On Saturday 27 March 2004 15:20, James Craig Burley wrote:
> >On 25 Mar 2004, James Craig Burley wrote:
> >> Basically true, but that's only one aspect of tarpitting.  Since the
> >> spammer has to keep open an available port, that's one less port he
> >> can use from any given IP address (using vanilla port management) to
> >> blast out his spam.
> >
> >No. That's one less port he can use to connect to you (on any given
> >destination port). He can still use the same source port to connect to
> >others. TCP connections are four-tuples.
>
> Should I not trust O'Reilly's "TCP/IP Network Administration", by
> Craig Hunt, Second Edition, page 46, where it says, among other things
> consistent with this,
>
>   It is the pair of port numbers, source and destination, that
>   uniquely identifies each network connection.
>
> or do you think it is just simplifying things for the benefit of its
> audience?

I think there is an implicit 'between two given hosts' at the end of the 
O'Reilly sentance.

-- 
Rasjid Wilcox
Canberra, Australia (UTC +11 hrs)
http://www.openminddev.net

Reply via email to