However, Vernon Schryver writes30
Note: the supposed security problems of source routing have been grossly exaggerated by ignorant trade rag espurts needing something to write about. They've done more harm than good.
The few applications that still use the IP source address for authentication and authorization should use the setsockopt() to turn off any source route that arrived with the SYN. Applications that use real authentication and authorization don't care.
The evils of IP source routes are similar to the evils of raw IP sockets in Windows XP that are going to lead to the end of the Internet realsoonnow. Both can be misused, but both are quite valuable (e.g. `traceroute -g`) and sane defenses against their misuses don't involve outlawing them.