If someone does that much spoofing, constantly, then the target is going to get bombarded anyways. Plus this wouldn't be totally automated, attempts to contact the "hostile" party would be made, etc. No system is perfect, but that doesn't mean it can't be used. This type of activity already occurs, a new network block was opened up (67 or 69? I can't remember) and many systems are firewalling it (used to be a reserved, unused class A), or companies that get assigned network blocks formerly used in asia. This type of thing happens all the time. Kurt Seifried, kurtat_private A15B BEE5 B391 B9AD B0EF AEB0 AD63 0B4E AD56 E574 http://seifried.org/security/ ---------------------------------------------------------------------------- ----------------------------------------------------------------------------
This archive was generated by hypermail 2b30 : Tue May 27 2003 - 15:00:32 PDT