Authentication by IP is a bad idea, restricting who can connect in the
first place and proceed to authentication stage is a further line of

Having been an enterprise firewall admin in the midst of previously
established enterprise firewall admins, the "going wisdom" is that you
always set rules by IP rather than DNS.  When pressed for a reason,
especially given that Cisco PIX allow DNS rules, they always resorted
to the koan of "that's the way it's always been done - DNS can be
poisoned or the source of a DoS".  phbbbttt

My response: if someone is in the position to poison my DNS, they're
already in the position to spoof a trusted IP and likely a whole lot
more.  For that matter, they're likely already inside my network.  If
the allow/block is critical enough to require the *tiny* edge provided
by IP-based rules, then the client will be critical enough to have a
statically assigned IP.


RB

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to