Dear all,
 
What are the risks and threats of the DCOM protocol when using it across firewall 
boundaries?
 
I just know that it is similar to the "CORBA" communication model (M$ version). (?)
 
CORBA IIOP is a communication model at layer 7 - within an application. 
Two systems using CORBA may run a distributed software where pieces of the software on 
each system uses CORBA communication to send data *AND* function calls across the 
network.
This represents a kind of virtual computer.
Putting a Firewall between pieces of a network distributed virtual computer makes no 
sense, right? Exept concerning filtering of IP adresses...
 
Is anybody familar with the security issues and features of the DCOM protocol?
Any hints for further documentation?
What are your opinions about this?
 
thanks in advance
regards
 
Erik
_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls


Reply via email to