On Wed, 2003-10-15 at 17:41, Bill Carlson wrote:
> On 15 Oct 2003, Jason Dixon wrote:

> > This type of information could probably be gathered via NANOG or the
> > ICANN site.  However, if I haven't stressed it enough already, I highly
> > suggest you avoid this route.  IT WILL NOT WORK like you intend. 
> > Remember, IP addresses are easily spoofed.
> 
> I disagree. You're correct, this is no defense against spoofing, but it 
> certainly does raise the bar for potential attackers. And for the cost of 
> setting it up, the payoff is more than enough. Blocking these IP ranges is 
> certainly no replacement for good practices (patching, thoughtful 
> configuration, etc.).

I'm sorry, but I have to continue to disagree with you.  Try any current
exploit/scanner utilities;  most of them come with a "spoof" flag.  Many
of the pre-made exploits available to script kiddies come with this
behavior enabled by default.

Go ahead and use it if you wish.  More power to you.

-- 
Jason Dixon, RHCE
DixonGroup Consulting
http://www.dixongroup.net


-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]
https://www.redhat.com/mailman/listinfo/redhat-list

Reply via email to