Hi all,
I have been tasked with evaluating how completely our
firewall implements our security policy. A question
came up in our discussions that I'm hoping someone can
help me with.
Our firewall blocks outgoing telnet/ssh. Actually the
only thing it lets through for regular users is
proxied HTTP, with username/pwd authentication. What
I'm wondering is if it would be possible for a user to
do something like IP-over-IP, putting the telnet
packets inside HTTP packets to the proxy thinks they
are legit.
I'm not worried about some wizzo hand-crafting
packets; what I'm more wondering is if there are
already tools out there that do this. Pointers
anyone?
Also if anyone has faced this situation before I'd
sure appreciate hearing from you.
Thanks,
John
__________________________________________________
Do You Yahoo!?
Talk to your friends online with Yahoo! Messenger.
http://im.yahoo.com
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]