Re: Let the Games Begin!

1998-12-24 Thread Paul Krumviede
Brian Steele [SPICEISLE] wrote: [copied from a reply made to another member off-list] Then you are mistaken. Security through obscurity has long been repudiated by knowledgeable security folks, dating from collquia of locksmiths and the debates about whether weaknesses in locks should

Re: Routing protocols thru firewall

1999-02-04 Thread Paul Krumviede
From a different Paul... The problem is that many people notice that HTTP and SSL are allowed through firewalls, they decide the best way to get nifty new service through is to run it over HTTP or SSL. Many people avoid implementing something like SMTP auth by running SMTP over SSL. Now say that

Re: Routing protocols thru firewall

1999-02-05 Thread Paul Krumviede
happy, they can, in fact, never be made happy." - -Paul Evans (as quoted by Barb Dijker in "Managing Support Staff", LISA '97) On Thu, 4 Feb 1999, Paul Krumviede wrote: Date: Thu, 04 Feb 1999 12:11:12 -0800 From: Paul Krumviede [EMAIL PROTECTED] To: [EMAIL PROTECTED] C

Re: Router Banners

1999-03-05 Thread Paul Krumviede
Chris wrote: At 2:11 PM -0500 3/5/99, Brian Jones wrote: Does any know where I can get sample Router banners? (eg. Please disconnect now, you are breaking the law!!) Brian Jones National Network Infastructure Support [EMAIL PROTECTED] I think you want to say a little more, like

Re: MS VPN implementation in Win2K - not interoperable?

2000-01-17 Thread Paul Krumviede
--On Monday, 17 January, 2000 08:47 -0800 Merton Campbell Crockett [EMAIL PROTECTED] wrote: At the Microsoft Federal Security Conference last year, Microsoft had a presentation on L2TP and IPsec. L2TP does use an IPsec encryption scheme but does not provide a virtual connection in the same

Re: Private IP address ranges? -reply

2000-02-23 Thread Paul Krumviede
first, class-full routing, and description of address space, is ancient history. in particular, many DSL providers are being assigned slices of what used to be called a class A address, and individual customers of those providers get subsets (smaller contiguous non-overlapping ranges) of those

Re: ipSec questions

2000-03-26 Thread Paul Krumviede
There was some discussion of how much packet expansion might be caused by IPsec in various modes (such as ESP tunnel mode) some time ago. I don't think this is expected to be a large increase, in percentage size, for "normal" packet size distributions, as one is basically encapsulating the

RE: ZoneAlarm

2000-04-05 Thread Paul Krumviede
--On Tuesday, 04 April, 2000 20:22 -0700 [EMAIL PROTECTED] wrote: On 04/04/2000 at 21:09:42 EST, Bill Lavalette noc/sec Administrator [EMAIL PROTECTED] wrote: TCP 53 you would want to reject zone transfers from unauthorized hosts this is one of the single most "doh's!! " when setting DNS

Re: Firewalls-Digest V8 #927 (fwd)

2000-04-16 Thread Paul Krumviede
Hubs, repeaters, and level 2 switches do not reduce the size of packets. Routers decrement the TTL field, but do not change the size of the packet (this is assuming the same media on both sides of the device). Runt packets on ethernet are a result of collisions. Too many repeaters/hubs cause

RE: Soapbox on firewall evals

2000-06-08 Thread Paul Krumviede
--On Thursday, 08 June, 2000 07:05 -0400 "Paul D. Robertson" [EMAIL PROTECTED] wrote: Hey! That's _my_ soapbox dammit! ;) Don't forget the tunnel-everything-over-HTTP piece if you're gonna step up there! check out draft-eastlake-ip-mime-03.txt (IP over MIME) :-) -paul - [To unsubscribe,

Re: POP3 Service through Corporate Firewall

2000-06-14 Thread Paul Krumviede
ignoring the question of whether or not this should be supported, there seem to be a few things to do if you do support it. for one thing, don't expose plaintext reusable passwords. use something like APOP or KPOP or one-time passwords for authentication to the pop server. -paul "Watson, Peter"

subnetting (was Re: Class A or C??)

2000-08-17 Thread Paul Krumviede
this flexibility depends on part on the routing protocol(s) being used, and in some instances on the platform being used for routing. not all protocols support variable length subnet masks, and as many people playing with gated on various unix platforms discovered, not all unix variants supported

Re: Ports for DNS

2000-09-19 Thread Paul Krumviede
--On Wednesday, 20 September, 2000 00:08 -0500 Brian Kifiak [EMAIL PROTECTED] wrote: It's also a bad idea to put both of your nameservers on the same network, That's not an absolute truth. It's quite common for small to medium sized networks to only have one point of presence. If that

Re: Block ip access from whole region (or country)

2001-12-06 Thread Paul Krumviede
the description of address policy doesn't apply to the earlier days of address assignment, so there are chunks of address space assigned, for example, to entities (such as large companies) that don't map to countries or even continents very well. there are a few commercial services that attempt

Re: Wireless LAN security

2002-03-16 Thread Paul Krumviede
--On Friday, 15 March, 2002 18:03 -0500 Paul Robertson [EMAIL PROTECTED] wrote: On Fri, 15 Mar 2002, Scott Overfield wrote: Good Morning, My employer and I have been discussing the option of purchasing a Lucent Orinoco system to replace the current ADSL line between our two buildings,

Re: Wireless LAN security

2002-03-16 Thread Paul Krumviede
--On Saturday, 16 March, 2002 10:47 + Steve Kennedy [EMAIL PROTECTED] wrote: On Fri, Mar 15, 2002 at 09:55:50AM -0700, Drew Einhorn wrote: Yes, WEP is easily cracked. Don't depend on it. Don't waste resources on WEP. What resources, turn it on and use the same WEP password at both

RE: firewall logging

2002-06-07 Thread Paul Krumviede
--On Friday, 07 June, 2002 10:26 +0200 Ben Nagy [EMAIL PROTECTED] wrote: -Original Message- From: Mikael Olsson [mailto:[EMAIL PROTECTED]] [...] Kevin Steves wrote: I'm tending to think TCP syslog over SSL/TLS would be a good thing to have. Yeah, I've sort of been thinking

RE: Opinions? Wireless access point, firewall, eth., DSL box

2002-06-13 Thread Paul Krumviede
picking up on this a bit later --On Saturday, 01 June, 2002 20:03 +0200 Ben Nagy [EMAIL PROTECTED] wrote: -Original Message- From: Brett Lymn [mailto:[EMAIL PROTECTED]] Sent: Saturday, June 01, 2002 3:27 PM To: Ben Nagy Cc: 'Ron DuFresne'; 'Brett Lymn'; [EMAIL PROTECTED]

RE: RADIUS question

2000-02-06 Thread Paul Krumviede
one note: LDAP is a directory access protocol, not a directory. one can have a RADIUS server implementation that accesses a directory, perhaps using LDAP to do so. you could also stick policy information in a directory; this could be used by the authentication server at run-time to determine the