[461] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: How bad is this?

daemon@ATHENA.MIT.EDU (Mike Duvos)
Wed Apr 2 09:56:39 1997

From: mpd@netcom.com (Mike Duvos)
To: cryptography@c2.net
Date: Tue, 1 Apr 1997 22:42:28 -0800 (PST)
In-Reply-To: <9704020433.AA24559@nyx.net> from "Colin Plumb" at Apr 1, 97 09:33:02 pm

Colin Plumb writes:

> I've been trying to come up with a very fast, and not necessarily
> very secure hash function for TCP initial sequence number selection.

Why?  What does a strongly random initial sequence number buy you over the
conventional time-based variety? 

[The problem is sequence number attacks. Using hashes instead of
 conventional time based sequence numbers defends against this. You don't
 want "random" sequence numbers -- you want separate spaces of sequences
 for each socket. See RFC1948 by Steve Bellovin for details. --Perry]

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     mpd@netcom.com     $    via Finger.                      $



home help back first fref pref prev next nref lref last post