[55292] in North American Network Operators' Group
Re: management interface accessability (was Re: Worm / UDP1434)
daemon@ATHENA.MIT.EDU (Christopher L. Morrow)
Sun Jan 26 15:19:14 2003
Date: Sun, 26 Jan 2003 20:16:33 +0000 (GMT)
From: "Christopher L. Morrow" <chris@UU.NET>
To: Rob Thomas <robt@cymru.com>
Cc: NANOG <nanog@merit.edu>
In-Reply-To: <ROTMAILER.0301261206160.15961-100000@dragon.sauron.net>
Errors-To: owner-nanog-outgoing@merit.edu
On Sun, 26 Jan 2003, Rob Thomas wrote:
>
> Hi, NANOGers.
>
> ] - the worm is memory resident. Road warriors that are infected at home
> ] or while traveling are unlikely to introduce this worm into the company
> ] LAN as they come to work on Monday.
>
> Just a point here: Many road warriors are work-at-home folks who have
> their computers on 24x7. They may be infected, and will fire up their
> VPN tunnels Monday morning. This may introduce the worm into the chewy
> center of many corporate networks. Hopefully folks have put the proper
> filters in place on their VPN access points.
Wait, but isn't your corporate network 'secure' cause its got a super kewl
firewall infront of it??