andy... right.... which means that a mitm attack would have to appear to be both the client/server to the actual server/client... but if what you say is true... then mitm attacks aren't really possible with a server/app in the middle of the client/server. keep in mind, i'm not sure this kind of attack is really worth worrying about. but i am concerned. -bruce -----Original Message----- From: fedora-list-bounces@xxxxxxxxxx [mailto:fedora-list-bounces@xxxxxxxxxx]On Behalf Of Andy Green Sent: Tuesday, June 07, 2005 8:21 AM To: For users of Fedora Core releases Subject: Re: tcp/routing question... -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 bruce wrote: | are you sure about this...?? | | here's my question... | client (a) --->>>> bank server (b) | client (a) <<<--- bank server (b) | | if server b gets the data/information from 'a', server 'b should get ip | address 1.2.3.4, which is the real ip address of client 'a'. | | is there away for a mitm server, to get in the middle, manipulate the data | from 'a' to 'b', send the data to 'b' and spoof the ip address to look as | though the data came from 'a'.. Google "three way handshake". If the MITM machine pretends to be 1.2.3.4, then the bank server is going to address its replies to 1.2.3.4 and not the MITM machine. - -Andy -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org iD8DBQFCpbtVjKeDCxMJCTIRAiNJAJ9AMeOAHbicElNSOMdE2zkbX66CxwCeJN/D GKCKfLYL/bjbiJ1cZdDBPgQ= =NqAW -----END PGP SIGNATURE----- -- fedora-list mailing list fedora-list@xxxxxxxxxx To unsubscribe: http://www.redhat.com/mailman/listinfo/fedora-list