OT: More Spam
bscott at ntisys.com
bscott at ntisys.com
Wed Jan 22 10:33:38 EST 2003
On Wed, 22 Jan 2003, at 10:26am, gnhlug at sophic.org wrote:
> However it is still possible to spoof the source, IF the attacker has
> control of some machine (i.e. a router) which lives in the path ...
Well, this has turned into a semantic distinction. I generally consider
"spoofing" to be a passive attack, i.e., one that does not require intercept
or redirect anything. Anything that requires that sort of active attack I
consider "hijacking". After all, if you've taken over a router, and told
that router to route packets for a given address to you instead, you've
effectively *become* that address.
--
Ben Scott <bscott at ntisys.com>
| The opinions expressed in this message are those of the author and do not |
| necessarily represent the views or policy of any other person, entity or |
| organization. All information is provided without warranty of any kind. |
More information about the gnhlug-discuss
mailing list