Sign Up | Log In
GENERAL DISCUSSIONS
It would be a kindness...
Sunday, February 24, 2008 6:01 PM
JSTN
Sunday, February 24, 2008 6:27 PM
Sunday, February 24, 2008 7:06 PM
Sunday, February 24, 2008 7:46 PM
ASARIAN
Sunday, February 24, 2008 10:11 PM
SUASOR
Monday, February 25, 2008 2:47 AM
SISTER
Monday, February 25, 2008 4:55 AM
Monday, February 25, 2008 7:26 AM
Monday, February 25, 2008 9:02 AM
Monday, February 25, 2008 10:09 AM
Monday, February 25, 2008 9:53 PM
Tuesday, February 26, 2008 12:15 AM
Quote:Cookie removal and IP spoofing would probably allow you to vote continuously.
Tuesday, February 26, 2008 5:08 AM
Tuesday, February 26, 2008 6:00 AM
Quote:Originally posted by asarian: Quote:Cookie removal and IP spoofing would probably allow you to vote continuously. There's no such thing as IP spoofing. At least not for TCP/IP spoofing (which is what folks usually mean when they're talking about IP spoofing). The IP protocol operates at layer 3 of the OSI model. It's a 'connectionless' model, meaning there's no information regarding transaction state, used to route packets on a network. Additionally, there is no method to acknowledge a packet's proper delivery. IP can be thought of as a routing wrapper for layer 4 (transport) of the OSI model, which contains the Transmission Control Protocol (TCP). Unlike IP, participants in a TCP session must first build a connection. This is done via a 3-way, two roundtrips handshake (SYN-SYN/ACK-ACK) that continually update one another, via sequences and ACKnowledgements. The client first sends a SYN packet. The server then responds with its own SYN/ACK, acknowledging the client's SYN. This acknowledgement is sent back to the source IP of the incoming packet. Which ACK, if the IP were faked, would never reach the faker. So, things end right there. Back in the early day, it was relatively easy to spoof a TCP/IP connection, using sequence number prediction. These days, however, every OS uses fair decent random sequence number generators, making predicting sequence numbers as good as totally impossible. So, basically, the Jericho folks could spoof incoming SYN packets (which is really what a spoofed IP attack is). But beyond that, since HTTP goes over TCP/IP as well, of course, there's no way they could establish (not just set up) valid TCP/IP sessions with the voting server. -- "Mei-mei, everything I have is right here." -- Simon Tam
Tuesday, February 26, 2008 9:06 AM
Quote:Originally posted by Suasor: OK, so I dated myself. Should have just said spoofing. The implication that they are getting around the vote restrictions (once every six hours), implies succcess at getting the host to believe that the same voter, is actually a different voter, as a large number of votes are cast via a single session.
Tuesday, February 26, 2008 10:47 AM
STOWEAWAY
Quote:Originally posted by asarian: They're believers. Intelligent, methodical, and devout in their belief that voting in their show is the right thing to do.
Tuesday, February 26, 2008 12:24 PM
Quote:Originally posted by asarian: Quote:Originally posted by Suasor: OK, so I dated myself. Should have just said spoofing. The implication that they are getting around the vote restrictions (once every six hours), implies succcess at getting the host to believe that the same voter, is actually a different voter, as a large number of votes are cast via a single session. Or, they simply bested us. Could be they're just better organized. They're believers. Intelligent, methodical, and devout in their belief that voting in their show is the right thing to do. -- "Mei-mei, everything I have is right here." -- Simon Tam
YOUR OPTIONS
NEW POSTS TODAY
OTHER TOPICS
FFF.NET SOCIAL