On Saturday 27 March 2004 15:20, James Craig Burley wrote: > >On 25 Mar 2004, James Craig Burley wrote: > >> Basically true, but that's only one aspect of tarpitting. Since the > >> spammer has to keep open an available port, that's one less port he > >> can use from any given IP address (using vanilla port management) to > >> blast out his spam. > > > >No. That's one less port he can use to connect to you (on any given > >destination port). He can still use the same source port to connect to > >others. TCP connections are four-tuples. > > Should I not trust O'Reilly's "TCP/IP Network Administration", by > Craig Hunt, Second Edition, page 46, where it says, among other things > consistent with this, > > It is the pair of port numbers, source and destination, that > uniquely identifies each network connection. > > or do you think it is just simplifying things for the benefit of its > audience?
I think there is an implicit 'between two given hosts' at the end of the O'Reilly sentance. -- Rasjid Wilcox Canberra, Australia (UTC +11 hrs) http://www.openminddev.net
