i get this from nessus on one of our hosts: > . Warning found on port general/tcp > > The remote host uses non-random IP IDs, that is, it is > possible to predict the next value of the ip_id field of > the ip packets sent by this host. > > An attacker may use this feature to determine if the remote > host sent a packet in reply to another request. This may be > used for portscanning and other things. > > Solution : Contact your vendor for a patch > Risk factor : > Low
how can i make linux tcp/ip use random IP sequence numbers? martin; (greetings from the heart of the sun.) \____ echo mailto: !#^."<*>"|tr "<*> mailto:" [EMAIL PROTECTED] -- to vacillate or not to vacillate, that is the question ... or is it?

