[2029] in WWW Security List Archive
Re: Hacking a Personal Computer via E-mail
daemon@ATHENA.MIT.EDU (carson@lehman.com)
Thu May 9 16:44:44 1996
From: carson@lehman.com
Date: Thu, 9 May 1996 14:09:54 -0400
To: Chris Garrigues <cwg@DeepEddy.Com>
Cc: Rolf Weber <weber@iez.com>, 69100476@bdi-stu.hsmaastricht.nl,
www-security@ns2.rutgers.edu (www-security), cwg@deepeddy.DeepEddy.Com
In-Reply-To: <199605081550.KAA18807@deepeddy.DeepEddy.Com>
Reply-To: carson@lehman.com
Errors-To: owner-www-security@ns2.rutgers.edu
>>>>> "Chris" == Chris Garrigues <cwg@DeepEddy.Com> writes:
Chris> There is no turing equivalence between protocols....If you're saying
Chris> that you can run telnet on port 25 to get past packet filters, that's
Chris> true, but that's not "using email to tunnel telnet".
Not true, mon cher. Take a look at the April fool's RFC for IP via carrier
pigeon. I know that someone has done IP via e-mail as a design, but I'm not
sure if it was ever implemented even as a proof-of-concept. Anyone?
--
Carson Gaspar -- carson@cs.columbia.edu carson@lehman.com
http://www.cs.columbia.edu/~carson/home.html
<This is the boring business .sig - no outre sayings here>