lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200406231737.i5NHbPsK024138@turing-police.cc.vt.edu>
From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu)
Subject: CISCO Vpn 

On Wed, 23 Jun 2004 10:51:52 CDT, Ron DuFresne said:

> The main problem with a vpn tunnel for workers from home is keeping them
> from messing with the system and changing the defaults estblished, and
> making sure the security policy on the machine remain as hig as the policy
> for the corp network.  Things like having the AV sigs up to date, no split
> tunneling such that the user can irc while tunneled back into work, etc.
> The main risk is in providing nothing more then a secure tunel for all the
> home users nasties to travel back into the corp network.  It's estimated
> that at least 75% of vpn's in place for this kind of use are nothing more
> then that.

And remember - even the Director of the CIA didn't get this one right... ;)

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 226 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040623/77ed9078/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ