[2040] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Hacking a Personal Computer via E-mail

daemon@ATHENA.MIT.EDU (Adam Shostack)
Fri May 10 00:54:44 1996

From: Adam Shostack <adam@lighthouse.homeport.org>
To: cwg@DeepEddy.Com (Chris Garrigues)
Date: Thu, 9 May 1996 23:00:43 -0500 (EST)
Cc: weber@iez.com, cwg@DeepEddy.Com, www-security@ns2.rutgers.edu,
        cwg@deepeddy.DeepEddy.Com
In-Reply-To: <199605091524.KAA22191@deepeddy.DeepEddy.Com> from "Chris Garrigues" at May 9, 96 10:24:04 am
Errors-To: owner-www-security@ns2.rutgers.edu

	You mean to say that you can't run the TCP stack that came
with your computer over 2 satelite links.  Theres nothing in TCP that
prevents it.  The timeouts are agreed apon by the two ends.  (See
Comer, 12.16 in the second edition, vol 1.)

	Running IP is possible anywhere you can move more than 24
bytes of data at a time.  You just need to write some code.  There
exist a version of IP which uses smtp mail packets.

	If you own both ends of the NTP connection, all you need to do
is agree how to encode your bytes as time, and then send random times
back and forth.

Adam


Chris Garrigues wrote:

| Content-Type: text/plain; charset=us-ascii
| > > > another true story is that any protocol can be used to tunnel another,
| > > > will say email can be used to tunnel for example telnet. but this requires
| > > > help from inside.
| > >
| > > eh?
| > >
| > > There is no turing equivalence between protocols....If you're saying that you
| > > can run telnet on port 25 to get past packet filters, that's true, but that's
| > > not "using email to tunnel telnet".
| > >
| > > You can tunnel a streaming protocol on top of a another streaming protocol,
| > > but I hardly see that this means you can run telnet on top of RFC822.
| > >
| > why not?
| > IP packets are IP packets.
| > the one side receives this packet from the telnet server and mails it
| > to the other side, which extracts this packet and sends it to the client.
| > vice versa the same.
| > not a performance hit, but it should work.
| > give me a little time, and i'll write such a tool. :-)
| 
| Well...if it weren't for little details like timeout values, I suppose....
| 
| You do realize that you can't even run TCP over two satelite hops because the latency is greater than the timeouts, don't you?
| 
| Also, on the original claim that "any protocol can be used to tunnel another", explain to me how you're going to run a full networking protocol such as IP over a protocol like NTP which *only* passes time information.
| 
| For that matter, I'm told that IP over SNA doesn't work all that well either....:-)
| 
| Chris
| 
| --
| Chris Garrigues                    O-              cwg@DeepEddy.Com
|   Deep Eddy Internet Consulting                     +1 512 432 4046
|   609 Deep Eddy Avenue
|   Austin, TX  78703-4513              http://www.DeepEddy.Com/~cwg/
| 
| 


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume


home help back first fref pref prev next nref lref last post