In the ipchains HowTo, it mentions that source address verification can be
turned using a little script. This apparently eliminates IP spoofing
without having to write specific rules for IPChains. As a relative
new-comer, I am looking for some feedback regarding this. Should I or
should I not have ip spoof proofing rules in my firewall?
-------------------------------------
Robby Tanner B.E., B.Sc.
Project Engineer
Wardrop Engineering, Inc.
203-2121 Airport Dr.
Saskatoon, SK
Canada
S7L 6W5
Phone: (306) 244-4712
Fax: (306) 244-4754
_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list