From: Heiner.Schorn@waldschrat.umu.se
Newsgroups: alt.security
Subject: Re: Fake sources?
Message-ID: <HEINER.SCHORN.91Nov29103202@phaedros.waldschrat.umu.se>
Date: 29 Nov 91 10:32:02 GMT
References: <14617@gollum.UMCS.Maine.EDU> <1991Nov26.080713.1571@news.tu-graz.ac.at>
	<boerp.691286477@mutant.saar.sub.org>
Organization: UMDAC, Umea, Sverige

In article <boerp.691286477@mutant.saar.sub.org> boerp@mutant.saar.sub.org (Arnd Vehling) writes:

>In article <14617@gollum.UMCS.Maine.EDU> who@gandalf.UMCS.Maine.EDU writes:

>>Yes, of course. Depending on the Protocol. For TCP/IP you can read a good
>>summary on Security Problems in
>>S.M.Bellovin,Security Problems in the TCP/IP Protocol Suite, Computer Communi
>>cation Review, Vol 19, No 2, pp 32-48, April 1989. Also downloadable by
>>anonymous ftp from somwhere, can't remember, sorry.

>Is anyone able to name me an ftp-server which contains this document?

You can find it at: research.att.com under: dist/Secure_Internet_Gateway.ps

Btw.: This article is critizised in: S. Kent, "Comments on 'Security Problems 
      in the TCP/IP Protocol Suite", ACM Computer Communication Review, Vol 19,
      No. 3, July 1989, pp. 10-19.

      I don't know if it's available via anonymous FTP.
--
Heiner Schorn  (Heiner.Schorn@waldschrat.umu.se)

