I am starting to fear that there is something very basic that I am missing.  In order 
to avoid the example that Tobias puts forth below, I configured both Netscape and IE 
to use the WinRoute Pro 4.1 Proxy for FTP:  - and I then block all direct traffic 
to/from anything I don't know we
need/want open. And NAT all traffic to the Internet to boot.

How vulnerable am I now to something tunneling through my Proxy?  Only an app/trojan 
on the inside right?  What is wrong with this solution that I am missing?

Guy Skaggs
Director of Technology
Martingale Asset Management

------------------------------------------------------
[EMAIL PROTECTED] wrote:

   Date: Tue, 12 Dec 2000 08:47:26 +0100
   From: "Reckhard, Tobias" <[EMAIL PROTECTED]>
Subject: RE: Simple Pimple firewalls

...  For clients (actually, for the dumb packet
filters inbetween), active FTP is bad because a connection to a random port
on the client is initiated from the server side. Passive FTP isn't a lot
better because all it gets you is a reversal of the initiation. That is
something, yes, but almost anything can go through the following rule
combination:
<inside IP>:1024-65535 -----TCP----><any IP>:1-65535
<inside IP>:1024-65535 <--TCP/-SYN-- <any IP>:1-65535
....

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to