Always put in positive checks if your system is sensitive and you are exposed to potentially hostile network environments.
It is possible for someone with the right tools (and you can download them :-( ) to subvert inter-host authorisation at the TCP Network level. Port blockers and spoofed TCP packet credentials are just part of the game...... S.A.T.A.N. was just the first of a set of tools that have been developed for legitimate purposes and misused. Later tools were deliberately crafted. Once a "trust" is set up between two systems or networks you are potentially vulnerable. If you *have* to sue trusted relationships I am sure you use separate physical networks and IP filtering. Don't you ? B.T.W. System Auditing Tool for Analysing Networks Regards and let's just be safe out there............ JayJay ------- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/