A secure patch is work in progress thanks to precious advices from Solar Designer and Theo de Raadt. I'll send this patch to bugtraq when done. Please, if you are some good links about how to is possible to compute N for 'X^2 mod N' generator in real-time or links about others hard to predict RNG send me an email. antirez On Sat, Aug 07, 1999 at 09:58:10AM -0700, David Wagner wrote: > In article <[EMAIL PROTECTED]>, > Salvatore Sanfilippo -antirez- <[EMAIL PROTECTED]> wrote: > > i think that a consecutive IP id now can be considered > > a weakness in IP stacks. [...] Here is a patch for > > linux 2.0.36 [...] 'Truly random id' [...] > > Your patch isn't secure. It uses a weak pseudo-random number > generator to generate id's, and an attacker can just crack the > PRNG to predict what id's will be used in the future. > > I think you probably want to use /dev/urandom to generate your > IP id's, to prevent this attack. (Or use a variant of Bellovin's > RFC 1948, adapted to generate IP id's instead of TCP ISN's.) -- Salvatore Sanfilippo [EMAIL PROTECTED] [EMAIL PROTECTED] ALICOM snc Tel: +39-0871-403522 Fax: +39-0871-41960 Web: www.alicom.com try hping: http://www.kyuzz.org/antirez FreeSilviaBaraldiniFreeSilviaBaraldiniFreeSilviaBaraldiniFreeSilviaBarald
Re: Linux blind TCP spoofing, act II + others
Salvatore Sanfilippo -antirez- Tue, 10 Aug 1999 23:20:36 -0700
- Linux blind TCP spoofing, act II + others Nergal
- Re: Linux blind TCP spoofing, act II +... Solar Designer
- Re: Linux blind TCP spoofing, act ... Alan Cox
- Re: Linux blind TCP spoofing, ... Solar Designer
- Re: Linux blind TCP spoofing, act II +... Salvatore Sanfilippo -antirez-
- Re: Linux blind TCP spoofing, act ... Theo de Raadt
- Re: Linux blind TCP spoofing, act ... David Wagner
- Salvatore Sanfilippo -antirez-