[37478] in North American Network Operators' Group
Re: To CAIS Engineers - WAKE UP AND TAKE CARE OF YOUR CUSTOMERS
daemon@ATHENA.MIT.EDU (Adam McKenna)
Mon May 14 17:20:35 2001
Date: Mon, 14 May 2001 10:24:54 -0700
From: Adam McKenna <adam@flounder.net>
To: nanog@nanog.org
Message-ID: <20010514102454.F6987@flounder.net>
Mail-Followup-To: nanog@nanog.org
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20010514114605.C1472@semihuman.com>
Errors-To: owner-nanog-outgoing@merit.edu
On Mon, May 14, 2001 at 11:46:05AM -0400, Christopher A. Woodfield wrote:
> Reverse DNS by itself is insufficient for authentication, but
> enforcing matching forward and reverse DNS entries is much more reliable
> (no substitute for secret-based or cert-based authentication, but a good
> "front door" for something like tcp wrappers). at last check, tcpd and sshd
> can both be configured to block connections without matching forward/reverse
> records.
No. This is joke security, as is any security that relies on hostnames. TCP
wrappers is basically worthless as a security measure unless you are using
IP-based rules. And even then, it's deprecated in favor of kernel
firewalling (In Linux) or ipfilter (on BSD's and other platforms that support
it).
--Adam