Date: Wed, 12 Aug 1998 22:46:14 -0400 From: Matthew Hunt <mph@pobox.com> To: "Jan B. Koum " <jkb@best.com>, Marius Bendiksen <Marius.Bendiksen@scancall.no> Cc: Brett Glass <brett@lariat.org>, freebsd-security@FreeBSD.ORG Subject: Re: UDP port 31337 Message-ID: <19980812224614.B8987@astro.psu.edu> In-Reply-To: <Pine.BSF.3.96.980812145452.17894B-100000@shell6.ba.best.com>; from Jan B. Koum on Wed, Aug 12, 1998 at 02:55:59PM -0700 References: <3.0.5.32.19980812193700.0092f220@mail.scancall.no> <Pine.BSF.3.96.980812145452.17894B-100000@shell6.ba.best.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Aug 12, 1998 at 02:55:59PM -0700, Jan B. Koum wrote: > AFAIK IP spoofing is "blind" - you can't be doing spoofing IP > during a portscan. Hence, if someone to portscan class B for udp port > 31337, the ought to do it from the real IP. Now the fact that this IP > might belong to someone else (cracked account, etc) is another matter. At least one (quite effective) port scanner supports IP spoofing. True, the user doesn't get the results. The purpose is to get somebody else in trouble for port scanning. -- Matthew Hunt <mph@pobox.com> * Inertia is a property of matter. http://www.pobox.com/~mph/pgp.key for PGP public key 0x67203349. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19980812224614.B8987>
