The contents of this legacy page are no longer maintained nor supported, and are made available only for historical purposes.

Bibliography Details

T. Ylonen, "Thoughts on how to mount an attack on tcpdpriv's '-a50' option" 2005.

Thoughts on how to mount an attack on tcpdpriv's '-a50' option
Authors: T. Ylonen
Published: Tech Report, 2005
URL: http://fly.isti.cnr.it/software/tcpdpriv/attack50/attack50.html
ENTRY DATE: 2008-06-16
ABSTRACT: tcpdpriv(1) provides a mechanism for outputting randomized IP addresses (using the -A50 option). By so doing, the amount of information encoded in the outputted IP addresses is larger than the amount of information encoded in the options that output IP addresses as sequential numbers (but, less than the amount of information encoded in the -A99 option that causes the IP addresses on the output side to be the same as those on the input side). This document discusses an approach that might be used to crack an output file which has been encoded with the -A50 option.