Full Disclosure mailing list archives

Re: Port Randomization: New revision of our IETF Internet-Draft


From: Fernando Gont <fernando.gont () gmail com>
Date: Tue, 02 Sep 2008 15:30:48 -0300

At 11:15 a.m. 02/09/2008, coderman wrote:

On Tue, Sep 2, 2008 at 2:06 AM, Fernando Gont <fernando.gont () gmail com> wrote:
... there's no description of what Windows does

some things speak for themselves... :)

What speaks for itself?

Our work is a proposal for a few alternatives for doing port 
randomization. Two of them are new, and are supposed to avoid some of 
the problems that are usually caused by a trivial port randomization 
algorithm (e.g., algorithm #1 and algorithm #2). Full stop. We simply 
provide a small survey in case you ask yourself "what is being done 
out there" by popular TCP implementations. The survey is simply an 
appendix, and was added as I was examining the Linux and *BSD code myself.



Also, the base Linux system already implements Algorithm #3... why
... patch

if you seed/key #3 poorly, as just one example. (which you reference
via RFC4086, etc)

If algorithm #3 is seeded poorly, then I think you should document 
it, and send a patch so that that problem is fixed in the base system.



P.S.: The "survey" section must be about 1% of the document. I'd be glad to
hear comments on the rest of the document.

sure...  section #4 should be:
s/should consider randomizing/must randomize/

If anything, it should be "should randomize". "MUSTs" are meant to 
mandate specific behaviors/rules that, if not  followed, would lead 
to interoperability problems.


--
Fernando Gont
e-mail: fernando () gont com ar || fgont () acm org
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1




_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: