Hi, this text came from a Telstra Security Paper as explaination
of Spoofing. What I don't understand is step 5
>1.the attacker would change her host's IP address to match that of the >trusted client,
>2.the attacker would then construct a source route to the server that >specifies the direct path the IP packets should take to the server and >should take from the server back to the attacker's host, using the
>trusted client as the last hop in the route to the server,
>3.the attacker sends a client request to the server using the source >route,
>4.the server accepts the client request as if it came directly from the >trusted client and returns a reply to the trusted client,
>5.the trusted client, using the source route, forwards the packet on to >the attacker's host.
If the attacker's host and the trusted client both have the same IP
address, Wouldn't the trusted client receive the packet and
process it, regardless of it's source routing options, rather
than passing it on? What am I missing?