lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 26 Jun 2003 17:37:53 +0000 From: "Brian Soby" <tmpbox5@...mail.com> To: bugtraq@...urityfocus.com Subject: RE: Authentication Vulnerability in NetScreen ScreenOS >However, after a user is authenticated, anyone else may also access the >protected services if they orginate from the same source IP address (NAT'd >network). The authentication mechanism is designed to authenticate based on >source-ip address only. Most firewalls track authenticated users based on the client's source IP address. If you need a stronger method, you could always use the Netscreen Remote client software and require a secure tunnel from the clients to get to your protected resources. -Brian Soby _________________________________________________________________ The new MSN 8: advanced junk mail protection and 2 months FREE* http://join.msn.com/?page=features/junkmail
Powered by blists - more mailing lists