Date: Thu, 11 May 2000 08:03:37 +0530
    From: Udhay Shankar N <[EMAIL PROTECTED]>

    http://www.firstmonday.dk/issues/issue2_5/rowland/

    The TCP/IP protocol suite has a number of weaknesses that allow an attacker
    to leverage techniques in the form of covert channels to surreptitiously
    pass data in otherwise benign packets. This paper attempts to illustrate
    these weaknesses in both theoretical and practical examples.

Er, they're covert channels all right, but I'd hardly call a paper
that's copyright 1996, and published in a May 1997 journal issue,
"new".

Reply via email to