Date: Tue, 29 Feb 2000 11:28:26 -0700 (MST) From: Nate Williams <nate@yogotech.com> To: Garrett Wollman <wollman@khavrinen.lcs.mit.edu> Cc: "Rodney W. Grimes" <freebsd@gndrsh.dnsmgr.net>, freebsd-security@FreeBSD.ORG (All) Subject: Re: ipfw log accounting Message-ID: <200002291828.LAA26051@nomad.yogotech.com> In-Reply-To: <200002291809.NAA57250@khavrinen.lcs.mit.edu> References: <Pine.BSF.4.05.10002291536340.24153-100000@dima.glb.net> <200002291750.JAA82610@gndrsh.dnsmgr.net> <200002291809.NAA57250@khavrinen.lcs.mit.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
> <<On Tue, 29 Feb 2000 09:50:56 -0800 (PST), "Rodney W. Grimes" <freebsd@gndrsh.dnsmgr.net> said: > > > all broadcast traffic, unless you have a very rare installation that > > does not need broadcast packets to work on the directly attached network. > > Not rare at all -- you've just described every network in the world > which has not been inflicted with either RIP or YP/NIS. (This *is* > the security list, after all!) Or DHCP, or BOOTP, or NetBUI, or some forms of NTP, etc... I agree that broadcast protocols are to be avoided, but sometimes they are the best (most effecient as well as most effective) ways of skinning a cat. Sometimes they can't be avoided.... Nate To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200002291828.LAA26051>