never hurts to make sure someone is really coming from where they say they
are...

> -----Original Message-----
> From: Tanner, Robby [SMTP:[EMAIL PROTECTED]]
> Sent: Thursday, February 01, 2001 3:31 PM
> To:   '[EMAIL PROTECTED]'; 'Linux Group (Saskatoon)'; 'Linux (LOSURS
> Q&A)'
> Subject:      Source Address Verification
> 
> In the ipchains HowTo, it mentions that source address verification can be
> turned using a little script.  This apparently eliminates IP spoofing
> without having to write specific rules for IPChains.  As a relative
> new-comer, I am looking for some feedback regarding this.  Should I or
> should I not have ip spoof proofing rules in my firewall? 
> 
> -------------------------------------
> 
> Robby Tanner B.E., B.Sc.
> Project Engineer
> Wardrop Engineering, Inc.
> 203-2121 Airport Dr.
> Saskatoon, SK
> Canada
> S7L 6W5
> 
> Phone: (306) 244-4712
> Fax:     (306) 244-4754
> 
> 
> 
> 
> _______________________________________________
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to