OT: More Spam

bscott at ntisys.com bscott at ntisys.com
Wed Jan 22 10:33:38 EST 2003


On Wed, 22 Jan 2003, at 10:26am, gnhlug at sophic.org wrote:
> However it is still possible to spoof the source, IF the attacker has
> control of some machine (i.e. a router) which lives in the path ...

  Well, this has turned into a semantic distinction.  I generally consider
"spoofing" to be a passive attack, i.e., one that does not require intercept
or redirect anything.  Anything that requires that sort of active attack I
consider "hijacking".  After all, if you've taken over a router, and told
that router to route packets for a given address to you instead, you've
effectively *become* that address.

-- 
Ben Scott <bscott at ntisys.com>
| The opinions expressed in this message are those of the author and do not |
| necessarily represent the views or policy of any other person, entity or  |
| organization.  All information is provided without warranty of any kind.  |




More information about the gnhlug-discuss mailing list