I think I am getting a handle on this IP business. Any guru's that care to comment, teach me, correct my errors in understanding, please do.
a) every end node, client computer, ie my windows broswer, is connected to a network that has some range of IP addresses assigned to it. I get one of those IP addresses, either permanently or temporarily, depending upon my connection.
b) When I access a website via my browser, the packets that get sent have a destination IP and a source IP. The destination IP is necessary to route the packet from my client to the web server but the source IP is not used until the server delivers up the page. The the source IP I sent becomes the destination to return the requested data to me.
c) URL's can be easily spoofed because they are only needed for DNS lookup to get the correct IP to load into the packet header. Once that is done, it really doesn't matter what the URL is because the routing data is already in the header.
d) If I were to spoof my IP address in a packet, then I cannot receive any information back since the return IP is no longer valid. But, if my intent is not to receive information, but to be hidden while I send data to the server, then IP spoofing does what I want.
e) Being able to spoof an IP requires being able to get into the TCP/IP stack and alter the outgoing source address in the packet. Apparently, this has long been possible in most flavors of *nix systems, but until the advent of Win 2K, and Win XP, this could not be accomplished in a Windows system.
f) If ISP's (and their routers) were to check the source IP of each outgoing packet from their network, they could easily prevent IP spoofing altogether. If the IP address is not within the network then it must be bogus. Actually, they could be much more granular about this, and actually confirm that a source IP address is within a block of IP's managed by a router.
g) Although more complicated, the ISP could also insure that there are no spoofed URL's or spoofed email addresses, by verifying that the URL or email addy matches an A or MX record in a DNS... again, if there is no return of a valid IP, or the IP returned for the URL/email addy is not within the block serviced by the ISP, then the URL/email addy must be bogus.
h) So, the reality is, that spam email could be stopped if the switches and routers in the networks were programmed to verify that the supposed source headers (whether IP or URL) actually fall within the IP's managed by the ISP.
Do I have this right?