Hi,
Thanks for your early response.
But what about the solution for TCP reset spoofing?
I also do not see any sequence number checking being
done in the code I am using. The tcp_input.c that I am
using is dated  8.12 (Berkeley) 5/24/95. Can you
please help us in finding which BSD level/version this
belongs to?As far as I know, we use FreeBSD4.4.
Please correct us if we are wrong.

And how is TCP Reset spoofing vulnerability taken care
in BSD? Pl. refer this site which talks of this
vulnerability.
http://www.osvdb.org/displayvuln.php?osvdb_id=4030.
Related issue to this is
http://www.osvdb.org/displayvuln.php?osvdb_id=6094 for
which BSD has given patches. Please help as this is
critical to our project.

Regards,
Amith



--- Dag-Erling_Smørgrav <[EMAIL PROTECTED]> wrote:
> amith bc <[EMAIL PROTECTED]> writes:
> > We have ported TCP/IP Stack from FreeBSD4.4 Lite
> to OS/2.
> 
> There is no such thing as FreeBSD 4.4 Lite.
> 
> DES
> -- 
> Dag-Erling Smørgrav - [EMAIL PROTECTED]
> 



                
__________________________________
Do you Yahoo!?
Read only the mail you want - Yahoo! Mail SpamGuard.
http://promotions.yahoo.com/new_mail 
_______________________________________________
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to