But isn't that what SAV does?
> -----Original Message-----
> From: Burke, Thomas G. [mailto:[EMAIL PROTECTED]]
> Sent: Thursday, February 01, 2001 3:28 PM
> To: '[EMAIL PROTECTED]'
> Subject: RE: Source Address Verification
>
>
> never hurts to make sure someone is really coming from where
> they say they
> are...
>
> > -----Original Message-----
> > From: Tanner, Robby [SMTP:[EMAIL PROTECTED]]
> > Sent: Thursday, February 01, 2001 3:31 PM
> > To: '[EMAIL PROTECTED]'; 'Linux Group (Saskatoon)';
> 'Linux (LOSURS
> > Q&A)'
> > Subject: Source Address Verification
> >
> > In the ipchains HowTo, it mentions that source address
> verification can be
> > turned using a little script. This apparently eliminates
> IP spoofing
> > without having to write specific rules for IPChains. As a relative
> > new-comer, I am looking for some feedback regarding this.
> Should I or
> > should I not have ip spoof proofing rules in my firewall?
> >
> > -------------------------------------
> >
> > Robby Tanner B.E., B.Sc.
> > Project Engineer
> > Wardrop Engineering, Inc.
> > 203-2121 Airport Dr.
> > Saskatoon, SK
> > Canada
> > S7L 6W5
> >
> > Phone: (306) 244-4712
> > Fax: (306) 244-4754
> >
> >
> >
> >
> > _______________________________________________
> > Redhat-list mailing list
> > [EMAIL PROTECTED]
> > https://listman.redhat.com/mailman/listinfo/redhat-list
>
>
>
> _______________________________________________
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list
>
_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list