Your talking about this:

http://www.caida.org/outreach/papers/2005/fingerprinting/

>From educatedguesswork.org:

"The basic idea is that you use TCP timestamps to estimate how fast or
slow the remote clock is running. This doesn't give you enough
information to uniquely identify the remote machine, but it does give you
a way to assess whether two given machines are the same. Possible uses
include determining when two machines that have the same address are in
fact different machines (e.g., they're behind a NAT) or whether two
machines with different IP address are actually the same machine (e.g., a
honeypot)."

Anthony, I think your a bit mistaken in your description.  This does not
appear to be
much of a security hole.  NAT's are defacto these days on the Internet
and any cracker
is going to assume that there's a good chance he's attacking a NAT.

Ted

> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] Behalf Of Anthony
> Atkielski
> Sent: Thursday, March 10, 2005 6:46 PM
> To: freebsd-questions@freebsd.org
> Subject: Clock slew vulnerability in FreeBSD?
>
>
> How vulnerable is FreeBSD to the recently announced technique for
> individually identifying computers by the clock slew apparent in TCP
> packets?  If it is vulnerable to this, will there be any plans to
> address the vulnerability?
>
> --
> Anthony
>
>
> _______________________________________________
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to
> "[EMAIL PROTECTED]"
>

_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to