[55292] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: management interface accessability (was Re: Worm / UDP1434)

daemon@ATHENA.MIT.EDU (Christopher L. Morrow)
Sun Jan 26 15:19:14 2003

Date: Sun, 26 Jan 2003 20:16:33 +0000 (GMT)
From: "Christopher L. Morrow" <chris@UU.NET>
To: Rob Thomas <robt@cymru.com>
Cc: NANOG <nanog@merit.edu>
In-Reply-To: <ROTMAILER.0301261206160.15961-100000@dragon.sauron.net>
Errors-To: owner-nanog-outgoing@merit.edu



On Sun, 26 Jan 2003, Rob Thomas wrote:

>
> Hi, NANOGers.
>
> ] - the worm is memory resident. Road warriors that are infected at home
> ] or while traveling are unlikely to introduce this worm into the company
> ] LAN as they come to work on Monday.
>
> Just a point here:  Many road warriors are work-at-home folks who have
> their computers on 24x7.  They may be infected, and will fire up their
> VPN tunnels Monday morning.  This may introduce the worm into the chewy
> center of many corporate networks.  Hopefully folks have put the proper
> filters in place on their VPN access points.

Wait, but isn't your corporate network 'secure' cause its got a super kewl
firewall infront of it??


home help back first fref pref prev next nref lref last post