Date: Mon, 17 Aug 1998 19:27:28 -0300 (EST) From: Joao Paulo Caldas Campello <john@neoplanos.com.br> To: Jay Tribick <netadmin@fastnet.co.uk> Cc: "Jasper O'Malley" <jooji@webnology.com>, security@FreeBSD.ORG Subject: Re: hosts.deny/allow & ICMP Attacks Message-ID: <Pine.BSF.3.96.980817192100.12148A-100000@dumont.neoplanos.com.br> In-Reply-To: <Pine.BSF.3.96.980817105144.8812W-100000@bofh.fast.net.uk>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 17 Aug 1998, Jay Tribick wrote: Hi, > There's always IP spoofing (although you'd have to do it blind as the > packets wouldn't be able to get back to you) - plus, it's hard to > implement. Yeah... But working with tcp is nearly impossible to have a successful spoof... I cannot say impossible, for sure, `cause maybe there are some bugs in tcpd or any routing protocol (for instance, RIP) that I can use to obtain good spoof... If I do spoof with TCP just changing the frames in the packet I've to pretend I'm a 3rd host; which I have access to and is privileged in the victim system... If TCP wasn't a three-way connection type (as UDP that's one way) I would be able to do spoof faster!! Anyway, I'm just wanting to protect my own network from outsiders invasors, not planning to attack any box!! Thnx for all the help (all the people that answered me and I'm not replying... not to spam the list) Regards, J. Paulo To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.980817192100.12148A-100000>