> -----Urspr�ngliche Nachricht-----
> Von:  Elizabeth Zwicky [SMTP:[EMAIL PROTECTED]]
> Gesendet am:  Samstag, 29. Mai 1999 00:24
> An:   [EMAIL PROTECTED]
> Betreff:      Re: Best Security Thread
> 
> 
> >As my position involves recommending network security components to both
> >commercial and government entities, I would appreciate more discussion on
> >the threats protocols like DCOM hold for networks.  Has anybody seen that
> >particular protocol used maliciously yet (other than Microsoft).
> 
> The lower level protocol DCOM
> uses is Microsoft RPC. Like all the other RPCs, Microsoft RPC
> uses dynamically allocated ports above 1024. DCOM is also capable
> of using server callbacks (where the server initiates communication
> to the client independent of the original call). Whether DCOM
> is UDP or TCP depends on what platform you're using, but UDP is
> the default for NT. Just for a bonus, DCOM imbeds IP addresses inside
> packets, so you can kiss straightforward NAT goodbye.
> 
        [Kunz, Peter]  Now this sounds majorly ugly, a nice list of about
everything you wouldn't want. So, can we now go bash MS for DCOM or just for
their RPC architecture? :-)

        cu
        -pete
>  
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to