On 11 May 2006, at 1:56 AM, [EMAIL PROTECTED] wrote:
--On May 10, 2006 6:22:11 PM -0700 Mark Jayson Alvarez
[EMAIL PROTECTED] wrote:
Because if the machine has been compromised, it doesn't *matter*
what the outgoing ruleset is. Or what anything else is, for that
matter.
What if you're
Mark Jayson Alvarez wrote:
I've seen most people allow all outgoing traffic
originating from the firewall itself... Is this really
recommended??
No. It's highly desirable to perform egress filtering if possible, but
many people lack the time or the detailed knowledge to determine what
Hi,
I've seen most people allow all outgoing traffic
originating from the firewall itself... Is this really
recommended?? What if the machine have been
compromised and the intruder have installed a program
that let's him access the machine remotely by having
the program itself to initiate the
On Wed, May 10, 2006 at 06:22:11PM -0700, Mark Jayson Alvarez wrote:
Hi,
I've seen most people allow all outgoing traffic
originating from the firewall itself... Is this really
recommended?? What if the machine have been
compromised and the intruder have installed a program
that let's him
--On May 10, 2006 6:22:11 PM -0700 Mark Jayson Alvarez [EMAIL PROTECTED]
wrote:
I've seen most people allow all outgoing traffic
originating from the firewall itself... Is this really
recommended?? What if the machine have been
compromised and the intruder have installed a program
that let's
I've seen most people allow all outgoing traffic
originating from the firewall itself... Is this really
recommended?? What if the machine have been
A server being a server (and a firewall is nothing but a specific
server) there is no reason one would run a client application from
that machine.