[53021] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: How to secure the Internet in three easy steps

daemon@ATHENA.MIT.EDU (Paul Vixie)
Sat Oct 26 23:40:31 2002

From: Paul Vixie <paul@vix.com>
To: nanog@merit.edu
In-Reply-To: Message from Sean Donelan <sean@donelan.com> 
	of "Sat, 26 Oct 2002 17:55:49 -0400."
	<Pine.GSO.4.40.0210261603020.1849-100000@clifden.donelan.com> 
Date: Sun, 27 Oct 2002 03:39:58 +0000
Errors-To: owner-nanog-outgoing@merit.edu


> Source address validation, or more generally anti-spoofing filters, do
> not require providers maintain logs, perform content inspection or
> install firewalls. But source address validation won't stop attacks,
> viruses, child porn, terrorists, gambling, music sharing or any other
> evil that exists in the world. So the proposal "1" gets extended to
> include other stuff.  It gives better ROI when more than SAV is included.

i can see how this could happen.  however, i do not think that it is the
reason why SAV is not gettign deployed.

home help back first fref pref prev next nref lref last post