[13798] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Random Sequence Numbers

daemon@ATHENA.MIT.EDU (Peter Jeremy)
Thu Feb 10 17:52:45 2000

Content-Return: prohibited
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <00Feb10.090608est.115219@border.alcanet.com.au>
Date:         Thu, 10 Feb 2000 09:06:08 +1100
Reply-To: Peter Jeremy <peter.jeremy@ALCATEL.COM.AU>
From: Peter Jeremy <peter.jeremy@ALCATEL.COM.AU>
X-To:         Omachonu Ogali <oogali@intranova.net>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.BSF.4.10.10002082258090.36875-100000@hydrant.intranova.net>; from oogali@intranova.net on Wed,
              Feb 09, 2000 at 08:27:08PM +1100

On 2000-Feb-09 20:27:08 +1100, Omachonu Ogali <oogali@intranova.net> wrote:
>I don't know if anyone else attempted, but I whipped up a little patch for
>FreeBSD that randomizes the sequence/acknowledgment numbers sent by TCP
>instead of incrementing it by one each time. Apply using 'patch'.

Note that the patch is using libkern/random().  This function is a
simple, multiplicative PNRG with 32-bits of state (all of which is
`leaked' via its return value.  Whilst the change might be better than
a simple increment/decrement, I don't believe it provides any real
security (especially in view of the %=2 operations).

Peter

home help back first fref pref prev next nref lref last post