Erik,

Try this link.  This MS' whitepaper on the subject.

http://www.microsoft.com/com/wpaper/dcomfw.asp

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Monday, April 15, 2002 4:27 AM
To: [EMAIL PROTECTED]
Subject: risks and threats with DCOM ?


Dear all,
 
What are the risks and threats of the DCOM protocol when using it across
firewall boundaries?
 
I just know that it is similar to the "CORBA" communication model (M$ version).
(?)
 
CORBA IIOP is a communication model at layer 7 - within an application. 
Two systems using CORBA may run a distributed software where pieces of the
software on each system uses CORBA communication to send data *AND* function
calls across the network.
This represents a kind of virtual computer.
Putting a Firewall between pieces of a network distributed virtual computer
makes no sense, right? Exept concerning filtering of IP adresses...
 
Is anybody familar with the security issues and features of the DCOM protocol?
Any hints for further documentation?
What are your opinions about this?
 
thanks in advance
regards
 
Erik
_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls
_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to