Date: Tue, 21 May 1996 10:06:34 -0700 From: "Michael L. VanLoon -- HeadCandy.com" <michaelv@HeadCandy.com> To: "Charles C. Figueiredo" <marxx@apocalypse.superlink.net> Cc: "Brett L. Hawn" <blh@nol.net>, current@freebsd.org Subject: Re: freebsd + synfloods + ip spoofing Message-ID: <199605211706.KAA15825@MindBender.HeadCandy.com> In-Reply-To: Your message of Tue, 21 May 96 07:18:54 -0400. <Pine.BSF.3.91.960521071632.1399B-100000@apocalypse.superlink.net>
next in thread | previous in thread | raw e-mail | index | archive | help
>> >and the such need to generate their own headers. Besides, unless your
>> >clueless losers and lame crackers gain root, they can't open raw sockets.
>> Any PC with an ethernet card on the network can open "raw" packets.
> You're right, that was my point exactly. User's on his servers aren't
>going to be opening raw sockets, like was mentioned. It's a raw socket,
>not a packet.
>> And they might not even have to be there while the sniffer collects
>> data. I've seen the consequences first-hand.
> This has absolutely nothing to do with sniffing, we're talking about
>IP spoofing + TCP sequence number generation/prediction, get it straight.
Whatever. For many people, sniffing is just part one of spoofing.
Once you're that far, there isn't a whole lot left to get to spoofing.
-----------------------------------------------------------------------------
Michael L. VanLoon michaelv@HeadCandy.com
--< Free your mind and your machine -- NetBSD free un*x >--
NetBSD working ports: 386+PC, Mac 68k, Amiga, Atari 68k, HP300, Sun3,
Sun4/4c/4m, DEC MIPS, DEC Alpha, PC532, VAX, MVME68k, arm32...
NetBSD ports in progress: PICA, others...
Roll your own Internet access -- Seattle People's Internet cooperative.
If you're in the Seattle area, ask me how.
-----------------------------------------------------------------------------
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199605211706.KAA15825>
