[KLUG Members] Re: Broadband firewalls -- [continued] flawed logic and analysis ...
Robert G. Brown
members@kalamazoolinux.org
Sun, 08 Dec 2002 00:19:11 -0500
>On Sat, 2002-12-07 at 23:32, Robert G. Brown wrote:
>> Request of Bryan Smith:
>> Please provide the readers with some examples of the kind of non-IP
>> vulnerabilities you write about in such grat generality and length.
>
>By using the word "vulnerabilities," you _miss_ the point.
No, Bryan, by claiming I "_miss_ the point", it is YOU who are _missing_ the
point.
I claim a vulnerability is anythng that permits resouce use that is not
desiable (meaning: required to acheive a goal that the facilities exist to
do.
>These aren't "vunerabilities," they are _inherit_raw_access_to_your_system_
>by protocol design!
No, Bryan, these are vulnerabilities, even if they're designed in.
>First off, I really don't want to get into this because I'll have to
>dive into the differences between ICMP, UDP, TCP and proprietary
>network/transport protocols.
This cripples your presentation, and makes eveything you're writing seems
vague, general, lame, and half-baked. You are _mising_ _the_ _point_!
I asked for an EXAMPLE, not a TOME or a TEXTBOOK. I few of us know a thing or
two about the topics you mention above. I suggest you proceed.
Regards,
---> RGB <---