home *** CD-ROM | disk | FTP | other *** search
- From: Heiner.Schorn@waldschrat.umu.se
- Newsgroups: alt.security
- Subject: Re: Fake sources?
- Message-ID: <HEINER.SCHORN.91Nov29103202@phaedros.waldschrat.umu.se>
- Date: 29 Nov 91 10:32:02 GMT
- References: <14617@gollum.UMCS.Maine.EDU> <1991Nov26.080713.1571@news.tu-graz.ac.at>
- <boerp.691286477@mutant.saar.sub.org>
- Organization: UMDAC, Umea, Sverige
-
- In article <boerp.691286477@mutant.saar.sub.org> boerp@mutant.saar.sub.org (Arnd Vehling) writes:
-
- >In article <14617@gollum.UMCS.Maine.EDU> who@gandalf.UMCS.Maine.EDU writes:
-
- >>Yes, of course. Depending on the Protocol. For TCP/IP you can read a good
- >>summary on Security Problems in
- >>S.M.Bellovin,Security Problems in the TCP/IP Protocol Suite, Computer Communi
- >>cation Review, Vol 19, No 2, pp 32-48, April 1989. Also downloadable by
- >>anonymous ftp from somwhere, can't remember, sorry.
-
- >Is anyone able to name me an ftp-server which contains this document?
-
- You can find it at: research.att.com under: dist/Secure_Internet_Gateway.ps
-
- Btw.: This article is critizised in: S. Kent, "Comments on 'Security Problems
- in the TCP/IP Protocol Suite", ACM Computer Communication Review, Vol 19,
- No. 3, July 1989, pp. 10-19.
-
- I don't know if it's available via anonymous FTP.
- --
- Heiner Schorn (Heiner.Schorn@waldschrat.umu.se)
-
-