15.11.2015 3:05, Steve Friedl wrote:
>> The attacker simply uses the same IP address as a valid client ???
> No, not at all.
>
> The spoofer will never receive a reply from the target to complete the
> three-way handshake, and since getting this right involves knowing the
> target's next TCP sequence number, not ever getting that reply means it's
> very hard to pull off given TCP sequence randomization.

   It is not about spoofing, the attacker just need to be behind the same NAT 
server as a 
valid client.

-- 
   WBR, SD.

------------------------------------------------------------------------------
Firebird-Devel mailing list, web interface at 
https://lists.sourceforge.net/lists/listinfo/firebird-devel

Reply via email to