Firewall Wizards mailing list archives
Re[2]: Network Traffic Violations
From: Mike.Baxter () ashridge org uk (Mike Baxter)
Date: Mon, 7 Sep 1998 12:53:33 +0100
A hole connotes a security problem, as in "I found a great big hole in sendmail." Rather, I call this "enabling an authorized connection." There may or may not be a hole associated with it.
But setting up the ACL does not make the connection authorized, any application could use the ports. There needs to be some authentication process between the workstation, firewall, and information source. Otherwise when it is know that app X is used at an organisation, perhaps due to a comment on a mail list :-). It becomes know that access through the firewall can be made via those ports. Mike Baxter
Current thread:
- Network Traffic Violations Jim Wamsley 303-673-8163 (Sep 03)
- Re: Network Traffic Violations Colin Campbell (Sep 06)
- Re: Network Traffic Violations Ken Hardy (Sep 06)
- Message not available
- Re: Network Traffic Violations Marcus J. Ranum (Sep 07)
- Message not available
- Re: Network Traffic Violations Rick Smith (Sep 09)
- <Possible follow-ups>
- Re: Network Traffic Violations Antonomasia (Sep 06)
- Re[2]: Network Traffic Violations Mike Baxter (Sep 07)
- Re: Network Traffic Violations Bill_Royds (Sep 10)
- RE: Network Traffic Violations jrtietsort (Sep 10)
- RE: Network Traffic Violations Ted Doty (Sep 11)
- RE: Network Traffic Violations Rick Smith (Sep 11)
- RE: Network Traffic Violations Ted Doty (Sep 13)
- RE: Network Traffic Violations Rick Smith (Sep 13)
- RE: Network Traffic Violations David Lang (Sep 14)
- RE: Network Traffic Violations Dominique Brezinski (Sep 15)
- RE: Network Traffic Violations Rick Smith (Sep 11)
- RE: Network Traffic Violations Woody Weaver (Sep 13)