Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security

TCP/IP Sequence Number Analysis 229

johnwbyrd writes "Upon connection via TCP/IP to a host, the host generates an Initial Sequence Number (ISN). It's important to design ISN generation sequences so remote attackers can't predict an ISN (this is called a "blind spoofing" attack). Using phase space analysis you can check the quality of ISNs generated on various OSes. Windows 98's graph is quite pretty."
This discussion has been archived. No new comments can be posted.

TCP/IP Sequence Number Analysis

Comments Filter:
  • by 56ker ( 566853 ) on Sunday June 30, 2002 @11:20AM (#3795589) Homepage Journal
    This is the first section:

    Table of Contents:


    0. Abstract
    1. Introduction
    1.1 TCP Sequence generation and PRNGs
    1.2 Spoofing Sets
    2. Phase Space Analysis, Attractors and ISN Guessing
    2.1 Introduction to Phase Space Analysis
    2.2 Using Attractors for Spoofing Set Construction
    2.3 Real-Life Attack Algorithms
    3. Review of Operating Systems
    3.1 Linux
    3.2 Windows
    3.3 Cisco IOS
    3.4 AIX
    3.5 FreeBSD and NetBSD
    3.6 OpenBSD
    3.7 HP/UX
    3.8 Solaris
    3.9 BSDI
    3.10 IRIX
    3.11 MacOS
    3.12 Multiple Network Devices
    3.13 Other PRNG issues
    4. Risk Analysis
    5. Conclusions
    6. References
    7. Credits


    Appendix A: Phase Space Images of Known Generating Functions

    Hopefully now only people who want to read it will click on the link!
  • by Anonymous Coward on Sunday June 30, 2002 @11:54AM (#3795728)
    1. Sensationalism
    "OMG Someone can guess the ISN number, We are all on our way to destruction"

    2. Geekiness
    "Wtf is an ISN number"

    3. M$ Bashing (Note the $ $ign it means I dissaprove of Microsofts Money Grubbing Ways (TM) [OMG another funny!!])
  • by linuxhack ( 413769 ) on Sunday June 30, 2002 @12:17PM (#3795831)
    So, in Neon Genesis Evangelion, when they discover the Eva "neutralizing the Phase Space", they are actually watching the Eva exploit the Angel's weak ISN via a TCP/IP connection? It all makes so much sense now.

    They manage to build bio-humanoid robots, but they can't write a decent random function. Go figure...
  • by Tusaki ( 252769 ) on Sunday June 30, 2002 @12:48PM (#3795969)
    I mean, really!
  • by Anonymous Coward on Sunday June 30, 2002 @02:27PM (#3796313)
    Your mom must be very proud linus.

UNIX was not designed to stop you from doing stupid things, because that would also stop you from doing clever things. -- Doug Gwyn

Working...