From owner-freebsd-chat Wed May 15 8:58:52 2002 Delivered-To: freebsd-chat@freebsd.org Received: from williams.mc.vanderbilt.edu (williams.mc.Vanderbilt.Edu [160.129.208.222]) by hub.freebsd.org (Postfix) with SMTP id 83D5037B405 for ; Wed, 15 May 2002 08:58:48 -0700 (PDT) Received: (qmail 28387 invoked by uid 19192); 15 May 2002 15:59:01 -0000 Date: Wed, 15 May 2002 10:59:00 -0500 To: freebsd-chat@freebsd.org Subject: Re: internal hosts in email Message-ID: <20020515155900.GA16671@williams.mc.vanderbilt.edu> References: <3CE2702A.A67642FE@centtech.com> <20020515150303.GU16671@williams.mc.vanderbilt.edu> <3CE27B5F.EB6D7F4F@centtech.com> <20020515152446.GW16671@williams.mc.vanderbilt.edu> <3CE2811F.9325CAA7@centtech.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <3CE2811F.9325CAA7@centtech.com> User-Agent: Mutt/1.3.99i X-GPG-Key: 0x727A9DD2 (http://drew.rain3s.net/pubkey.asc) From: Drew Raines Mail-Followup-To: freebsd-chat@freebsd.org X-Delivery-Agent: TMDA/0.55+ Sender: owner-freebsd-chat@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org Eric Anderson wrote: > > Security is something that takes place throughout the network, not > just on the firewall (firewalls in my case). Are you saying it's > perfectly safe to bleed internal host information out to the world? > What about simply removing the IP addresses, and leaving the > hostnames in? You're missing the forest for the trees. Why hide information which is only useful once your firewall is compromised? Why hide information which is trivially learned once your firewall is compromised? Why hide relatively harmless infor- mation which could be useful? Use your energy on something more productive. -- Drew To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-chat" in the body of the message