[2033] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Hacking a Personal Computer via E-mail

daemon@ATHENA.MIT.EDU (Steve Neruda)
Thu May 9 19:06:30 1996

Date: Thu, 09 May 1996 16:06:38 -0400
From: Steve Neruda <Steve_Neruda@nationwide.com>
To: Rolf Weber <weber@iez.com>
CC: Chris Garrigues <cwg@DeepEddy.Com>,
        www-security <www-security@ns2.rutgers.edu>
Errors-To: owner-www-security@ns2.rutgers.edu

Rolf Weber wrote:
> 
> >
> > > another true story is that any protocol can be used to tunnel another,
> > > will say email can be used to tunnel for example telnet. but this requires
> > > help from inside.
> >
> > eh?
> >
> > There is no turing equivalence between protocols....If you're saying that you
> > can run telnet on port 25 to get past packet filters, that's true, but that's
> > not "using email to tunnel telnet".
> >
> > You can tunnel a streaming protocol on top of a another streaming protocol,
> > but I hardly see that this means you can run telnet on top of RFC822.
> >
...

Take a look at RFC 1149 "IP over Carrier Pigeons" 

      http://sunsite.unc.edu/pub/docs/rfc/rfc1149.txt/

Guess if you can't do it with IP you can't do it ;-)

SteveN

home help back first fref pref prev next nref lref last post