Security Basics mailing list archives

Re: Re: Anonymizing Packets yet ensuring 0 % packet loss


From: AJ <heuristix () gmail com>
Date: Fri, 28 Sep 2007 12:03:00 -0400

You can't spoof packets and still get return packets back reliably
without essentially getting control of another box, spoofing it's IP
and routing replies back from that box to yours. Then again, why would
you not use the secondary box itself unless maybe there were some
features associated with your primary box (such as a high bandwidth
connection) that you didn't have available on the secondary box.  And
there are very few non-destructive applications of doing this.

Interesting to note that you are a Vice President of Technology at a
"security consulting" company. Speaks volumes about the quality of
"security consulting" these days.

Le sigh.

On 28 Sep 2007 01:07:47 -0000, cstubbs () gmail com <cstubbs () gmail com> wrote:

So you're interested in concealing both Layer 2 and Layer 3 ID of the source traffic within a private network ? ie. 
somewhere that TOR cannot be used ?


You should consider broadcast and multicast addresses (both layer 2 and 3 again) as sources, although depending on 
the network and the target device you may or may not ensure 0% packet loss.



Current thread: