Figure 8.17  Spoofing attack using source routing