A secure patch is work in progress thanks to precious advices from Solar Designer and Theo de Raadt. I'll send this patch to bugtraq when done. Please, if you are some good links about how to is possible to compute N for 'X^2 mod N' generator in real-time or links about others hard to predict RNG send me an email. antirez On Sat, Aug 07, 1999 at 09:58:10AM -0700, David Wagner wrote: > In article <19990806123911.A1147at_private>, > Salvatore Sanfilippo -antirez- <antirezat_private> wrote: > > i think that a consecutive IP id now can be considered > > a weakness in IP stacks. [...] Here is a patch for > > linux 2.0.36 [...] 'Truly random id' [...] > > Your patch isn't secure. It uses a weak pseudo-random number > generator to generate id's, and an attacker can just crack the > PRNG to predict what id's will be used in the future. > > I think you probably want to use /dev/urandom to generate your > IP id's, to prevent this attack. (Or use a variant of Bellovin's > RFC 1948, adapted to generate IP id's instead of TCP ISN's.) -- Salvatore Sanfilippo antirezat_private antirezat_private ALICOM snc Tel: +39-0871-403522 Fax: +39-0871-41960 Web: www.alicom.com try hping: http://www.kyuzz.org/antirez FreeSilviaBaraldiniFreeSilviaBaraldiniFreeSilviaBaraldiniFreeSilviaBarald
This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:55:56 PDT