1996-07-21 - Re: Firewall Penetration

Header Data

From: Erle Greer <vagab0nd@sd.cybernex.net>
To: Jerome Tan <cypherpunks@toad.com
Message Hash: e1389fcab060eb4fa72d829b942e95a8983cfc1aa0ffefced7840b096cd113ab
Message ID: <2.2.32.19960721182353.006f5238@mail.sd.cybernex.net>
Reply To: N/A
UTC Datetime: 1996-07-21 20:41:05 UTC
Raw Date: Mon, 22 Jul 1996 04:41:05 +0800

Raw message

From: Erle Greer <vagab0nd@sd.cybernex.net>
Date: Mon, 22 Jul 1996 04:41:05 +0800
To: Jerome Tan <cypherpunks@toad.com
Subject: Re: Firewall Penetration
Message-ID: <2.2.32.19960721182353.006f5238@mail.sd.cybernex.net>
MIME-Version: 1.0
Content-Type: text/plain


At 05:29 PM 7/19/96 +0800, you wrote:
>Is it possible to penetrate a firewall?
>

-----BEGIN PGP SIGNED MESSAGE-----

Without professional knowledge of firewalls, a simple and true
answer is obvious.  Of course they are penetrable; that's what
they are for.  They permit users to penetrate, while attempting
to keep out intruders.  If it were impossible to penetrate
firewalls, then they would pretty much be useless to those with
authorized access.  How could they get in themselves?

Maybe 'feasibility' is the question.  That answer would depend
on some variables on the intruder's end.  If permissions and
rights are allocated to regular users with authorization, then
an intruder with adequate resources, knowledge, time, etc.
should be able to get in.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2i

iQEVAwUBMfJ1H3ychImXHmeJAQH5XQf8DtJ+6W+NZGqm9Af9QVBzz73TbmJVqYB5
dZstXkk8tEyRd1LTG5hgIfXH8qKMl0a5tXoEdu72/UXbIvTyJapXcRgMZ0EctKJl
hzfSvAGwNPzy5VUubUMOzsl4BId09KfB1+cpffAWa1rCyGsf6UOC7dftGLTlPVaf
M1DG1pt1ruxLhc8hLdso86gP+q68sEBDFykIRCI0z6kTZj/U1W0MHtFLxkR1rkqX
R/VqZ5LrvhRKYXVUD8iHMyPdyvvLDstddC3NcOf9mMDGqYp1LOGTJAKYT4mxhkEy
2ABfAISU+c4USl4C01RmgXni6gKDceWKHeTUvsBHAR6EUmUHso8Jng==
=PVGa
-----END PGP SIGNATURE-----
vagab0nd@sd.cybernex.net
http://ww2.sd.cybernex.net/~vagab0nd/index.html
Visit web page for public key.






Thread