Re: [Tsvwg] I-D Action:draft-ietf-tsvwg-port-randomization-02.txt

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> 	Title           : Port Randomization
> 	Author(s)       : M. Larsen, F. Gont
> 	Filename        : draft-ietf-tsvwg-port-randomization-02.txt
> 	Pages           : 28
> 	Date            : 2008-08-31
Hi, Fernando,

A few comments, the latter mostly by Ananth's draft:

- - it might be useful to simplify the abstract
	some of the context can be moved to the intro,
	i.e., the abstract can just refer to being
	'inspired by recent attacks' as RFC1948 does

- - it might be useful to refer to RFC1948 earlier, e.g.,
in the intro
	this doc very closely parallels RFC1948, so
	raising that point earlier might be useful to
	the reader

- - I'm not clear on the utility of the bit array to avoid reserved ports
	if the source port is selected on CONNECT, the TCB
	will be correctly associated with the issuing process,
	not any other process listening on that port

	the only value is in debugging - i.e., assuming that
	port=service, but that doesn't always mean anything
	specific anyway, since kernel's don't prohibit use of
	allocated ports anyway (i.e., no reason this mechanism
	needs to do more than a kernel would in preventing a user
	from setting a specific source port at the app layer)

Joe

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAki9tb0ACgkQE5f5cImnZrspzwCgngda/7eZ+MBk0BUwUFec04BQ
iMYAoM3SyYgjUTu8Qg5clNN5cg9cmDfb
=xqIY
-----END PGP SIGNATURE-----
_______________________________________________

I-D-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/i-d-announce
Internet-Draft directories: http://www.ietf.org/shadow.html
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt

[Index of Archives]     [IETF]     [IETF Discussion]     [Linux Kernel]

  Powered by Linux