On Wed, 25 Apr 2007 23:56:50 +0200
Joachim Schipper <[EMAIL PROTECTED]> wrote:

> On Wed, Apr 25, 2007 at 10:40:45PM +0200, Timo Schoeler wrote:
> > On Wed, 25 Apr 2007 20:19:42 +0000 (UTC)
> > Tobias Weingartner <[EMAIL PROTECTED]> wrote:
> > 
> > > Chad M Stewart wrote:
> > > >  On Apr 25, 2007, at 11:05 AM, Allen Theobald wrote:
> > > > >
> > > > > pass in inet proto icmp all icmp-type $icmp_types keep state
> > > > 
> > > >  This can be used as a covert communication channel.  Allowing  
> > > >  internal IPs to send/receive ping is bad.
> > > 
> > > Bull.  Not allowing ICMP is just as bad.  Worse actually, as you
> > > are violating RFCs.  Quit spreading this FUD.
> > 
> > hi,
> > 
> > actually, me thinks the same about allowing/denying ICMP as you,
> > tobias. however, we recently had a CCIE/NSA certified blahblah guy
> > in our company, tuning our, err, Cizcoooeee equipment.
> > 
> > guess what he did -- he violated 'the RFCs'.
> > 
> > unfortunately, i wasn't able to find them on the net. do you have
> > them handy? i'm very curious about that :)
> 
> In general, though, it will almost always be possible to get data
> in/out of the network. IP-over-DNS comes to mind. If this particular
> vector is used by a widely deployed worm, it might be worth it; but
> otherwise, just ignore it.

yeah, i know -- that's why i watched him doing in my typical skeptical
way...

> Do you intend to ask where 'the RFCs' are? (If so, www.ietf.org is a
> good choice.) Or in what RFC this particular requirement is? (No real
> idea...)

the latter one...

>               Joachim
> 
> -- 
> TFMotD: kadmin (8) - Kerberos administration utility

timo

Reply via email to