| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: new exploit for tcp |
From: Adam Flinton
Geo. wrote:
> "Adam Flinton" wrote in message
> news:40865cf2{at}w3.nls.net...
>
>
>>OK I'll rephrase...how long & who have known it would only take 4
>>packets....?
>
>
> Everyone on the expensive for pay security alerts lists.
>
>
>>& as such I'm not sure that the bod who discovered this may have been
>>the first & whether various NSA/GCHQ/FSB etc types will be a bit annoyed
>>by this latest revelation.
>
>
> It just allows resetting of connections, the types you talk about much
> prefer to divert traffic so they are into things like bgp route spoofing and
> such which is pretty easy if you have access to a trusted router. Remember
> back in 1995 or 1996 when some ISP in Mcclean VA rerouted half of europe
> thru their network? (odd that the spooks use that same access point in
> Mcclean VA isn't it?)
>
> Geo.
>
>
Indeed.
Adam
--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 270 @PATH: 379/45 1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.