[email protected] wrote:
>
> Can somebody come up with some examples of practical, relevant applications
> that will fail under spoofing?
What about any connection whose spoofed ACKs cause the sender's window to
reuse offsets (i.e., roll-around), and then has a change in the
path that causes the spoofer (with its state) to be outside the path?
The result will _look_ like a successful transfer, but result
in corruption.
Joe
This archive was generated by hypermail 2b29 : Tue Jan 09 2001 - 13:27:16 EST