Michael Batchelder wrote:


> Use explicit filtering rules or proxies, whichever
> is applicable.

I don't know that a filtration rule as such can protect against a 
session splice, either.  Proxies may be a different matter (for example 
if the attack is a known exploit you can have an application proxy drop 
the packet based on matching it against a list of exploit signatures). 
But even then you can't protect against, for example, man-in-the-middle 
data thieving.

I'm no expert, but I believe that the standard method for protecting 
against session hijacking is to have a robust TCP/IP stack with good 
random sequence numbering at each endpoint of the connection (ie, don't 
use Windows, AIX, HP-UX, or out-of-the-box Solaris), OR use layer three 
cryptography with authentication enabled (not always an option, 
obviously).  The firewall doesn't really matter much in this case.



-- 
~~~Michael Jinks, IB // Technical Entity // Saecos Corporation~~~~

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to