Security Basics mailing list archives
Re: Re: Anonymizing Packets yet ensuring 0 % packet loss
From: AJ <heuristix () gmail com>
Date: Fri, 28 Sep 2007 12:03:00 -0400
You can't spoof packets and still get return packets back reliably without essentially getting control of another box, spoofing it's IP and routing replies back from that box to yours. Then again, why would you not use the secondary box itself unless maybe there were some features associated with your primary box (such as a high bandwidth connection) that you didn't have available on the secondary box. And there are very few non-destructive applications of doing this. Interesting to note that you are a Vice President of Technology at a "security consulting" company. Speaks volumes about the quality of "security consulting" these days. Le sigh. On 28 Sep 2007 01:07:47 -0000, cstubbs () gmail com <cstubbs () gmail com> wrote:
So you're interested in concealing both Layer 2 and Layer 3 ID of the source traffic within a private network ? ie. somewhere that TOR cannot be used ? You should consider broadcast and multicast addresses (both layer 2 and 3 again) as sources, although depending on the network and the target device you may or may not ensure 0% packet loss.
Current thread:
- Re: Anonymizing Packets yet ensuring 0 % packet loss, (continued)
- Re: Anonymizing Packets yet ensuring 0 % packet loss Brett Cunningham (Sep 18)
- RE: Anonymizing Packets yet ensuring 0 % packet loss Strykar (Sep 18)
- Re: Anonymizing Packets yet ensuring 0 % packet loss Rohin Koul (Sep 26)
- Re: Anonymizing Packets yet ensuring 0 % packet loss Vivek P (Sep 26)
- Re: Anonymizing Packets yet ensuring 0 % packet loss Brett Cunningham (Sep 27)
- Re: Anonymizing Packets yet ensuring 0 % packet loss Vivek P (Sep 27)
- Re: Anonymizing Packets yet ensuring 0 % packet loss gjgowey (Sep 28)
- RE: Anonymizing Packets yet ensuring 0 % packet loss Strykar (Sep 28)
- Re: Re: Anonymizing Packets yet ensuring 0 % packet loss AJ (Sep 28)