Full Disclosure mailing list archives
spoofing
From: "sir kaber" <kaber () aliansystems com>
Date: Sun, 16 Nov 2003 23:24:29 -0800
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi. I was just wondering, but what kind of measures have the big cable companies taken to prevent ip spoofing ? It seems like a simple problem to solve on the local router side, just make sure all ip packet source address originated from within the local network and most spoofing methods should be fixed ? Or are most big cable companies allowing you to generate ip packets with bogus info? - -kaber ;http://vertexabuse.cjb.net -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com> iQA/AwUBP7h3qVIfUl3yRgwCEQJmJACeP+y3XzAxnJwKEMn3tGjal2+BS7IAoOGq 8rNc4pThCOHxSoLatRbPaHYi =CkNT -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Re: SSH Exploit Request, (continued)
- Re: SSH Exploit Request Peter Moody (Nov 14)
- Re: SSH Exploit Request Chris Watson (Nov 14)
- Re: SSH Exploit Request Gregory A. Gilliss (Nov 14)
- Re: SSH Exploit Request Bryan Allen (Nov 15)
- Re: SSH Exploit Request Valdis . Kletnieks (Nov 15)
- Re: SSH Exploit Request Vladimir Parkhaev (Nov 15)
- Re: SSH Exploit Request Valdis . Kletnieks (Nov 15)
- Re: SSH Exploit Request Vladimir Parkhaev (Nov 16)
- Re: SSH Exploit Request Valdis . Kletnieks (Nov 16)
- Re: SSH Exploit Request Jonathan A. Zdziarski (Nov 16)
- spoofing sir kaber (Nov 16)
- Re: SSH Exploit Request Ron DuFresne (Nov 16)
- Re: SSH Exploit Request KF (Nov 14)
- Re: SSH Exploit Request Jeremiah Cornelius (Nov 13)
- Re: SSH Exploit Request Adam (Nov 13)
- Re: SSH Exploit Request Ron DuFresne (Nov 13)
- Re: SSH Exploit Request Florian Weimer (Nov 13)
- Re: SSH Exploit Request Damian Gerow (Nov 13)