[11578] in Commercialization & Privatization of the Internet
Re: Internet abuse and firewalls
daemon@ATHENA.MIT.EDU (Matthew Kaufman)
Sat Apr 9 06:41:11 1994
Date: Sat, 9 Apr 1994 00:49:57 -0700
From: matthew@echo.com (Matthew Kaufman)
To: francis@avalle.insoft.com, mrr@galba.boers.no
Cc: com-priv@psi.com
In <9404081711.AA03046@avalle.insoft.com> <francis@avalle.insoft.com>
(John [Francis] Stracke) writes :
>Right. The first reaction is "OK, put it on a host outside the
>firewall." Problem: if you can't trust anything outside the firewall,
>someone could corrupt that info, which might or might not mean you
>weren't meeting the obligation, but could pretty definitely be bad for
>your image. You'd have to cut a CD-ROM (or, better yet, a WORM) or
>put it on a write-protected floppy or something. (The system can be
>told to set up a file, or filesystem, as read-only; but that can be
>corrupted, too.)
Breaking into the ftp server and installing OS patches which simply
cause reads of that filesystem to return corrupted data from another
device is left as an exercise for the reader.
-matthew