nanog mailing list archives
Re: How to secure the Internet in three easy steps
From: Paul Vixie <paul () vix com>
Date: Sun, 27 Oct 2002 03:39:58 +0000
Source address validation, or more generally anti-spoofing filters, do not require providers maintain logs, perform content inspection or install firewalls. But source address validation won't stop attacks, viruses, child porn, terrorists, gambling, music sharing or any other evil that exists in the world. So the proposal "1" gets extended to include other stuff. It gives better ROI when more than SAV is included.
i can see how this could happen. however, i do not think that it is the reason why SAV is not gettign deployed.
Current thread:
- Re: How to secure the Internet in three easy steps, (continued)
- Re: How to secure the Internet in three easy steps Paul Vixie (Oct 25)
- Re: How to secure the Internet in three easy steps Sean Donelan (Oct 25)
- Re: How to secure the Internet in three easy steps Scott Granados (Oct 25)
- Re: How to secure the Internet in three easy steps batz (Oct 25)
- Re: How to secure the Internet in three easy steps Paul Vixie (Oct 25)
- Re: How to secure the Internet in three easy steps Sean Donelan (Oct 26)
- Odd behavior Joe (Oct 26)
- Re: Odd behavior Allan Liska (Oct 26)
- Re: Odd behavior Joe (Oct 26)
- Re: Odd behavior Scott Granados (Oct 27)
- Re: How to secure the Internet in three easy steps Paul Vixie (Oct 26)
- RE: How to secure the Internet in three easy steps Eric M. Carroll (Oct 27)
- Re: How to secure the Internet in three easy steps Matthew S. Hallacy (Oct 27)
- Re: How to secure the Internet in three easy steps Joseph Barnhart (Oct 27)
- Re: How to secure the Internet in three easy steps William Warren (Oct 27)
- Re: How to secure the Internet in three easy steps Christopher Schulte (Oct 27)
- RE: How to secure the Internet in three easy steps Vivien M. (Oct 27)
- RE: How to secure the Internet in three easy steps alex (Oct 28)
- RE: How to secure the Internet in three easy steps Scott Granados (Oct 28)
- Re: How to secure the Internet in three easy steps Valdis . Kletnieks (Oct 28)
- Re: How to secure the Internet in three easy steps Joe (Oct 27)