Re: How to secure the Internet in three easy steps

27 Oct
2002
27 Oct
'02
4:39 a.m.
Source address validation, or more generally anti-spoofing filters, do not require providers maintain logs, perform content inspection or install firewalls. But source address validation won't stop attacks, viruses, child porn, terrorists, gambling, music sharing or any other evil that exists in the world. So the proposal "1" gets extended to include other stuff. It gives better ROI when more than SAV is included.
i can see how this could happen. however, i do not think that it is the reason why SAV is not gettign deployed.
8194
Age (days ago)
8194
Last active (days ago)
0 comments
1 participants
participants (1)
-
Paul Vixie