nanog mailing list archives
Re: quietly....
From: Jack Bates <jbates () brightok net>
Date: Thu, 03 Feb 2011 09:18:50 -0600
On 2/3/2011 12:40 AM, Owen DeLong wrote:
Notice how the application was able to poke the holes in both sides because it easily knew the address and port number information since it isn't modified. Both firewalls think that the secondary channel is an outbound connection on both sides.
And the network attack vector with inside spoofing just go even more interesting and easier.
Jack
Current thread:
- Re: quietly...., (continued)
- Re: quietly.... Owen DeLong (Feb 01)
- Re: quietly.... Jay Ashworth (Feb 02)
- Re: quietly.... Blake Dunlap (Feb 02)
- Re: quietly.... Jay Ashworth (Feb 02)
- Re: quietly.... Mark Andrews (Feb 02)
- Re: quietly.... Jay Ashworth (Feb 02)
- Re: quietly.... Matthew Palmer (Feb 02)
- Re: quietly.... Jay Ashworth (Feb 02)
- Re: quietly.... Matthew Palmer (Feb 02)
- Re: quietly.... Owen DeLong (Feb 02)
- Re: quietly.... Jack Bates (Feb 03)
- Re: quietly.... Owen DeLong (Feb 02)
- Re: quietly.... Jay Ashworth (Feb 03)
- Re: quietly.... Jimmy Hess (Feb 02)
- Re: quietly.... Jay Ashworth (Feb 02)
- Re: quietly.... Jimmy Hess (Feb 02)
- Re: quietly.... Nicholas Suan (Feb 02)
- Re: quietly.... Nicholas Suan (Feb 02)
- Re: quietly.... david raistrick (Feb 03)
- Re: quietly.... Carlos M. Martinez (Feb 01)