[3675] in linux-net channel archive

home help back first fref pref prev next nref lref last post

sequence numbers

daemon@ATHENA.MIT.EDU (Craig Brozefsky)
Sat Jul 13 21:14:06 1996

Date: 	Fri, 12 Jul 1996 19:27:57 -0500 (CDT)
From: Craig Brozefsky <cosmo@ebs.net>
To: linux-net@vger.rutgers.edu


Out of curiosity how does the linux kernel generate it's initial sequence 
number for a socket connection?  Is it like most Berkeley derived ones 
with incriment at 128 microseconds + 64 per connection, or does it follow 
the specifications of RFC 793?

Also are there any known holes in the ipfirewall.c code that has been 
incorporated into the linux kernel for masquerading and filtering 
purposes?   I know they took care of the fragmentation problem, but are 
their other known types of attacks?

Craig Brozefsky				cosmo@ebs.net
System Administrator			vox: 312-226-1675
EBS.NET					fax: 312-226-1677
Network Consulting			http://www.ebs.net



home help back first fref pref prev next nref lref last post