On Saturday 02 February 2008, James wrote:
> Grant <emailgrant <at> gmail.com> writes:
> > > If someone then argues about source IP spoofing, just let him. If
> > > someone in your organisation is able to do it, make him your
> > > network admin.
> >
> > You're right, access to the printer can be given only to certain
> > hosts.  So simply using 'lpr file.pdf' on the remote machine
> > doesn't strike you as a bad idea?
>
> Might this be an opportunity to use 'port-knocking' ?
>
> http://www.linuxjournal.com/article/6811
>
> just a thought, never really tried this before.

port-knocking is the biggest load of fud (Microsoft products apart) I 
have heard about in ages. The term snake-oil comes to mind, as 
does "security by obscurity and obfuscation" which we all know is no 
security at all.

I don't care if the originating process knocks on the well known port 
with gold plated gloves hand braided from the finest Unobtainium by 
seductive alluring Puerto Rican virgins, the receiving machine still 
has to open another port short thereafter. This is not a magic port and 
is not wrapped in Star Trek's finest stealth cloak, it's a port that 
does TCP/IP stuff.

If the end process listening on the newly opened port is in any way 
weak - and this is the only possible reason anyone would ever try the 
port knocking workaround - it's just as weak when it's listening on an 
obfuscated port number. If it's open, I can find it. If it's weak, I 
can get in. Then it's game over, go home, I win.

I've yet to hear positive things about port knocking from someone who 
actually implemented it fully. In truth it's just a major pain in the 
arse that makes the admin's life miserable and gives the boss a warm 
fuzzy feeling based on hot air.

End of rant.


-- 
Alan McKinnon
alan dot mckinnon at gmail dot com
-- 
gentoo-user@lists.gentoo.org mailing list

Reply via email to