[69859] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: TCP RST attack (the cause of all that MD5-o-rama)

daemon@ATHENA.MIT.EDU (E.B. Dreger)
Wed Apr 21 00:57:12 2004

Date: Wed, 21 Apr 2004 04:56:18 +0000 (GMT)
From: "E.B. Dreger" <eddy+public+spam@noc.everquick.net>
To: "Patrick W.Gilmore" <patrick@ianai.net>
Cc: nanog@merit.edu
In-Reply-To: <E427C809-9321-11D8-B101-000A9578BB58@ianai.net>
Errors-To: owner-nanog-outgoing@merit.edu


PWG> Date: Tue, 20 Apr 2004 19:24:37 -0400
PWG> From: Patrick W. Gilmore


PWG> Speaking of good randomization, does anyone have a good
PWG> algorithm to randomize ephemeral ports?  Obviously "pick
PWG> random number, see if port is open, if it is, repeat" is not
PWG> a good idea, especially on a busy host with lots of
PWG> connections.  I was thinking something like "pick 65K
PWG> random numbers on boot, store in file/array, cycle through".

I don't think we're even that far along.  If I'm reading FreeBSD
4.9 and NetBSD 1.6.2 source correctly,

	/usr/src/sys/netinet/in_pcb.c

tells all.


PWG> Does anyone know if / how modern OSes randomize ephemeral
PWG> ports?

AFAIK, sequential search is about it.  Try a port number, verify
that the src/dist ip+port combination is available, then go on to
the next lport if the guessed one is in use.


Eddy
--
EverQuick Internet - http://www.everquick.net/
A division of Brotsman & Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita


home help back first fref pref prev next nref lref last post