Congratulations... you just invented the firewall ;-).

More seriously: The basic problem will still remain: What is used as a 
trigger to establish the route? How will you distinguish between 'good 
connections' (for which you are building the route) and 'bad connections' 
which are ignored.
 

On Tue, 30 Oct 2001, John Oliver wrote:

> A thought just occurred to me... desktop systems (and even some servers)
> could be almost completely secure if there was a way to dynamically
> allocate and de-allocate routes.  If your system has no default route,
> it ought to be safe from any TCP-based attack.  If routes to remote
> networks could be dynamically added as needed, and then removed, it
> seems that it would be virtually impossible for an outsider to even see
> that the host exists, let alone be able to root it.
> 
> Ideas?  Am I just way off the deep end here? :-)
> 
> 

-- 
-------
[EMAIL PROTECTED]                    Join http://www.DShield.org
                          Distributed Intrusion Detection System


Reply via email to