[KLUG Members] Re: Broadband firewalls -- [continued] flawed logic and analysis ...

Robert G. Brown members@kalamazoolinux.org
Sun, 08 Dec 2002 00:19:11 -0500


>On Sat, 2002-12-07 at 23:32, Robert G. Brown wrote:
>> Request of Bryan Smith:
>>   Please provide the readers with some examples of the kind of non-IP 
>> vulnerabilities you write about in such grat generality and length.
>
>By using the word "vulnerabilities," you _miss_ the point.
No, Bryan, by claiming I "_miss_ the point", it is YOU who are _missing_ the
point.

I claim a vulnerability is anythng that permits resouce use that is not 
desiable (meaning: required to acheive a goal that the facilities exist to
do.

>These aren't "vunerabilities," they are _inherit_raw_access_to_your_system_ 
>by protocol design!
No, Bryan, these are vulnerabilities, even if they're designed in.

>First off, I really don't want to get into this because I'll have to
>dive into the differences between ICMP, UDP, TCP and proprietary
>network/transport protocols.
This cripples your presentation, and makes eveything you're writing seems 
vague, general, lame, and half-baked. You are _mising_ _the_ _point_!
I asked for an EXAMPLE, not a TOME or a TEXTBOOK. I few of us know a thing or
two about the topics you mention above. I suggest you proceed.

							Regards,
							---> RGB <---