--------
In message <CAK9pY-xZiTg0pL-bb0FzhyWqF_GjBEvbDwdM=w3lfprggwq...@mail.gmail.com>
, Neil Schroeder writes:

>I would like to respond in a generic and sweeping way - having not read in
>the detail Bob layed out for us required to fully analyze the situation -
>to the notion that circuit level access or prior topological knowledge is
>required to exploit this or any other spoofing attack.

This is where it would really be helpful if people read the paper,
because they spend considerable text sorting through what requires
you to be in-band and what doesn't.

-- 
Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
[email protected]         | TCP/IP since RFC 956
FreeBSD committer       | BSD since 4.3-tahoe    
Never attribute to malice what can adequately be explained by incompetence.
_______________________________________________
time-nuts mailing list -- [email protected]
To unsubscribe, go to https://www.febo.com/cgi-bin/mailman/listinfo/time-nuts
and follow the instructions there.

Reply via email to