Advice is needed on port randomization Some implementations have bothered to implement attack-specific mitigations, yet they have not implemented the most obvious/general one: port randomization. Different implementations use different (and too small!) ranges for ephemeral ports (e.g., 1024-4999). Some port randomization approaches (together with small port number ranges) increase the chances of port number collisions, leading to interoperability problems (as reported on OpenBSD’s and FreeBSD’s mailing-lists). FreeBSD ended up including a hack to disable port randomization when the rate of outgoing connections is higher than some specified value |