On Wed, 22 Jan 2003, at 10:26am, [EMAIL PROTECTED] wrote:
> However it is still possible to spoof the source, IF the attacker has
> control of some machine (i.e. a router) which lives in the path ...

  Well, this has turned into a semantic distinction.  I generally consider
"spoofing" to be a passive attack, i.e., one that does not require intercept
or redirect anything.  Anything that requires that sort of active attack I
consider "hijacking".  After all, if you've taken over a router, and told
that router to route packets for a given address to you instead, you've
effectively *become* that address.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do not |
| necessarily represent the views or policy of any other person, entity or  |
| organization.  All information is provided without warranty of any kind.  |

_______________________________________________
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss

Reply via email to