On Wed, 8 Mar 2000, Ron DuFresne wrote:
> When ya disected the TIs proxies, what did ya find they actually did?
TIS' application-level proxies just copy the data over byte by byte, with
the exception of FTP and telnet proxy which actually have a decent amount
of security around them.
Like:
while (a = readbytefromuser()) {
sendtonet(a);
}
The problem with application level proxies is that they are slow and
require a change in internal user behaviour to operate them. They do not
appear transparaent to the end user and they're a bad solution for users
that don't have a clue. It takes too much time to educate people on how to
change thier behaviour to do things like telent and ftp when suddently it
requires a secondary login.
-john
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
- Content Analysis Groth, Daniel
- Re: Content Analysis John Adams
- RE: Content Analysis Ng, Kenneth \(US\)
- RE: Content Analysis John Adams
- RE: Content Analysis Ron DuFresne
- RE: Content Analysis John Adams
- RE: Content Analysis Paul D. Robertson
- RE: Content Analysis Paul D. Robertson
- RE: Content Analysis Ng, Kenneth \(US\)
- RE: Content Analysis Ron DuFresne
- RE: Content Analysis John Adams
- RE: Content Analysis John Adams
- Cisco Access Lists (Was: RE: Content Analy... Jon Earle
- Re: Cisco Access Lists (Was: RE: Conte... John Adams
- Re: Cisco Access Lists (Was: RE: ... Eric Johnson
- Re: Cisco Access Lists (Was: RE: Conte... Gerardo Soto
- Re: Cisco Access Lists (Was: RE: ... Jon Earle
- RE: Content Analysis John Adams
- RE: Content Analysis Ng, Kenneth \(US\)
- RE: Content Analysis COOPER, Peter
- RE: RE: Content Analysis spiros_liolis
