On Dec 2, 2013, at 18:05 , Ricky Beam <jfb...@gmail.com> wrote:

> On Mon, 02 Dec 2013 20:18:08 -0500, Owen DeLong <o...@delong.com> wrote:
>> You don't, but it's easy enough for Windows to do discovery and/or 
>> negotiation for firewall holes with multicast and avoid making
> ...
> 
> Actually, your process still makes a very dangerous assumption... you have to 
> assume the address passed via multicast is, in fact, a local address.  Since 
> it is necessarily outside your prefix, you have to either make assumptions 
> about what is "close" to your prefix -- assumes the site is contiguous, or 
> trust any address passed to you.  Hackers will have fun screwing up your 
> firewall rules and potentially breaking into your servers. (if you're foolish 
> enough to not have any other layers in your network, which is likely with 
> home networks.)
> 

Not really... First of all, domain or other windows authentication could be 
used to validate the request.

Second, if it's site-scope multicast, unless both your ISP _AND_ your own 
router are doing something wrong, it shouldn't get forwarded into your site 
from outside.

>> ... They can't get away with flat out saying no...
> 
> Says who? TWC has been saying "no" for years. (unless I'm mistaken, "always".)

No, they've said "get a business connection." Close to "no", but not identical.

Owen


Reply via email to