Re: Ephemeral port range (patch)

2008-03-03 Thread Fernando Gont
At 03:37 a.m. 04/03/2008, Mike Silbersack wrote: While I haven't look match at the scheme proposed by Amit, I think there's a "flaw" with the algorithm: IP IDs need to be unique for {source IP, des IP, Protocol}. And the algorithm still keeps a *global* IP ID. That means you'll cycle through t

Re: Ephemeral port range (patch)

2008-03-03 Thread Mike Silbersack
On Mon, 3 Mar 2008, Fernando Gont wrote: (Shame on me... somehow you mail got stuck in my queue, and I didn't respond to it). No sweat, I've taken far longer to reply to your e-mails! While I haven't look match at the scheme proposed by Amit, I think there's a "flaw" with the algorithm: IP

Re: Ephemeral port range (patch)

2008-03-03 Thread Fernando Gont
At 04:43 a.m. 03/03/2008, Mike Silbersack wrote: Earlier in the week, I had commented (via private e-mail?) that I thought that Amit Klein's algorithm which I recently implemented in ip_id.c might be adapted to serve as an ephemeral port allocator. Now that I've thought more about it, I'm not

Re: Ephemeral port range (patch)

2008-03-02 Thread Mike Silbersack
On Sat, 1 Mar 2008, Fernando Gont wrote: I will also start working on the double-hash ephemeral port selection algorithm described in the draft (this is, IMHO, the right approach to ephemeral port randomization) Kind regards, -- Fernando Gont Earlier in the week, I had commented (via priv

Re: Ephemeral port range (patch)

2008-03-02 Thread Fernando Gont
At 09:49 p.m. 02/03/2008, you wrote: +1 on increasing the threshold, 1024 is way too low. With the current patch, I agree. I'm planning to implement the scheme described in the port randomization internt-draft I referenced, and implement the array-of-bits thing. That way you can exclude whic

Re: Ephemeral port range (patch)

2008-03-02 Thread Bruce M. Simpson
+1 on increasing the threshold, 1024 is way too low. Also consider the folk who depend on the existing behaviour: a predictable ephemeral port range is useful, if for some reason you need to apply a NAT policy to that traffic, with no other knowledge about how the applications you must NAT act

Re: Ephemeral port range (patch)

2008-03-02 Thread Andre Oppermann
Mike Silbersack wrote: On Sat, 1 Mar 2008, Fernando Gont wrote: Folks, This patch changes the default ephemeral port range from 49152-65535 to 1024-65535. This makes it harder for an attacker to guess the ephemeral ports (as the port number space is larger). Also, it makes the chances of

Re: Ephemeral port range (patch)

2008-03-02 Thread Robert Watson
On Sat, 1 Mar 2008, Mike Silbersack wrote: On Sat, 1 Mar 2008, Fernando Gont wrote: This patch changes the default ephemeral port range from 49152-65535 to 1024-65535. This makes it harder for an attacker to guess the ephemeral ports (as the port number space is larger). Also, it makes the ch

Re: Ephemeral port range (patch)

2008-03-01 Thread Fernando Gont
At 08:42 p.m. 01/03/2008, Kevin Oberman wrote: > This patch changes the default ephemeral port range from 49152-65535 > to 1024-65535. This makes it harder for an attacker to guess the > ephemeral ports (as the port number space is larger). Also, it makes > the chances of port number collisions

Re: Ephemeral port range (patch)

2008-03-01 Thread Kevin Oberman
> Date: Sat, 01 Mar 2008 11:34:27 -0200 > From: Fernando Gont <[EMAIL PROTECTED]> > Sender: [EMAIL PROTECTED] > > Folks, > > This patch changes the default ephemeral port range from 49152-65535 > to 1024-65535. This makes it harder for an attacker to guess the > ephemeral ports (as the port num

Re: Ephemeral port range (patch)

2008-03-01 Thread Mike Silbersack
On Sat, 1 Mar 2008, Fernando Gont wrote: Folks, This patch changes the default ephemeral port range from 49152-65535 to 1024-65535. This makes it harder for an attacker to guess the ephemeral ports (as the port number space is larger). Also, it makes the chances of port number collisions s

Ephemeral port range (patch)

2008-03-01 Thread Fernando Gont
Folks, This patch changes the default ephemeral port range from 49152-65535 to 1024-65535. This makes it harder for an attacker to guess the ephemeral ports (as the port number space is larger). Also, it makes the chances of port number collisions smaller. (http://www.ietf.org/internet-drafts