<< | Thread Index | >> ]    [ << | Date Index | >> ]

To: cipe-l,AT,inka,DOT,de
Subject: Re: CPU Usage CIPE-WIN32 Windows XP
From: hans steegers <steegers,AT,steegers,DOT,nl>
Date: Wed, 17 Sep 2003 16:06:42 +0200
In-reply-to: <OF3A525AD0.66383EC6-ON85256DA4.004B634E@bmc-pos.com>
Organization: steegers
References: <OF3A525AD0.66383EC6-ON85256DA4.004B634E@bmc-pos.com>

Please, read the documentation!
(RTFM!)

> I'm just thinking aloud here, but I think we might be able to code the
> Linux cipe server to be a little more perceptive when it comes to dynamic
> clients. What I'm trying to say is, how about if the cipe server sees a
> packet come in on the appropriate udp port, from a different IP Address
> (with a valid KEY!!!) that the cipe server should immediately switch its
> peer's internet IP address to the source address on the most recent packet
> with a valid KEY.
> In short, each time a valid packet is received, from ANY IP Address (on any
> adapter for that matter) then use the source IP on that packet.
>
> It seems like this would get around the issue of having to know the
> client's internet IP Address.
>
>
> Then my next thought is that this might be succeptible to the well known
> "replay" attack. Which leads me to wonder if the source IP Address is
> encrypted with the packet in such a way that would allow the receiver of
> the packet to know if the source address has been spoofed. . . (?)
>
> --Brad

_____________________________________________

Hans Steegers


<< | Thread Index | >> ]    [ << | Date Index | >> ]