> [EMAIL PROTECTED] wrote:
>>
>> I personally would say 139 is a bucket of worms. If you've got it
>> right open from outside to in, it'll be fun. People can now establish
>> NetBIOS sessions with your internal computers. But if you only open it
>> from DMZ to internal, it's a bit more safe.
>>
>> As for the other two, I don't know.
>>
>
> Don't look at the specific service running... think about the fact that
> there are now holes in your firewall. If any of the services running on
> those ports become susceptible to buffer overflows etc., you've just
> opened your kimono and begun dancing on National TV.
I realize this. We later continued this conversation, but I'll repeat
it for the list.
Basically, the firewall is no longer the single point of entry to your
network. Chances are, it was hardened specifically to be a firewall.
So by redirecting ports, you've now got three (3) entry points to your
internal network, onto machines that are more than likely much more
easy to compromise.
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]