On Wed, 22 Jan 2003, at 10:26am, [EMAIL PROTECTED] wrote: > However it is still possible to spoof the source, IF the attacker has > control of some machine (i.e. a router) which lives in the path ...
Well, this has turned into a semantic distinction. I generally consider "spoofing" to be a passive attack, i.e., one that does not require intercept or redirect anything. Anything that requires that sort of active attack I consider "hijacking". After all, if you've taken over a router, and told that router to route packets for a given address to you instead, you've effectively *become* that address. -- Ben Scott <[EMAIL PROTECTED]> | The opinions expressed in this message are those of the author and do not | | necessarily represent the views or policy of any other person, entity or | | organization. All information is provided without warranty of any kind. | _______________________________________________ gnhlug-discuss mailing list [EMAIL PROTECTED] http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss