Date: Mon, 18 Mar 2002 19:13:43 +0000 From: Philip Reynolds <phil@Redbrick.DCU.IE> To: freebsd-security@freebsd.org Subject: Re: Is PortSentry really safe to use? Message-ID: <20020318191343.B4432@prodigy.Redbrick.DCU.IE> In-Reply-To: <20020318183415.E1000@dedog.argus-systems.co.uk>; from cameron@argus-systems.com on Mon, Mar 18, 2002 at 06:34:15PM %2B0000 References: <2332.213.112.58.232.1016226432.squirrel@phucking.kicks-ass.org> <20020318183415.E1000@dedog.argus-systems.co.uk>
next in thread | previous in thread | raw e-mail | index | archive | help
Fergus Cameron's [cameron@argus-systems.com] 43 lines of wisdom included: > surely it wouldn't be possible to spoof an attack 'through' a gateway ? > would the gateway not reject the traffic as invalid ? otherwise it > would pass traffic apparently from itself but recieved on the wrong > interface. > > ? ? > > i realise the principle of the problem still applies - but would this > specific application work ? A good comparison of Port Sentry and Snort is at: http://www.linux.ie/articles/portsentryandsnortcompared.php Phil. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020318191343.B4432>