quietly....

Jack Bates jbates at brightok.net
Thu Feb 3 15:18:50 UTC 2011



On 2/3/2011 12:40 AM, Owen DeLong wrote:
> Notice how the application was able to poke the holes in both sides
> because it easily knew the address and port number information since
> it isn't modified. Both firewalls think that the secondary channel is
> an outbound connection on both sides.

And the network attack vector with inside spoofing just go even more 
interesting and easier.


Jack




More information about the NANOG mailing list