[3675] in linux-net channel archive
sequence numbers
daemon@ATHENA.MIT.EDU (Craig Brozefsky)
Sat Jul 13 21:14:06 1996
Date: Fri, 12 Jul 1996 19:27:57 -0500 (CDT)
From: Craig Brozefsky <cosmo@ebs.net>
To: linux-net@vger.rutgers.edu
Out of curiosity how does the linux kernel generate it's initial sequence
number for a socket connection? Is it like most Berkeley derived ones
with incriment at 128 microseconds + 64 per connection, or does it follow
the specifications of RFC 793?
Also are there any known holes in the ipfirewall.c code that has been
incorporated into the linux kernel for masquerading and filtering
purposes? I know they took care of the fragmentation problem, but are
their other known types of attacks?
Craig Brozefsky cosmo@ebs.net
System Administrator vox: 312-226-1675
EBS.NET fax: 312-226-1677
Network Consulting http://www.ebs.net