At 1/15/2002 03:30 PM -0800, you wrote:
>But you can also restrict access to hosts in the ipchains/iptables scripts.
>I use tcpwrappers also, but technically, I think it is correct, if you
>blocked access at the firewall level, the request would never be seen by the
>tcp wrapper daemon. ipchains and iptables happen at the kernel/networking
>layer. Isn't this correct?

Correct. But defense in depth is your friend. Someday you may break your 
packet filter, or configure it improperly by mistake. Someday there may be 
a bug in the code that allows people to get through. Any second line of 
defense is useless *until* that happens... then it's priceless.


--
Rodolfo J. Paiz
[EMAIL PROTECTED]



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to