Jon Galt on Sun, 10 Feb 2002 00:03:47 +0100 |
On Fri, 8 Feb 2002, Jaiwant Mulik wrote: > >>If a comcast victim/customer sends a packet to port 80 at any IP address, > >>it is intercepted by the Inktomi Traffic-Server, the contents of the > >>packet are examined for the GET url and the "Host:" field. The Inktomi > >>Traffic-Server then sends the http request on to your destination from > >>it's address with modified content and headers. It then caches the > >>returned data, changes both the header and the content, and sends the > >>packet to your machine with the spoofed IP of the server you had > >>requested. Perhaps I'm playing devil's advocate here, or maybe I'm just an idiot, but isn't this basically what a proxy server does? NOT that I'm wishing I were a comcast subscriber, about now! Wayne ______________________________________________________________________ Philadelphia Linux Users Group - http://www.phillylinux.org Announcements-http://lists.phillylinux.org/mail/listinfo/plug-announce General Discussion - http://lists.phillylinux.org/mail/listinfo/plug
|
|