nanog mailing list archives
Re: If you have nothing to hide
From: "Gerardo A. Gregory" <ggregory () affinitas net>
Date: Mon, 5 Aug 2002 13:50:24 -0500
"You know, there's quite a difference between source routing and IP spoofing .." As true as this statement is, the two walk hand in hand (especially during certain attacks). If I send an attack from a spoofed address to a victim, I can turn blue in the face waiting for a response that will never come. If I spoof an address and use loose source routing I can force the response to return right through my network. Also loose source routing can be used for Man-in-the-middle attacks by using a loose source route you can force all traffic to pass through the attackers network. Strict source routing does not benefit an attacker, but as I said loose source routing does.
Current thread:
- Re: If you have nothing to hide, (continued)
- Message not available
- Re: If you have nothing to hide Dave Crocker (Aug 04)
- Re: If you have nothing to hide bmanning (Aug 05)
- Re: If you have nothing to hide Len Rose (Aug 05)
- Re: If you have nothing to hide bdragon (Aug 05)
- Re: If you have nothing to hide Len Rose (Aug 05)
- Re: If you have nothing to hide bdragon (Aug 05)
- Re[2]: If you have nothing to hide Richard Welty (Aug 05)
- Re: If you have nothing to hide Stephen Sprunk (Aug 05)
- Re: If you have nothing to hide Valdis . Kletnieks (Aug 05)
- Re: If you have nothing to hide Jeffrey Haas (Aug 05)
- Re: If you have nothing to hide Gerardo A. Gregory (Aug 05)
- Re: If you have nothing to hide Sean Donelan (Aug 06)
- Re: If you have nothing to hide fingers (Aug 05)
- Re: If you have nothing to hide Henry Yen (Aug 05)
- Re: If you have nothing to hide Eric Osborne (Aug 05)
- Re: If you have nothing to hide bdragon (Aug 05)
- Re: If you have nothing to hide Eric Osborne (Aug 05)