Many of the protocols in the TCP/IP suite do not provide mechanisms for authenticating the source or destination of a message.
They are thus vulnerable to spoofing attacks when extra precautions are not taken by applications to verify the identity of the sending or receiving host.