David Schwartz wrote:
> 
>     Anyone who thinks you can use IP addresses to protect against MIM 
> attacks doesn't understand what a MIM attack is. The MIM can certainly spoof 
> each end's IP address to the other machine.
> 
>     DS

You need to understand it's usage within the autokey protocol to
understand that there's a lot more that goes into it than just the IP
addresses. IP addresses are easy to spoof, but the usage within autokey
is not. You are confusing the addresses for their usage within the protocol.

Danny

_______________________________________________
questions mailing list
[email protected]
https://lists.ntp.isc.org/mailman/listinfo/questions

Reply via email to