Hello Dean,
On Fri, Jun 01, 2007 at 12:07:48AM -0400, Dean Anderson wrote:
> On Thu, 31 May 2007, Andrew Sullivan wrote:
> >
> > The popular TCP Wrapper package was originally conceived to discover
> > the network location of an attacker [Venema1992].
>
> No. Early TCP wrappers just provided l
At 23:41 -0400 5/31/07, Dean Anderson wrote:
I don't know of anyone ever using reverse DNS to enforce export control
of crypto software.
We ("we" referring to my employer in 1997) did.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis
I At 11:07 AM -0400 6/1/07, Edward Lewis wrote:
>At 23:41 -0400 5/31/07, Dean Anderson wrote:
>
>>I don't know of anyone ever using reverse DNS to enforce export control
>>of crypto software.
>
>We ("we" referring to my employer in 1997) did.
I can confirm Ed's point that reverse DNS lookup was th
At 13:08 -0400 6/1/07, Russ Mundy wrote:
considered adequate by the government officials (even though I always
thought that it was a Really Dumb control!).
Well, you could (cynically) argue it was quite effective and
efficient. And we are speaking from operational experience and not
conjectu