[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: -03 posted
- To: Emir Arslanagic <emir@cw.net>
- Subject: RE: -03 posted
- From: George Jones <gmj@pobox.com>
- Date: Tue, 16 Dec 2003 13:18:54 -0500 (EST)
- Cc: opsec@ops.ietf.org
- In-reply-to: <NABBIILLLMCFCBEGLNHEKEOFDKAB.emir@cw.net>
- References: <NABBIILLLMCFCBEGLNHEKEOFDKAB.emir@cw.net>
- Reply-to: gmj@pobox.com
Are you still at CW ?
On Tue, 16 Dec 2003, Emir Arslanagic wrote:
> > 1.8 Definitions
> > ...
> > Spoofed Packet.
> > A "spoofed packet" is defined as a "packet having a source address
> > that, by application of the current forwarding tables, would not
> > have its return traffic routed back through the interface on which
> > it was received."
Does this get it ?
s/back through the interface on which it was received/to the sender/
>
> George,
>
> What about asymmetric routing or dual homed networks? Sometimes enterprises
> or ISPs have valid reason to exclusively send packets via one
> interface/device and receive response via another interface/device. Per
> definition from the DRAFT all those packets will be treated as spoofed by
> upstream device/ISP.
>
> I would suggest to define spoofed packet as:
>
> A "spoofed packet" is defined as a "packet having a source address
> that , by application of the current forwarding tables, would not
> have its return traffic routed back to the originating device."
>
> Thanks,
>
> --Emir
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> Emir Arslanagic
> Cable and Wireless
> Director of Network Security
> Engineering and Infrastructure
> Desk: +49 89 9269 9115
> Desk2: +44 207 945 8115
> Mobile: +49 172 898 6797
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Aparently so... :-)
Let me know if you get another bounce. I'll bug randy.
You don't happen to have a log of the SMTP session ?
---George