diff options
author | hselasky <hselasky@FreeBSD.org> | 2015-04-07 18:52:00 +0000 |
---|---|---|
committer | hselasky <hselasky@FreeBSD.org> | 2015-04-07 18:52:00 +0000 |
commit | 3c08520e3fb5ef6bbe2702f21cab7be028cf96a2 (patch) | |
tree | e775379326d9bcb895f03c867c66db79af561cb1 /share/man/man4 | |
parent | e0a51429a4579fac9e346257cb0eb32df44e0f3e (diff) | |
download | FreeBSD-src-3c08520e3fb5ef6bbe2702f21cab7be028cf96a2.zip FreeBSD-src-3c08520e3fb5ef6bbe2702f21cab7be028cf96a2.tar.gz |
Just briefly mention about the dangers of non-random IP IDs.
A full in depth explanation belongs somewhere else.
Suggested by: gleb @
MFC after: 1 week
Diffstat (limited to 'share/man/man4')
-rw-r--r-- | share/man/man4/inet.4 | 20 |
1 files changed, 4 insertions, 16 deletions
diff --git a/share/man/man4/inet.4 b/share/man/man4/inet.4 index 60a382c..f0f12d7 100644 --- a/share/man/man4/inet.4 +++ b/share/man/man4/inet.4 @@ -28,7 +28,7 @@ .\" From: @(#)inet.4 8.1 (Berkeley) 6/5/93 .\" $FreeBSD$ .\" -.Dd April 3, 2015 +.Dd April 7, 2015 .Dt INET 4 .Os .Sh NAME @@ -244,21 +244,9 @@ IP datagrams (or all IP datagrams, if .Va ip.rfc6864 is disabled) to be randomized instead of incremented by 1 with each packet generated. -This prevents information exchange between any combination of two or -more inside and/or outside observers using packet frequency -modulation, PFM. -An outside observer can ping the outside facing port at a fixed rate -sampling the returned counter. -An inside observer can ping the inside facing port sampling the same -counter. -Even though packets don't flow directly between any of the observers -any single observer can influence the data rate the other observer(s) -is or are sampling. -This is done by sending more or less ping packets towards the gateway -per measured interval. -Setting this sysctl also prevents the remote and internal observers to -determine the rate of packet generation on the machine by watching the -counter. +This prevents IP IDs being abused as a covert channel and also closes +a minor information leak which allows remote observers to determine +the rate of packet generation on the machine by watching the counter. At the same time, on high-speed links, it can decrease the ID reuse cycle greatly. Default is 0 (sequential IP IDs). |