On Wed, Dec 16, 2009 at 09:13:09AM -0500, Andrew Lewman wrote: > The terms I continue to hear from military organizations are "weaponized > icmp", "weaponized tcp", and "weaponized probing". > > I don't really know how one can take an icmp packet and determine if > it's weaponized or innocent, but it's quite the dichotomy that's being
Easy, just check whether the evil header bit is set. http://tools.ietf.org/html/rfc3514 > created. Interestingly, most of these people don't think tor is > weaponized. For whatever that means. -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE *********************************************************************** To unsubscribe, send an e-mail to [email protected] with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/

