At 11:15 a.m. 02/09/2008, coderman wrote:

>On Tue, Sep 2, 2008 at 2:06 AM, Fernando Gont <[EMAIL PROTECTED]> wrote:
> > ... there's no description of what Windows does
>
>some things speak for themselves... :)

What speaks for itself?

Our work is a proposal for a few alternatives for doing port 
randomization. Two of them are new, and are supposed to avoid some of 
the problems that are usually caused by a trivial port randomization 
algorithm (e.g., algorithm #1 and algorithm #2). Full stop. We simply 
provide a small survey in case you ask yourself "what is being done 
out there" by popular TCP implementations. The survey is simply an 
appendix, and was added as I was examining the Linux and *BSD code myself.



> > Also, the base Linux system already implements Algorithm #3... why
> > ... patch
>
>if you seed/key #3 poorly, as just one example. (which you reference
>via RFC4086, etc)

If algorithm #3 is seeded poorly, then I think you should document 
it, and send a patch so that that problem is fixed in the base system.



> > P.S.: The "survey" section must be about 1% of the document. I'd be glad to
> > hear comments on the rest of the document.
>
>sure...  section #4 should be:
>s/should consider randomizing/must randomize/

If anything, it should be "should randomize". "MUSTs" are meant to 
mandate specific behaviors/rules that, if not  followed, would lead 
to interoperability problems.


--
Fernando Gont
e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED]
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1




_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to