From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933963Ab2GLOiL (ORCPT ); Thu, 12 Jul 2012 10:38:11 -0400 Received: from oproxy9.bluehost.com ([69.89.24.6]:43356 "HELO oproxy9.bluehost.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S933894Ab2GLOiI (ORCPT ); Thu, 12 Jul 2012 10:38:08 -0400 Message-ID: <4FFEE122.7000404@xenotime.net> Date: Thu, 12 Jul 2012 07:37:22 -0700 From: Randy Dunlap User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.15) Gecko/20110323 Thunderbird/3.1.9 MIME-Version: 1.0 To: "Kiran (Kiran Kumar) Kella" CC: "linux-kernel@vger.kernel.org" , netdev@vger.kernel.org Subject: Re: Is TCP vulneribility patch (as in RFC 5961) done in linux? References: <68700EDA775E5E47B5EBA9FF8AC0F15C07506A@SJEXCHMB09.corp.ad.broadcom.com> In-Reply-To: <68700EDA775E5E47B5EBA9FF8AC0F15C07506A@SJEXCHMB09.corp.ad.broadcom.com> Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-Identified-User: {1807:box742.bluehost.com:xenotime:xenotime.net} {sentby:smtp auth 50.53.38.135 authed with rdunlap@xenotime.net} Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 07/12/2012 05:40 AM, Kiran (Kiran Kumar) Kella wrote: > Hi, > > I just now checked in the kernel archives if the patch in section 3.2 mentioned in RFC 5961 for RST attacks with predictable sequence numbers. > I see some discussion happened in 2004 timeframe. > I was just wondering if in the latest linux source, the patch is made available. > > Appreciate your quick response in this regard. > > Thanks, > Kiran You should ask this question on the netdev mailing list (cc-ed). -- ~Randy