The underlying issue, however, is that you're passing a fundamentally
untrustworthy protocol (RPC) over a significantly more trusted[1] protocol
(http/https). 

This is simply an issue of obfuscating the real network traffic to get
around some significant shortcomings of the RPC protocol.

--------------------------------------------------------------
Roger D. Seielstad - MTS MCSE MS-MVP
Sr. Systems Administrator
Inovis Inc.

[1] Not that HTTP is any more trustworthy. It is, however, less promiscuous
as a protocol - it has a smaller footprint of what it can and can't do.


> -----Original Message-----
> From: Webb, Andy [mailto:[EMAIL PROTECTED] 
> Sent: Friday, October 03, 2003 4:52 PM
> To: Exchange Discussions
> Subject: RE: Exchange 2003 RPC over HTTP
> 
> 
> Note that ISA server is actually smart about being able to 
> pass the RPC
> necessary for Exchange and not other malformated RPC traffic if I
> remember correctly.  And you're not opening up RPC to the net, rather
> https.  The RPC traffic originates inside your network after the HTTPS
> has been authenticated. 
> 
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Roger
> Seielstad
> Sent: Friday, October 03, 2003 12:29 PM
> To: Exchange Discussions
> Subject: RE: Exchange 2003 RPC over HTTP
> 
> The single biggest benefit of RPC over HTTP is that it's a 
> single port.
> The single biggest problem with RPC over HTTP is that it's a single,
> well known port.
> 
> The archives from last month (or maybe a few back) have covered this
> discussion, but ultimately its not a terribly secure thing.
> 
> --------------------------------------------------------------
> Roger D. Seielstad - MTS MCSE MS-MVP
> Sr. Systems Administrator
> Inovis Inc.
> 
> 
> > -----Original Message-----
> > From: Bridges, Samantha [mailto:[EMAIL PROTECTED]
> > Sent: Friday, October 03, 2003 12:24 PM
> > To: Exchange Discussions
> > Subject: Exchange 2003 RPC over HTTP
> > 
> > 
> > Hello All.
> > 
> > I really think it is neat that Exchange 2003 can do RPC over HTTP, 
> > however, I don't see this being very secure.  Especially with the 
> > latest vulnerabilities i.e....Blaster...etc..
> > 
> > What is your opinions about this new feature.  Will anyone in the 
> > discussion use the RPC over HTTP?  If yes, how will you 
> secure it?  If
> 
> > no, why?
> > 
> > Hoping for some opinions and comments.
> > 
> > Thank you,
> > 
> > Samantha Bridges
> > 
> > _________________________________________________________________
> > List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> > Web Interface: 
> > http://intm-dl.sparklist.com/cgi-bin/lyris.pl?enter=exchange&t
> ext_mode=&lang=english
> To unsubscribe:         mailto:[EMAIL PROTECTED]
> Exchange List admin:    [EMAIL PROTECTED]
> 
> _________________________________________________________________
> List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> Web Interface:
> http://intm-dl.sparklist.com/cgi-bin/lyris.pl?enter=exchange&t
ext_mode=&
lang=english
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]



_________________________________________________________________
List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
Web Interface:
http://intm-dl.sparklist.com/cgi-bin/lyris.pl?enter=exchange&text_mode=&lang
=english
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]

_________________________________________________________________
List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
Web Interface: 
http://intm-dl.sparklist.com/cgi-bin/lyris.pl?enter=exchange&text_mode=&lang=english
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]

Reply via email to