[2011] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Hacking a Personal Computer via E-mail

daemon@ATHENA.MIT.EDU (Chris Garrigues)
Wed May 8 16:36:53 1996

To: Rolf Weber <weber@iez.com>
Cc: 69100476@bdi-stu.hsmaastricht.nl,
        www-security@ns2.rutgers.edu (www-security), cwg@deepeddy.DeepEddy.Com
In-Reply-To: Your message of "Wed, 08 May 1996 10:14:18 +0200."
             <9605080814.AA16983@spibm02> 
Date: Wed, 08 May 1996 10:50:46 -0500
From: Chris Garrigues <cwg@DeepEddy.Com>
Errors-To: owner-www-security@ns2.rutgers.edu

-----BEGIN PGP SIGNED MESSAGE-----

Content-Type: text/plain; charset=us-ascii

> another true story is that any protocol can be used to tunnel another,
> will say email can be used to tunnel for example telnet. but this requires
> help from inside.

eh?

There is no turing equivalence between protocols....If you're saying that you 
can run telnet on port 25 to get past packet filters, that's true, but that's 
not "using email to tunnel telnet".

You can tunnel a streaming protocol on top of a another streaming protocol, 
but I hardly see that this means you can run telnet on top of RFC822.

(And I agree that this has little to do with www-security.)

Chris

- -- 
Chris Garrigues                    O-              cwg@DeepEddy.Com
  Deep Eddy Internet Consulting                     +1 512 432 4046
  609 Deep Eddy Avenue
  Austin, TX  78703-4513              http://www.DeepEddy.Com/~cwg/



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQB1AwUBMZDC0ZaQnaaFII2dAQFH5wMAjPG2GdWS6zzAFQEce/AP5xL5POFhOvu7
2nevMZgH5/btDW5s+HodVhLAlqK0ys6KXeiYCsJKnnLBRcWyt1sDzUVHIVYvrWK5
sB+4ENNOYRgUaHKiMaQ/r/nls81QX8Az
=7oI9
-----END PGP SIGNATURE-----

home help back first fref pref prev next nref lref last post