Quoting Andrew Sayers ([EMAIL PROTECTED]):

> In practice, even a very low security barrier will stop the 90% of
> clueless abusers - but (to drag this thread bag on-topic), that's no
> excuse for basing the security of your network on a fundamentally
> insecure way of identifying computers.

Right.  If you want to control access meaningfully, you have to do 
it at some other level, e.g., a separate user login mechanism required
before your newly issued IP address is routed to anything beyond the 
authentication server.

-- 
Cheers,                              Yes, I _am_ an agent of Satan, 
Rick Moen                            but my duties are largely ceremonial.
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to