Patch-ID# 113430-01 Keywords: security tcp_strong_iss spoof Initial Sequence Number ISN Synopsis: Trusted Solaris 8 4/01: tcp patch Date: Oct/04/2002 Install Requirements: None Solaris Release: Trusted_Solaris_8_4/01 SunOS Release: N/A Unbundled Product: Unbundled Release: Xref: Topic: Trusted Solaris 8 4/01: tcp patch Relevant Architectures: sparc BugId's fixed with this patch: 4715170 Changes incorporated in this version: 4715170 Patches accumulated and obsoleted by this patch: Patches which conflict with this patch: Patches required with this patch: Obsoleted by: Files included with this patch: /kernel/drv/sparcv9/tcp /kernel/drv/tcp Problem Description: 4715170 tcp_strong_iss=2 is not strong enough (Solaris bug 4463711) Patch Installation Instructions: -------------------------------- Refer to the man pages for instructions on using the generic 'patchadd' and 'patchrm' scripts. Any other special or non-generic installation instructions should be described below as special instructions. Special Install Instructions: ----------------------------- Note: The steps below assume the patch file has been placed into the ADMIN_LOW subdirectory of /tmp (/tmp is a MLD) and that the patch file label is configured to ADMIN_LOW. Create a role that contains the Software Installation profile (typically the admin role). The patch file should be owned by this role. Keep in mind, after rebooting, contents in the /tmp directory are removed; if saving the patch tarfile is desired, select another MLD such as /var/tmp. NOTE: Reboot system after installing patch. 1) Login as a user authorized to assume a role that contains the Software Installation profile; typically the admin role. Assume that role. 2) cd into /tmp and unzip the patch file. A patch directory will be created by the unzip command. # cd /tmp # unzip <123456-01.zip> 3) Install the patch by typing: # patchadd /tmp/ Special Backout Instructions: ----------------------------- 1) Login as a user authorized to assume a role that contains the Software Installation profile; typically the admin role. Assume that role. 2) Backout patch by typing: # patchrm where is the patch number. README -- Last modified date: Friday, October 4, 2002