I
agree with a lot of what you both have said, however the fact remains that RPC
is, in and of itself, an insecure system - RPC is built around the assumption of
trust - it must implicitly trust everyone to do its job.
Using
RPC, a client connects to a server and requests information for connecting to a
particular service (that's the function of the end point mapper - which is what
runs on port 135). The client then contacts that service which handles the
authentication itself.
So -
the end point mapper by definition has to trust everyone. There is no
authenticate before ask concept in RPC - authentication happens AFTER RPC
communications are already established. That's the core
problem.
Roger
--------------------------------------------------------------
Roger D. Seielstad - MTS MCSE MS-MVP Sr. Systems Administrator Inovis Inc.
|
Title: Message
- RE: [ActiveDir] New RPC DOS Mulnick, Al
- RE: [ActiveDir] New RPC DOS Roger Seielstad
- RE: [ActiveDir] New RPC DOS Chianese, David P.
- RE: [ActiveDir] New RPC DOS Rick Kingslan
- RE: [ActiveDir] New RPC DOS Roger Seielstad
- RE: [ActiveDir] New RPC DOS Roger Seielstad
- RE: [ActiveDir] New RPC DOS Roger Seielstad
- RE: [ActiveDir] New RPC DOS Roger Seielstad
- RE: [ActiveDir] New RPC DOS Rick Kingslan
- RE: [ActiveDir] New RPC DOS Bendall, Paul
- Re: [ActiveDir] New RPC DOS Andy David
- RE: [ActiveDir] New RPC DOS Mulnick, Al
- RE: [ActiveDir] New RPC DOS Pelle, Joe
- RE: [ActiveDir] New RPC DOS Roger Seielstad
- RE: [ActiveDir] New RPC DOS Darren Mar-Elia
- RE: [ActiveDir] New RPC DOS Rick Kingslan
- RE: [ActiveDir] New RPC DOS Roger Seielstad