Yes, that is obvious due to NAT. Perhaps you got out of sync with the thread, then again maybe it was me which is more than likely the case ;)
-b On Fri, 15 Nov 2002, Meritt James wrote: > The IP address that the destination replies to does not have to be where > the human sits. Consider that the originator's IP is not passed in the > example stated but the business firewall's is. That does not have to be > the only 'via' which alters the IP address. I know quite well that > breadcrumbs are not used. And since I've done it, I reckon it is > possible. > > Bill Hamel wrote: > > > > Hi, > > > > Proxy / Spoof what ? Unless the destination > > knows the source IP, there is no return path. > > > > Remember packets don't leave a trail of bread crumbs so that they can > > find their way back ;) > > > > -b > > > > On Thu, 14 Nov 2002, Meritt James wrote: > > > > > Proxy. Spoofing. > > > > > > Bill Hamel wrote: > > > > > > > > Unless I am missing something in the question, no matter what you do, > > > > what/whoever you connect to through a firewall will always know the IP > > > > address of the the trusted interface of the firewall. > > > > > > > > -bh > > > > > > > > On Wed, 13 Nov 2002, Meritt James wrote: > > > > > > > > > "an" IP Address - not necessarily the originating individual. There are > > > > > a LOT of ways around that. > > > > > > > > > > Jim > > > > > > > > > > [EMAIL PROTECTED] wrote: > > > > > > > > > > > There is nothing new about finding your IP Address and display it on the >web page. > > > > > > > > > > -- > > > > > James W. Meritt CISSP, CISA > > > > > Booz | Allen | Hamilton > > > > > phone: (410) 684-6566 > > > > > > > > > > > -- > > > James W. Meritt CISSP, CISA > > > Booz | Allen | Hamilton > > > phone: (410) 684-6566 > > > > > -- > James W. Meritt CISSP, CISA > Booz | Allen | Hamilton > phone: (410) 684-6566 >
