title="Implement RFC 6056: 'Recommendations for Transport-Protocol Port Randomization'"
[Alistair G. Crooks](mailto:agc@NetBSD.org)
When using connect(2) to connect the client end of a socket, the system will choose the next number of the socket for you. Having an easily guessed port number can allow various attacks to take place. Choosing the next port number at random, whilst not perfect, gives more protection against these attacks.
[RFC 6056](http://www.rfc-editor.org/rfc/rfc6056.txt) gives an excellent overview of the algorithms in use when "randomising source ports", giving examples from FreeBSD, OpenBSD and Linux.
This project has a number of goals:
* Evaluate and prioritise the algorithms in RFC 6056.
* Implement the algorithms in RFC 6056, and make it possible to choose between them with sysctl.
CVSweb for NetBSD wikisrc <wikimaster@NetBSD.org> software: FreeBSD-CVSweb