[EMAIL PROTECTED] writes:

> Interesting. I thought I heard that Linux switched over to sequence
> numbers that were "more random" (e.g. to help defend against spoof
> attacks where the attacker does not receive the reply packets from the
> victim machine)
> 
> Perhaps I heard incorrectly, or maybe they just apply noise on
> a small scale (e.g. some noise < the 64000 step-size you mentioned). 

I'd heard that too, but to be honest, I just look over that code for
fun, and I haven't done this much lately.

BTW, I slightly mis-remembered how that particular counter is
incremented (in the BSD code).  The counter starts at 1 and is
incremented by 64000 every half-second, but it is also incremented by
64000 every time a new connection comes in.

This fact suggests that it is unlikely that the Netscraft people are
using this particular method to determine uptime.  Hmmm.


> Performance and practicality aside, completely random 32 bit sequence
> numbers would be a good thing, no? What does OpenBSD do?

Sort-of.  I think that starting off at a random place (on a per
session basis) would be a good idea, but after that I don't think that
you can be very random.  I don't think that you'd be very compliant
with RFC793 if you used completely random numbers all the time.

--kevin
-- 
Kevin D. Clark ([EMAIL PROTECTED]) |
Cetacean Networks, Inc.                            |   Give me a decent UNIX
Portsmouth, N.H. (USA)                             |  and I can move the world
[EMAIL PROTECTED] (PGP Key Available)       |






**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************

Reply via email to