In what scenarios is relying on source IP address as a security control acceptable?
Say we have the source IP always authenticated. So the source IP is guaranteed to be the sender of the packet.
Would it be able to counter attacks like
SQL Injections
MITM
TCP SYN Flooding
Cross-Site request forgery
or even XSS (cross-site… Continue reading In what scenarios is relying on source IP address as a security control acceptable?