[70396] in North American Network Operators' Group
Re: Cisco's Statement about IPR Claimed in draft-ietf-tcpm-tcpsecure
daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Thu May 13 11:51:19 2004
To: Todd Vierling <tv@duh.org>
Cc: nanog@merit.edu
In-Reply-To: Your message of "Wed, 12 May 2004 21:51:53 EDT."
<Pine.NEB.4.58.0405122134560.9034@server.duh.org>
From: Valdis.Kletnieks@vt.edu
Date: Thu, 13 May 2004 11:50:39 -0400
Errors-To: owner-nanog-outgoing@merit.edu
--==_Exmh_-851755877P
Content-Type: text/plain; charset=us-ascii
On Wed, 12 May 2004 21:51:53 EDT, Todd Vierling <tv@duh.org> said:
> Gimme a break. This text is a half-baked concoction at best if the next
> draft still doesn't mention port randomization as a cheap and effective
> mitigator for external attack attempts. You can get at least 14 bits of
> entropy for one lousy arc4random() call. Enter as often as you like. No
> purchase required.
>
> With this and the patent funny business, I don't know if I can roll my eyes
> any further into the back of my head.
Well.. you have to remember that we live in an environment where people
are *just* noticing that RFC793 says "The RST has to be in the window,
not dead on"... and apparently overnight somebody has re-discovered the
fact that CSMA/CA networks will fall over if somebody starts jabbering:
http://www.auscert.org.au/render.html?it=4091
--==_Exmh_-851755877P
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001
iD8DBQFAo5lPcC3lWbTT17ARAuCAAJ4unXT5ngC+zJVbycZOHuZ+CuhFuQCfbXLw
mZw5u+J/TRqZ/pYWDSOMs9Q=
=FYKF
-----END PGP SIGNATURE-----
--==_Exmh_-851755877P--