this post was submitted on 17 Dec 2024
273 points (98.9% liked)

Not The Onion

12529 readers
839 users here now

Welcome

We're not The Onion! Not affiliated with them in any way! Not operated by them in any way! All the news here is real!

The Rules

Posts must be:

  1. Links to news stories from...
  2. ...credible sources, with...
  3. ...their original headlines, that...
  4. ...would make people who see the headline think, “That has got to be a story from The Onion, America’s Finest News Source.”

Comments must abide by the server rules for Lemmy.world and generally abstain from trollish, bigoted, or otherwise disruptive behavior that makes this community less fun for everyone.

And that’s basically it!

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] lurch -1 points 15 hours ago (1 children)

no, for your IP packages that you spoofed the sender adress on. how do you think the remote host will reach it?

[–] [email protected] 3 points 15 hours ago (1 children)
[–] lurch -1 points 15 hours ago (1 children)

when you open an IP connection for your phone call or your VPN, there need three packages to be sent back and forth. you won't get the second one if you spoofed the IP, hence the call or VPN won't even start.

[–] [email protected] 3 points 15 hours ago (1 children)
[–] lurch -2 points 14 hours ago* (last edited 14 hours ago) (1 children)

i don't think that means what you think it does. it just changes who knows your IP to another node. if you want to establish a connection there will be someone who knows your real IP. how else will you recieve a reply package to complete a connection?

[–] [email protected] 1 points 14 hours ago (1 children)

I'm not here to argue with you or teach you. It's really not an advanced concept. If you're lost go talk with ChatGPT or something.

[–] lurch -1 points 14 hours ago (1 children)

oh i'm not lost. i'm a network specialist

[–] [email protected] 3 points 14 hours ago* (last edited 14 hours ago) (1 children)

...then you should know how to spoof a call. Kinda embarrassing that you dont.

Dunning Kruger called...

[–] lurch -1 points 14 hours ago (1 children)

my coworkers found your replies hilarious. was nice talking to you bro

[–] [email protected] 3 points 14 hours ago* (last edited 14 hours ago) (1 children)

You're straight up embarrassing yourself on a forum full of highly technical people. I won't be surprised when you delete your comments.

You're confidently conflating two very different things: basic IP spoofing that breaks TCP connections and the use of a reverse proxy to mask an IP address during communication. Let me explain why you're wrong and how the process actually works.

  1. IP Spoofing for One-Way Traffic:

When you "spoof" an IP, you modify the source address in a packet to make it appear as if it came from somewhere else.

You're right that for a full TCP connection, the three-way handshake (SYN → SYN-ACK → ACK) won't complete because the response (SYN-ACK) goes to the spoofed IP, not to the actual sender. This is basic networking, and no one is arguing that.

  1. Reverse Proxy Basics:

Here's where you get it wrong: a reverse proxy or intermediary server is not IP spoofing in the raw packet sense.

The reverse proxy establishes the connection with the target server on your behalf. It completes the handshake, relays data to/from the target, and forwards the responses back to you.

Your actual IP never touches the target because all the traffic appears to come from the proxy.

Simplified Flow:

VM (Google Voice) → VPN (Mullvad, paid with cash) → Reverse Proxy → Target Hotline

The target sees the reverse proxy's IP, not yours. The reverse proxy handles the replies and sends them back to your system.

  1. Why This Works:

You only need to maintain a stable connection with the reverse proxy. The proxy takes care of everything else, including interacting with the target server or hotline.

This is not spoofing mid-connection traffic; this is using a relay to abstract your origin. It’s a fundamental networking concept used for load balancing, anonymity, and even services like Cloudflare.

  1. Google Voice Context:

The call originates from a VM, using Mullvad to mask your real IP. If you route the call through a reverse proxy, the target hotline only interacts with the proxy's IP.

You maintain full two-way communication because the proxy handles and relays replies, ensuring nothing breaks.

TL;DR: You're incorrectly applying the concept of raw IP spoofing (which doesn't work for full communication) to a process that involves a reverse proxy or VPN, where the proxy legitimately completes the connection and forwards traffic. If you're a "network specialist," you should know this. The fact that you don't is what's truly embarrassing.

And now, I block you. I won't waste my time talking to morons who are so confidently incorrect.

[–] lurch 1 points 14 hours ago

lol, in that case the VPN provider has your real IP and all networking equipment from us providers in between you and the VPN