Footnotes
- ...
- Intruders have been observed to target specific
sites for intrusions by methodically scanning host systems for vulnerabilities.
Intruders often use automated probes, i.e., software that scans all host
systems connected to a site's network.
This is sometimes referred to as probing a site.
- ...
- sendmail is the mail transport software for most UNIX hosts. It is a very large, complex program that has been found
repeatedly to contain vulnerabilities that have permitted intruder access to
systems that run sendmail.
- ...
- It should be
pointed out that even vendor-supported software has such problems and may
be even harder to get fixed in a timely fashion.
- ...
- Some sites have instituted policies
that deny put and get commands in certain directions; having a firewall
that can filter FTP commands is especially useful in such a situation.
Some sites have disallowed get commands outbound, thus no users could
retrieve information or software from outside sources.
Other sites have disallowed put commands outbound, thus no users could
store information on FTP servers external to the site.
More common has been to allow no put commands inbound, thus no external
users can write to FTP servers at the site.
- ...
- Some dual-homed
gateway firewalls do not use proxy services but require users to have accounts
on the gateway for access to the Internet.
This firewall is not recommended, as maintaining multiple accounts on a
firewall can lead to user mistakes, which can lead to intruder attacks
and break-ins.
- ...
- The
application gateway could also be located on the Internet
side of the router with no apparent loss in security.
Locating the application gateway on the outside may help to reinforce the
understanding that it is subject to Internet attacks and should not
necessarily be trusted.
John Wack
Thu Feb 9 18:17:09 EST 1995