I'm curious as to why you consider phone lines to be trustworthy, and
how you've secured them (particularly ISDN). About a year ago, I had
trouble finding an ISDN unit that would even handle DES.
Mike Bernhardt wrote:
| At 7:05 AM 12/30/96, Ralph Docken wrote:
| >Question: If that workstation, which isn't under my physical
| >control, is connected to something else, which I have no control
| >over, could someone on the "something else" network use the
| >validated workstation as a stepping stone through my FW-1? If
| >so, is there some way to detect that? My initial scenario was
| >that some outsider could crack into the poorly defended external
| >workstation, then use telnet or something like that to ride the
| >validated workstation's credentials through my firewall.
| We don't allow any access over the internet to anything. We have secured
| dial-up and isdn access for users that need access from outside. But that's
| us, your needs may be different.
"It is seldom that liberty of any kind is lost all at once."