> Could you expand on this a bit? I'm not sure under what conditions
> packets could "leak" when the OS has no protocols bound in order to
> receive packets let alone decode them and pass them along. An example of
> how an attacker could do this would be very cool.

i'm thinking due to user error on the part of the sysadmin -- someone sees an
interface and says "hmm..., i need xxxx" and forgets that there is a good
reason why that interface was not configured.




-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to