[2021] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Hacking a Personal Computer via E-mail

daemon@ATHENA.MIT.EDU (Rolf Weber)
Thu May 9 06:51:07 1996

From: Rolf Weber <weber@iez.com>
To: cwg@DeepEddy.Com (Chris Garrigues)
Date: Thu, 9 May 1996 09:22:23 +0200 (MESZ)
Cc: www-security@ns2.rutgers.edu (www-security)
In-Reply-To: <199605081550.KAA18807@deepeddy.DeepEddy.Com> from "Chris Garrigues" at May 8, 96 10:50:46 am
Errors-To: owner-www-security@ns2.rutgers.edu

> 
> > another true story is that any protocol can be used to tunnel another,
> > will say email can be used to tunnel for example telnet. but this requires
> > help from inside.
> 
> eh?
> 
> There is no turing equivalence between protocols....If you're saying that you 
> can run telnet on port 25 to get past packet filters, that's true, but that's 
> not "using email to tunnel telnet".
> 
> You can tunnel a streaming protocol on top of a another streaming protocol, 
> but I hardly see that this means you can run telnet on top of RFC822.
> 
why not?
IP packets are IP packets.
the one side receives this packet from the telnet server and mails it
to the other side, which extracts this packet and sends it to the client.
vice versa the same.
not a performance hit, but it should work.
give me a little time, and i'll write such a tool. :-)

rolf
-- 
-----------------------------------------
Rolf Weber <weber@iez.com> | All I ask is a chance
IEZ AG   D-64625 Bensheim  | to prove that money
++49-6251-1309-113         | can't make me happy.

home help back first fref pref prev next nref lref last post