Date: Tue, 21 May 1996 10:06:34 -0700 From: "Michael L. VanLoon -- HeadCandy.com" <michaelv@HeadCandy.com> To: "Charles C. Figueiredo" <marxx@apocalypse.superlink.net> Cc: "Brett L. Hawn" <blh@nol.net>, current@freebsd.org Subject: Re: freebsd + synfloods + ip spoofing Message-ID: <199605211706.KAA15825@MindBender.HeadCandy.com> In-Reply-To: Your message of Tue, 21 May 96 07:18:54 -0400. <Pine.BSF.3.91.960521071632.1399B-100000@apocalypse.superlink.net>
next in thread | previous in thread | raw e-mail | index | archive | help
>> >and the such need to generate their own headers. Besides, unless your >> >clueless losers and lame crackers gain root, they can't open raw sockets. >> Any PC with an ethernet card on the network can open "raw" packets. > You're right, that was my point exactly. User's on his servers aren't >going to be opening raw sockets, like was mentioned. It's a raw socket, >not a packet. >> And they might not even have to be there while the sniffer collects >> data. I've seen the consequences first-hand. > This has absolutely nothing to do with sniffing, we're talking about >IP spoofing + TCP sequence number generation/prediction, get it straight. Whatever. For many people, sniffing is just part one of spoofing. Once you're that far, there isn't a whole lot left to get to spoofing. ----------------------------------------------------------------------------- Michael L. VanLoon michaelv@HeadCandy.com --< Free your mind and your machine -- NetBSD free un*x >-- NetBSD working ports: 386+PC, Mac 68k, Amiga, Atari 68k, HP300, Sun3, Sun4/4c/4m, DEC MIPS, DEC Alpha, PC532, VAX, MVME68k, arm32... NetBSD ports in progress: PICA, others... Roll your own Internet access -- Seattle People's Internet cooperative. If you're in the Seattle area, ask me how. -----------------------------------------------------------------------------
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199605211706.KAA15825>