On Wed, 24 Jan 1996, Schlter, Olaf wrote:
> To support a proprietary UDP based application procotol through a
> firewall, unfortunately not suitable for proxying with udprelay or
> other application gateway solutions available on the market, we are
> seeking for a packet-filterung firewall with a user authentification
> component, i.e. packet filtering rules allowing use of the protocol
> should only be active after the firewall has verified the identity of
> the person using the host which wants to be connected to the
> application server inside the protected network. The primary concern
> of this mail is to gain knowledge about availability of a solution
> like the one described above. Discussions about the implications, pros
> and cons of such a design are welcome, but not as urgent needed as the
> market information.
Question; How do you plan on verifing the identity of a user? Even
those sites running identd can spoof identities...
"Cutting the space budget really restores my faith in humanity. It
eliminates dreams, goals, and ideals and lets us get straight to the
business of hate, debauchery, and self-annihilation." -- Johnny Hart
***testing, only testing, and damn good at it too!***
OK, so you're a Ph.D. Just don't touch anything.