[37478] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: To CAIS Engineers - WAKE UP AND TAKE CARE OF YOUR CUSTOMERS

daemon@ATHENA.MIT.EDU (Adam McKenna)
Mon May 14 17:20:35 2001

Date: Mon, 14 May 2001 10:24:54 -0700
From: Adam McKenna <adam@flounder.net>
To: nanog@nanog.org
Message-ID: <20010514102454.F6987@flounder.net>
Mail-Followup-To: nanog@nanog.org
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20010514114605.C1472@semihuman.com>
Errors-To: owner-nanog-outgoing@merit.edu


On Mon, May 14, 2001 at 11:46:05AM -0400, Christopher A. Woodfield wrote:
> Reverse DNS by itself is insufficient for authentication, but 
> enforcing matching forward and reverse DNS entries is much more reliable 
> (no substitute for secret-based or cert-based authentication, but a good 
> "front door" for something like tcp wrappers). at last check, tcpd and sshd 
> can both be configured to block connections without matching forward/reverse 
> records.

No.  This is joke security, as is any security that relies on hostnames.  TCP
wrappers is basically worthless as a security measure unless you are using
IP-based rules.  And even then, it's deprecated in favor of kernel
firewalling (In Linux) or ipfilter (on BSD's and other platforms that support 
it).

--Adam


home help back first fref pref prev next nref lref last post