15.11.2015 3:05, Steve Friedl wrote: >> The attacker simply uses the same IP address as a valid client ??? > No, not at all. > > The spoofer will never receive a reply from the target to complete the > three-way handshake, and since getting this right involves knowing the > target's next TCP sequence number, not ever getting that reply means it's > very hard to pull off given TCP sequence randomization.
It is not about spoofing, the attacker just need to be behind the same NAT server as a valid client. -- WBR, SD. ------------------------------------------------------------------------------ Firebird-Devel mailing list, web interface at https://lists.sourceforge.net/lists/listinfo/firebird-devel