in the code I am using. The tcp_input.c that I am
using is dated  8.12 (Berkeley) 5/24/95. Can you
please help us in finding which BSD level/version this
belongs to?As far as I know, we use FreeBSD4.4.
Please correct us if we are wrong.

And how is TCP Reset spoofing vulnerability taken care
in BSD? Pl. refer this site which talks of this
Related issue to this is
http://www.osvdb.org/displayvuln.php?osvdb_id=6094 for
which BSD has given patches. Please help as this is
critical to our project.


--- Dag-Erling_Smørgrav <[EMAIL PROTECTED]> wrote:
> amith bc <[EMAIL PROTECTED]> writes:
> > We have ported TCP/IP Stack from FreeBSD4.4 Lite
> to OS/2.
> There is no such thing as FreeBSD 4.4 Lite.
> -- 
> Dag-Erling Smørgrav - [EMAIL PROTECTED]

Do you Yahoo!?
Read only the mail you want - Yahoo! Mail SpamGuard.
[EMAIL PROTECTED] mailing list
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to