Peter Cox wrote:
> >Does it also use the idea of simulating connections and in this simulation
> >adding additional communication for performing user authentication?
> >The idea seems simple - why is it usually not used? Are there
> >security weaknesses inherent that I oversee? What are disadvantages
> >of this approach?
> Janus does not provide additional authentication for outgoing connections,
> there is no need, the authentication is a task for the remote system.
I beg to differ.
Of course I want outgoing authentication for certain services/users/machines.
Unauthenticated external access is fine if you work in an environment that is
used only by professionals that really know what they are doing. But there
are plenty of other situations where one does not want everybody on the inside
to access external systems.
Andreas Siegert / Postmaster IBM Deutschland GmbH | Never grep a yacc
AIX Field Support Center Anzinger Strasse 29 | by the i-node!
Internet: afx @
de D-81671 Muenchen | Opinions are my own,
VNET: AFX @
IPNET Voice: (49)-(89)-4504-4509 not IBM's.