Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 17 Aug 1998 19:27:28 -0300 (EST)
From:      Joao Paulo Caldas Campello <john@neoplanos.com.br>
To:        Jay Tribick <netadmin@fastnet.co.uk>
Cc:        "Jasper O'Malley" <jooji@webnology.com>, security@FreeBSD.ORG
Subject:   Re: hosts.deny/allow & ICMP Attacks
Message-ID:  <Pine.BSF.3.96.980817192100.12148A-100000@dumont.neoplanos.com.br>
In-Reply-To: <Pine.BSF.3.96.980817105144.8812W-100000@bofh.fast.net.uk>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 17 Aug 1998, Jay Tribick wrote:

Hi,

> There's always IP spoofing (although you'd have to do it blind as the 
> packets wouldn't be able to get back to you) - plus, it's hard to
> implement.

Yeah... But working with tcp is nearly impossible to have a successful
spoof... I cannot say impossible, for sure, `cause maybe there are some
bugs in tcpd or any routing protocol (for instance, RIP) that I can use to
obtain good spoof... If I do spoof with TCP just changing the frames in
the packet I've to pretend I'm a 3rd host; which I have access to and is
privileged in the victim system...

If TCP wasn't a three-way connection type (as UDP that's one way) I would
be able to do spoof faster!! Anyway, I'm just wanting to protect my own
network from outsiders invasors, not planning to attack any box!!

Thnx for all the help (all the people that answered me and I'm not
replying... not to spam the list)

Regards,

J. Paulo



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.980817192100.12148A-100000>