What should I do?

Paul Vixie paul@vix.com
Tue Jun 24 17:04:10 UTC 2003


if you want dcc to be immune to inappropriate use (like testing spam
generators against it, or monitoring spam runs through it) then you
will need cryptoauthentic goo, since ip source addresses are a dime
a dozen, and if someone wants to misuse the system and the only thing
stopping them is their ip address, then they'll just get another
connection.



More information about the DCC mailing list

Contact vjs@rhyolite.com by mail or use the form.