Lamar Owen wrote: > On Tuesday, December 07, 2010 05:29:09 am Adam Tauno Williams wrote: >> On Mon, 2010-12-06 at 18:28 -0500, Bob McConnell wrote: >> > No, the downside is that each address used will be exposed to the >> world. > >> False. That is *NOT* a downside. > > In your opinion. Others hold a different opinion. While security through > obscurity doesn't help in many circumstances, there are physical security > controls that absolutely depend upon it, and work. Physical lock and key, > for one (the pinning must be kept obscure). Physical combination locks, > for another; they depend upon keeping the gates in the wheels obscure. > For that matter, any security that depends on any 'secret' is in essence a > security through obscurity technique. Port knocking is a security through > obscurity technique (which works quite well). <snip> Sorry, let me jump in here: how is a "hidden" IP address, whether it's 10.x, or 192.168.x, obscurity. Rather, AFAIK, trying to get there from outside are unreachable, because the addresses are not valid on the 'Net itself. mark _______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx http://lists.centos.org/mailman/listinfo/centos