Erik, Try this link. This MS' whitepaper on the subject.
http://www.microsoft.com/com/wpaper/dcomfw.asp -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] Sent: Monday, April 15, 2002 4:27 AM To: [EMAIL PROTECTED] Subject: risks and threats with DCOM ? Dear all, What are the risks and threats of the DCOM protocol when using it across firewall boundaries? I just know that it is similar to the "CORBA" communication model (M$ version). (?) CORBA IIOP is a communication model at layer 7 - within an application. Two systems using CORBA may run a distributed software where pieces of the software on each system uses CORBA communication to send data *AND* function calls across the network. This represents a kind of virtual computer. Putting a Firewall between pieces of a network distributed virtual computer makes no sense, right? Exept concerning filtering of IP adresses... Is anybody familar with the security issues and features of the DCOM protocol? Any hints for further documentation? What are your opinions about this? thanks in advance regards Erik _______________________________________________ Firewalls mailing list [EMAIL PROTECTED] http://lists.gnac.net/mailman/listinfo/firewalls _______________________________________________ Firewalls mailing list [EMAIL PROTECTED] http://lists.gnac.net/mailman/listinfo/firewalls
