zuzu on 21 Oct 2007 02:19:36 -0000


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] Comcast spoofs on network to block P2P

  • From: zuzu <sean.zuzu@gmail.com>
  • To: "Philadelphia Linux User's Group Discussion List" <plug@lists.phillylinux.org>
  • Subject: Re: [PLUG] Comcast spoofs on network to block P2P
  • Date: Sat, 20 Oct 2007 22:19:29 -0400
  • Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; bh=sfZlogyShFExlY8+mvx3tBkMhDHHuSOd5VrkNY4zjC0=; b=dUK6NVvCJX7GL31I92BVS2U0sKEJajq8dSHVcOGDYQ8XrLnDjzv4hV7lJTPVF3Jlj+X55qsLBXUWSH3vYxGpefxaNDAY8U59Cp5sxyrtwkoCV64UoxVYa1hbgVPEvVA6nSNuZo8tP2C0Rd3TIBNrCp0FW2fUjT6YC/UsZfvPtK4=
  • Reply-to: Philadelphia Linux User's Group Discussion List <plug@lists.phillylinux.org>
  • Sender: plug-bounces@lists.phillylinux.org

On 10/20/07, Toby DiPasquale <toby@cbcg.net> wrote:
> On Sat, Oct 20, 2007 at 09:29:39PM -0400, zuzu wrote:
> > On 10/20/07, Toby DiPasquale <toby@cbcg.net> wrote:
> > > On Sat, Oct 20, 2007 at 08:30:11PM -0400, zuzu wrote:
> > > > is this fraud?  identity theft?
> > > >
> > > > isn't this how China operates its national firewall? (spoofed RST packets)
> > >
> > > Dood, every firewall in existence has this ability and its employed on a
> > > regular basis. (*) I don't like what Comcast is doing any more than anyone
> > > else but the technique is legit. Complain about the use, not the tool.
> >
> > I didn't mean to imply the problem is the tool.  I'm merely curious
> > about the technique and its deployment by ISPs (as well as possible
> > countermeasures).  I did intent to complain about the use; the problem
> > is the spoofing, I think.
>
> And I'm saying the problem is not the spoofing. "Spoofing" RSTs in order
> to snap abusive connections specified by the network administrator(s) is
> an everyday thing.

it may be commonplace but is it a BOFH tactic?  can you explain how it
doesn't qualify as fraud or counterfeiting?
___________________________________________________________________________
Philadelphia Linux Users Group         --        http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion  --   http://lists.phillylinux.org/mailman/listinfo/plug