Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: If you have nothing to hide

  • From: Gerardo A. Gregory
  • Date: Mon Aug 05 14:50:32 2002

"You know, there's quite a difference between source routing and
IP spoofing .."



As true as this statement is, the two walk hand in hand (especially during
certain attacks).

If I send an attack from a spoofed address to a victim, I can turn blue in
the face waiting for a response that will never come.
If I spoof an address and use loose source routing I can force the response
to return right through my network.

Also loose source routing can be used for Man-in-the-middle attacks by using
a loose source route you can force all traffic to pass through the attackers
network.

Strict source routing does not benefit an attacker, but as I said loose
source routing does.





Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.