* Craig Skinner <[EMAIL PROTECTED]> [2007-09-15 16:21]:
> Doing a pf.conf tidy up. From the pf.conf man page on 4.1:
> 
> STATE MODULATION
> 
> Much of the security derived from TCP is attributable to how well the
> initial sequence numbers (ISNs) are chosen.  Some popular stack implemen
> tations choose very poor ISNs and thus are normally susceptible to ISN
> prediction exploits.  By applying a modulate state rule to a TCP connec-
> tion, pf(4) will create a high quality random sequence number for each
> connection endpoint.
> 
> Therefore, because OBSD uses quality ISNs, there is no point in
> modulating state on outbound packets that ORIGINATE (i.e. not passed
> through) an OBSD host.

correct.

-- 
Henning Brauer, [EMAIL PROTECTED], [EMAIL PROTECTED]
BS Web Services, http://bsws.de
Full-Service ISP - Secure Hosting, Mail and DNS Services
Dedicated Servers, Rootservers, Application Hosting - Hamburg & Amsterdam

Reply via email to