Randomizing TCP sequence

From: Radoy Pavlov (pavlov@euroscript-ls.de)
Date: 10/12/01

Date: Fri, 12 Oct 2001 13:30:13 +0200
From: Radoy Pavlov <pavlov@euroscript-ls.de>
To: freebsd-security@freebsd.org


I'm trying to randomize my tcp sequence. Upon
experimenting with portsentry i made couple of
nmap scans and I was suprized to see that the
value never exceeds the number of 30, which IMO
is weak. I activated net.inet.tcp.strict_rfc1948=1,
which should do the randomizing, still i get a
value of 30 or so.

Are there any particular steps that could be taken
to make this happen ?

cheers, Radoy

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message

Relevant Pages