Thus spake Steve Holden ([EMAIL PROTECTED]):

> I teach the odd security class, and what you say is far
> from true. As long as the service is located behind a
> firewall which opens up the correct holes for it, it's
> most unlikely that corporate firewalls would disallow
> client connections to such a remote port.

Don't be too sure about that - most of the well-run
corporate networks I have been involved with block outbound
traffic by default. It is certainly sound security policy to
shunt outbound traffic through intermediary servers (e.g.
SMTP) and proxies (e.g. HTTP and FTP) so that it can be
logged, monitored, tracked, and controlled.

This is the strategy I recommend to my clients - the only
sensible one in a world of spyware, worms, insecure web
browsers and corporate espionage...




Cheers,


Aldo



--
Aldo Cortesi
[EMAIL PROTECTED]
http://www.nullcube.com
Off: (02) 9283 1131
Mob: 0419 492 863
-- 
http://mail.python.org/mailman/listinfo/python-list

Reply via email to