From owner-freebsd-security Wed Aug 12 20:08:45 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id UAA28115 for freebsd-security-outgoing; Wed, 12 Aug 1998 20:08:45 -0700 (PDT) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from echonyc.com (echonyc.com [198.67.15.2]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id UAA28104 for ; Wed, 12 Aug 1998 20:08:41 -0700 (PDT) (envelope-from benedict@echonyc.com) Received: from localhost (benedict@localhost) by echonyc.com (8.8.7/8.8.7) with SMTP id XAA09229; Wed, 12 Aug 1998 23:07:53 -0400 (EDT) Date: Wed, 12 Aug 1998 23:07:53 -0400 (EDT) From: Snob Art Genre Reply-To: ben@rosengart.com To: "Jan B. Koum " cc: Marius Bendiksen , Brett Glass , freebsd-security@FreeBSD.ORG Subject: Re: UDP port 31337 In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Wed, 12 Aug 1998, Jan B. Koum wrote: > AFAIK IP spoofing is "blind" - you can't be doing spoofing IP > during a portscan. If you can spoof from one machine and watch the network status on another (not necessarily compromised) machine, you can spoof a portscan. Ben "You have your mind on computers, it seems." To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message