zuzu on 21 Oct 2007 02:19:36 -0000 |
On 10/20/07, Toby DiPasquale <toby@cbcg.net> wrote: > On Sat, Oct 20, 2007 at 09:29:39PM -0400, zuzu wrote: > > On 10/20/07, Toby DiPasquale <toby@cbcg.net> wrote: > > > On Sat, Oct 20, 2007 at 08:30:11PM -0400, zuzu wrote: > > > > is this fraud? identity theft? > > > > > > > > isn't this how China operates its national firewall? (spoofed RST packets) > > > > > > Dood, every firewall in existence has this ability and its employed on a > > > regular basis. (*) I don't like what Comcast is doing any more than anyone > > > else but the technique is legit. Complain about the use, not the tool. > > > > I didn't mean to imply the problem is the tool. I'm merely curious > > about the technique and its deployment by ISPs (as well as possible > > countermeasures). I did intent to complain about the use; the problem > > is the spoofing, I think. > > And I'm saying the problem is not the spoofing. "Spoofing" RSTs in order > to snap abusive connections specified by the network administrator(s) is > an everyday thing. it may be commonplace but is it a BOFH tactic? can you explain how it doesn't qualify as fraud or counterfeiting? ___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug
|
|