never hurts to make sure someone is really coming from where they say they
are...
> -----Original Message-----
> From: Tanner, Robby [SMTP:[EMAIL PROTECTED]]
> Sent: Thursday, February 01, 2001 3:31 PM
> To: '[EMAIL PROTECTED]'; 'Linux Group (Saskatoon)'; 'Linux (LOSURS
> Q&A)'
> Subject: Source Address Verification
>
> In the ipchains HowTo, it mentions that source address verification can be
> turned using a little script. This apparently eliminates IP spoofing
> without having to write specific rules for IPChains. As a relative
> new-comer, I am looking for some feedback regarding this. Should I or
> should I not have ip spoof proofing rules in my firewall?
>
> -------------------------------------
>
> Robby Tanner B.E., B.Sc.
> Project Engineer
> Wardrop Engineering, Inc.
> 203-2121 Airport Dr.
> Saskatoon, SK
> Canada
> S7L 6W5
>
> Phone: (306) 244-4712
> Fax: (306) 244-4754
>
>
>
>
> _______________________________________________
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list
_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list