-------- In message <CAK9pY-xZiTg0pL-bb0FzhyWqF_GjBEvbDwdM=w3lfprggwq...@mail.gmail.com> , Neil Schroeder writes:
>I would like to respond in a generic and sweeping way - having not read in >the detail Bob layed out for us required to fully analyze the situation - >to the notion that circuit level access or prior topological knowledge is >required to exploit this or any other spoofing attack. This is where it would really be helpful if people read the paper, because they spend considerable text sorting through what requires you to be in-band and what doesn't. -- Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 [email protected] | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe Never attribute to malice what can adequately be explained by incompetence. _______________________________________________ time-nuts mailing list -- [email protected] To unsubscribe, go to https://www.febo.com/cgi-bin/mailman/listinfo/time-nuts and follow the instructions there.
