On Tue, 5 Sep 2000, Barry W. Kokotailo wrote:

> You can probably run any routing protocol that the operating system
> supports. But the use of dynamic routing protocols on any firewall is
> a bad thing to do.

why? if i protect the system, chroot the gated daemon, use strong hashes
for authentication, limit the ip addresses which can send updates, what is
the vulnerability? 

or are you just repeating what you have heard?

there are no absolutes in security.

- brett




================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to