On Nov 19, 2007 6:37 PM, Chris Zakelj <[EMAIL PROTECTED]> wrote: > Clint Pachl wrote: > > Is it possible for a cracker to compromise or root a machine on a > > network that has pf enabled with the single rule "block all in"? > I suspect you're just fishing, but in the interests of spirited debate.... > - Is "block in all" the first rule, the last rule, or somewhere in > between? (Yes, it DOES matter)
It does say "single" rule. > - Does the cracker have alternate methods of entry (tty, ssh, console, etc)? Social engineering? Usually the weakest point. Greg -- Ticketmaster and Ticketweb suck, but everyone knows that: http://ticketmastersucks.org Obsession in the low desert: http://lodesertprotosites.org Dethink to survive - Mclusky