lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: kaber at aliansystems.com (sir kaber) Subject: spoofing -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi. I was just wondering, but what kind of measures have the big cable companies taken to prevent ip spoofing ? It seems like a simple problem to solve on the local router side, just make sure all ip packet source address originated from within the local network and most spoofing methods should be fixed ? Or are most big cable companies allowing you to generate ip packets with bogus info? - -kaber ;http://vertexabuse.cjb.net -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com> iQA/AwUBP7h3qVIfUl3yRgwCEQJmJACeP+y3XzAxnJwKEMn3tGjal2+BS7IAoOGq 8rNc4pThCOHxSoLatRbPaHYi =CkNT -----END PGP SIGNATURE-----
Powered by blists - more mailing lists