Re: How to secure the Internet in three easy steps
26 Oct
2002
26 Oct
'02
11:39 p.m.
Source address validation, or more generally anti-spoofing filters, do not require providers maintain logs, perform content inspection or install firewalls. But source address validation won't stop attacks, viruses, child porn, terrorists, gambling, music sharing or any other evil that exists in the world. So the proposal "1" gets extended to include other stuff. It gives better ROI when more than SAV is included.
i can see how this could happen. however, i do not think that it is the reason why SAV is not gettign deployed.
8093
Age (days ago)
8093
Last active (days ago)
0 comments
1 participants
participants (1)
-
Paul Vixie