On 6 Jun 2001, at 20:41, Paul D. Robertson wrote:

> On Thu, 7 Jun 2001, Ben Nagy wrote:
> 
> > > Nothing on the market currently prevents a malicious client 
> > > from being the
> > > source of authentication, and that's the biggest tunnel issue 
> > > out there--
> > > the "Microsoft source code out the window" stuff.
> > 
> > I take it you're talking about Joe Luser VPN'ing in to work when his PC is
> > already r00ted by some trojan, or similar circumstances? I've seen at least
> 
> It's true not just of VPN tunnels, but yes, that is probably the
> predominantly hanging vector.
> 
> > one client (Cisco - the old SafeNet one) that can chop off all other traffic
> > if a VPN connection is up. That doesn't prevent time-bombs, but it does
> 
> I proposed this as a fix at an NISSC panel discussion on VPNs I
> particpated in back in '98.  Back then I think it was potentially valid-
> but now-a-days I'm thinking it's actually less useful than it would
> appear...
> 
> The problem is that everyone seems to _require_ HTTP/HTTPS access these
> days, so there's your trojan's control vector happily provided either
> directly, or via the corporate firewall.  

  And this is different from an on-site user, visiting the web 
through the corporate firewall, exactly HOW?  i.e. I do not see how 
this risk is exacerbated if the client connection comes across a VPN    
tunnel rather than just a length of Cat5.

  [Consider also the case of the travelling employee who, after a 
stint on the road, plugs his laptop into the internal net.  No amount 
of filtering at the tunnel endpoint is going to address this 
analogous real-world case where a machine is sometimes connected to 
the internal net, and sometimes not.]

David Gillett


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to