aboutsummaryrefslogtreecommitdiff
path: root/share/man/man4/inet.4
diff options
context:
space:
mode:
authorHans Petter Selasky <hselasky@FreeBSD.org>2015-04-07 18:52:00 +0000
committerHans Petter Selasky <hselasky@FreeBSD.org>2015-04-07 18:52:00 +0000
commitd92661658b17974d274ef6ad39f3952a61715e12 (patch)
treee775379326d9bcb895f03c867c66db79af561cb1 /share/man/man4/inet.4
parenta45060f0cc6ef3d1dfdbd64afcdb97ca5e17099c (diff)
downloadsrc-d92661658b17974d274ef6ad39f3952a61715e12.tar.gz
src-d92661658b17974d274ef6ad39f3952a61715e12.zip
Just briefly mention about the dangers of non-random IP IDs.
A full in depth explanation belongs somewhere else. Suggested by: gleb @ MFC after: 1 week
Notes
Notes: svn path=/head/; revision=281220
Diffstat (limited to 'share/man/man4/inet.4')
-rw-r--r--share/man/man4/inet.420
1 files changed, 4 insertions, 16 deletions
diff --git a/share/man/man4/inet.4 b/share/man/man4/inet.4
index 60a382c423f7..f0f12d79ede8 100644
--- a/share/man/man4/inet.4
+++ b/share/man/man4/inet.4
@@ -28,7 +28,7 @@
.\" From: @(#)inet.4 8.1 (Berkeley) 6/5/93
.\" $FreeBSD$
.\"
-.Dd April 3, 2015
+.Dd April 7, 2015
.Dt INET 4
.Os
.Sh NAME
@@ -244,21 +244,9 @@ IP datagrams (or all IP datagrams, if
.Va ip.rfc6864
is disabled) to be randomized instead of incremented by 1 with each packet
generated.
-This prevents information exchange between any combination of two or
-more inside and/or outside observers using packet frequency
-modulation, PFM.
-An outside observer can ping the outside facing port at a fixed rate
-sampling the returned counter.
-An inside observer can ping the inside facing port sampling the same
-counter.
-Even though packets don't flow directly between any of the observers
-any single observer can influence the data rate the other observer(s)
-is or are sampling.
-This is done by sending more or less ping packets towards the gateway
-per measured interval.
-Setting this sysctl also prevents the remote and internal observers to
-determine the rate of packet generation on the machine by watching the
-counter.
+This prevents IP IDs being abused as a covert channel and also closes
+a minor information leak which allows remote observers to determine
+the rate of packet generation on the machine by watching the counter.
At the same time, on high-speed links, it can decrease the ID reuse
cycle greatly.
Default is 0 (sequential IP IDs).