From mboxrd@z Thu Jan 1 00:00:00 1970 From: Randy Dunlap Subject: Re: Is TCP vulneribility patch (as in RFC 5961) done in linux? Date: Thu, 12 Jul 2012 07:37:22 -0700 Message-ID: <4FFEE122.7000404@xenotime.net> References: <68700EDA775E5E47B5EBA9FF8AC0F15C07506A@SJEXCHMB09.corp.ad.broadcom.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: "linux-kernel@vger.kernel.org" , netdev@vger.kernel.org To: "Kiran (Kiran Kumar) Kella" Return-path: In-Reply-To: <68700EDA775E5E47B5EBA9FF8AC0F15C07506A@SJEXCHMB09.corp.ad.broadcom.com> Sender: linux-kernel-owner@vger.kernel.org List-Id: netdev.vger.kernel.org On 07/12/2012 05:40 AM, Kiran (Kiran Kumar) Kella wrote: > Hi, > > I just now checked in the kernel archives if the patch in section 3.2 mentioned in RFC 5961 for RST attacks with predictable sequence numbers. > I see some discussion happened in 2004 timeframe. > I was just wondering if in the latest linux source, the patch is made available. > > Appreciate your quick response in this regard. > > Thanks, > Kiran You should ask this question on the netdev mailing list (cc-ed). -- ~Randy