[136480] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: quietly....

daemon@ATHENA.MIT.EDU (Jack Bates)
Thu Feb 3 10:42:56 2011

Date: Thu, 03 Feb 2011 09:18:50 -0600
From: Jack Bates <jbates@brightok.net>
To: Owen DeLong <owen@delong.com>
In-Reply-To: <1F2028E9-C32B-4FF6-8A01-07F983E453E1@delong.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org



On 2/3/2011 12:40 AM, Owen DeLong wrote:
> Notice how the application was able to poke the holes in both sides
> because it easily knew the address and port number information since
> it isn't modified. Both firewalls think that the secondary channel is
> an outbound connection on both sides.

And the network attack vector with inside spoofing just go even more 
interesting and easier.


Jack


home help back first fref pref prev next nref lref last post