[2029] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Hacking a Personal Computer via E-mail

daemon@ATHENA.MIT.EDU (carson@lehman.com)
Thu May 9 16:44:44 1996

From: carson@lehman.com
Date: Thu, 9 May 1996 14:09:54 -0400
To: Chris Garrigues <cwg@DeepEddy.Com>
Cc: Rolf Weber <weber@iez.com>, 69100476@bdi-stu.hsmaastricht.nl,
        www-security@ns2.rutgers.edu (www-security), cwg@deepeddy.DeepEddy.Com
In-Reply-To: <199605081550.KAA18807@deepeddy.DeepEddy.Com>
Reply-To: carson@lehman.com
Errors-To: owner-www-security@ns2.rutgers.edu

>>>>> "Chris" == Chris Garrigues <cwg@DeepEddy.Com> writes:

Chris> There is no turing equivalence between protocols....If you're saying
Chris> that you can run telnet on port 25 to get past packet filters, that's
Chris> true, but that's not "using email to tunnel telnet".

Not true, mon cher. Take a look at the April fool's RFC for IP via carrier
pigeon. I know that someone has done IP via e-mail as a design, but I'm not
sure if it was ever implemented even as a proof-of-concept. Anyone?

--
Carson Gaspar -- carson@cs.columbia.edu carson@lehman.com
http://www.cs.columbia.edu/~carson/home.html
<This is the boring business .sig - no outre sayings here>

home help back first fref pref prev next nref lref last post