On Tue, 2002-02-12 at 09:28, Dave Sherman wrote:
> That would be interesting to see. How does a do packets destined for a
> server's own interface address ever leave the box to get to a spoofing
> system?

Like I said, I have no idea how the attack works. 

-- 
Ben Lutgens		http://people.sistina.com/~blutgens/	
Sistina Software Inc.

pub  1024D/9A0DDC59 2001-12-12 Ben Lutgens <blutgens at sistina.com>
     Key fingerprint = 8FCD A1EE CEA7 DEE1 9361  F32C 0A90 30D1 9A0D
DC59
sub  1024g/1FC75C99 2001-12-12
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 232 bytes
Desc: This is a digitally signed message part
Url : http://shadowknight.real-time.com/pipermail/tclug-list/attachments/20020212/e1908bfd/attachment.pgp