On Fri, 12 May 2000, Steve Coleman wrote:
> This reminded me I a somewhat (legally) flawed idea I had in the past
> which was to redirect all the probes back at the host that they were
> coming from. This way the perpetrator would be scanning the machine that
> (s)he is sitting on and wasting their time trying to break into their
> own system.
>
And if they're spoofing source addresses, you'll be sending packets at an
innocent victim, and if they're doing the same thing...
Paul
-----------------------------------------------------------------------------
Paul D. Robertson "My statements in this message are personal opinions
[EMAIL PROTECTED] which may have no basis whatsoever in fact."
PSB#9280
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
- RE: FW: Redirecting closed port connections Paul D. Robertson
- RE: FW: Redirecting closed port connections William . Stackpole
- RE: FW: Redirecting closed port connections mouss
- RE: FW: Redirecting closed port connections Paul D. Robertson
- RE: FW: Redirecting closed port connections Ben Nagy
- RE: FW: Redirecting closed port connections William . Stackpole
- RE: FW: Redirecting closed port connections Damian Gerow
- RE: FW: Redirecting closed port connections mouss
- SOS: VPN Thru Linux RedHat 6.1 as gateway Rajesh Divakaran
- Re: FW: Redirecting closed port connections Steve Coleman
- RE: FW: Redirecting closed port connections Paul D. Robertson
- RE: FW: Redirecting closed port connections Damian Gerow
- RE: FW: Redirecting closed port connections Damian Gerow
- RE: FW: Redirecting closed port connections TLR
- RE: FW: Redirecting closed port connections Paul D. Robertson
- RE: FW: Redirecting closed port connections Damian Gerow
- RE: FW: Redirecting closed port connections William . Stackpole
- RE: FW: Redirecting closed port connections Damian Gerow
