IDS mailing list archives

Re: Firewalls (was Re: IDS evaluations procedures)


From: Richard Bejtlich <taosecurity () gmail com>
Date: Thu, 21 Jul 2005 20:25:25 -0400

On 7/20/05, Devdas Bhagat <devdas () dvb homelinux org> wrote:

Personally, it is a step backwards from proxy firewalls with an inverted
security model.

Proxy firewalls! If it is worth doing, it is worth doing it right.

Devdas Bhagat


Good point!  After reading this MJR rant, I asked him to contribute
thoughts on proxies to my next book. [1]

Sincerely,

Richard
http://www.taosecurity.com

[1] http://www.ranum.com/security/computer_security/editorials/deepinspect/index.html

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it
with real-world attacks from CORE IMPACT.
Go to http://www.securityfocus.com/sponsor/CoreSecurity_focus-ids_040708
to learn more.
------------------------------------------------------------------------


Current thread: