On Wed, 2003-10-15 at 17:41, Bill Carlson wrote: > On 15 Oct 2003, Jason Dixon wrote: > > This type of information could probably be gathered via NANOG or the > > ICANN site. However, if I haven't stressed it enough already, I highly > > suggest you avoid this route. IT WILL NOT WORK like you intend. > > Remember, IP addresses are easily spoofed. > > I disagree. You're correct, this is no defense against spoofing, but it > certainly does raise the bar for potential attackers. And for the cost of > setting it up, the payoff is more than enough. Blocking these IP ranges is > certainly no replacement for good practices (patching, thoughtful > configuration, etc.). I'm sorry, but I have to continue to disagree with you. Try any current exploit/scanner utilities; most of them come with a "spoof" flag. Many of the pre-made exploits available to script kiddies come with this behavior enabled by default. Go ahead and use it if you wish. More power to you. -- Jason Dixon, RHCE DixonGroup Consulting http://www.dixongroup.net -- redhat-list mailing list unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe https://www.redhat.com/mailman/listinfo/redhat-list