> > Why should I believe that a sufficiently determined > > adversary couldn't somehow obtain a bootleg copy of > > IOS source? > > So tell me which of the following setups is the most secure: > > a) The one that requires, in order to be hacked, to get a bootleg copy > of the IOS source, all the tools needed to compile it, understand how it > works, be able to modify the code... > > b) The one that does not?
you don't have to have the source to IOS in order to figure out a way to get a router to tunnel the traffic to a compromised, programmable host of your choosing. just build the attack into a mail virus. then all you need is one client inside the firewall running outlook express... Keith -------------------------------------------------------------------- IETF IPng Working Group Mailing List IPng Home Page: http://playground.sun.com/ipng FTP archive: ftp://playground.sun.com/pub/ipng Direct all administrative requests to [EMAIL PROTECTED] --------------------------------------------------------------------
