[136480] in North American Network Operators' Group
Re: quietly....
daemon@ATHENA.MIT.EDU (Jack Bates)
Thu Feb 3 10:42:56 2011
Date: Thu, 03 Feb 2011 09:18:50 -0600
From: Jack Bates <jbates@brightok.net>
To: Owen DeLong <owen@delong.com>
In-Reply-To: <1F2028E9-C32B-4FF6-8A01-07F983E453E1@delong.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On 2/3/2011 12:40 AM, Owen DeLong wrote:
> Notice how the application was able to poke the holes in both sides
> because it easily knew the address and port number information since
> it isn't modified. Both firewalls think that the secondary channel is
> an outbound connection on both sides.
And the network attack vector with inside spoofing just go even more
interesting and easier.
Jack