ietf-mxcomp
[Top] [All Lists]

Re: When spoofing is.

2004-03-19 16:49:05

On Sat, Mar 20, 2004 at 12:15:08AM +0100, Alex van den Bogaerdt wrote:

On Fri, Mar 19, 2004 at 10:58:52AM -0800, Mark C. Langston wrote:


So, how should the recipient identify the entity that caused the card to
be sent, and how should the recipient reply to that entity?

Why should the recipient identify this entity?  Those postcard sites are
vulnerable to spoofing, let them fix their own problems.


Because Grandma might like to know which of her grandkids sent the
postcard.

Solving problems by creating problems for others won't aid our efforts.
Particularly when it seems that the problems have been created to
address unspoken motives.


-- 
Mark C. Langston                                    Sr. Unix SysAdmin
mark(_at_)bitshift(_dot_)org                                       
mark(_at_)seti(_dot_)org
Systems & Network Admin                                SETI Institute
http://bitshift.org                               http://www.seti.org


<Prev in Thread] Current Thread [Next in Thread>