- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- TCP Sequence prediction
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО01-10-2003 07:58 AM
тАО01-10-2003 07:58 AM
What patches do I need to stop the TCP sequence on my servers being predictable? This is a security vulnerability. I tried a search, but I can't find the exact patch the fixes the issue.
Thanks in advance.
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО01-10-2003 08:05 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО01-10-2003 08:06 AM
тАО01-10-2003 08:06 AM
Re: TCP Sequence prediction
Try looking at PHNE_26771. Here is a snippet from the patch description [fixed in patch PHNE_26445 which is superseded by PHNE_26771]:
( SR number: 8606213513 ; Defect: JAGad82705 )
Systems relying on random increments for choosing less
predictable TCP ISN values, are still vulnerable to
statistical attacks.
Also, here is a link to a great web site called "Strange Attractors and TCP/IP Sequence Number Analysis - One Year Later ". This site analyzes the TCP/IP sequence numbers for a lot of different operating systems and plots the results as 3D plots. Great stuff!
http://lcamtuf.coredump.cx/newtcp/
JP
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО01-13-2003 10:55 AM
тАО01-13-2003 10:55 AM
Re: TCP Sequence prediction
There was a recent security bulletin about RFC 1918 support in HP-UX. PHNE_26771 as mentioned by John is the 11.0 patch mentioned in that.
If you are concerned about system security, it would be a really good idea to sign-up for the security notifications:
C. To subscribe to automatically receive future NEW HP Security
Bulletins from the HP IT Resource Center via electronic
mail, do the following:
Use your browser to get to the HP IT Resource Center page
at:
http://itrc.hp.com
Use the 'Login' tab at the left side of the screen to login
using your ID and password. Use your existing login or the
"Register" button at the left to create a login, in order to
gain access to many areas of the ITRC. Remember to save the
User ID assigned to you, and your password.
In the left most frame select "Maintenance and Support".
Under the "Notifications" section (near the bottom of
the page), select "Support Information Digests".
To -subscribe- to future HP Security Bulletins or other
Technical Digests, click the check box (in the left column)
for the appropriate digest and then click the "Update
Subscriptions" button at the bottom of the page.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО01-13-2003 11:13 AM
тАО01-13-2003 11:13 AM
Re: TCP Sequence prediction
Here's the relevant text, cut from the patch text for PHNE_27063:
Defect Description:
The RFC 1948 ("Defending against sequence
number attacks") is not supported.
Resolution:
The RFC 1948 is now implemented for computing
TCP ISN values. By default, the support for
RFC 1948 is turned off. It can be turned on by
using the ndd variable, tcp_isn_passphrase
of any length, but only the first 32 characters
will be retained. The passphrase, once set, should
not be changed, except possibly at reboot.
For example:
ndd -set /dev/tcp tcp_isn_passphrase "rfc 1948"
will turn on the support for RFC 1948.
( SR:8606213579 CR:JAGad82771 )
I have asked for this info to be added to the special instructions for these patches, but there has been no change so far...
Regards,
Dave
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО01-14-2003 12:30 AM
тАО01-14-2003 12:30 AM
Re: TCP Sequence prediction
That more than answers my question.