I know that a number of companies participate in IP Multicast based
services and these types of applications use UDP for delivery of
content. There are other organizations that allow SNMP management
through firewalls through firewall-vendor specific authentication
techniques, as well as source IP address filtering (excepting any IP
spoofing attempts).
I'm not an expert hacker, and I also don't subscribe to alt.2600, but
the firewall product we use within our organization is the market
leader, and we securely support UDP datagrams through our firewall.
If there are CERT advisories or other real-world scenarios regarding
break-ins or other misuse of UDP datagrams to thwart security, then I
would like to know about them. These of course would need to be detailed
explanations, hopefully not of the form "Well, I've heard UDP is a
problem with firewall admins..."
Randy
-----Original Message-----
From: Larry Masinter [SMTP:masinter@parc.xerox.com]
Sent: Wednesday, February 04, 1998 6:20 PM
To: Turner, Randy
Cc: 'ipp@pwg.org'
Subject: Re: IPP> Notifications
> UDP has no more firewall or proxy problem than TCP, given any
arbitrary
> port number.
> The issues are the same for both.
Is this a "first principles" argument? That is, are you speaking
from experience
with firewall developers and maintainers, or is it just based on
reasoning
about the nature of the protocols? What I have heard, both from
local firewall maintainers at Xerox and more generally in
discussions of
firewall issues in other Internet protocols, is that there's
a substantial difference in the considerations of a site
allowing
inbound UDP packets, allowing TCP connections with known
semantic
content, and allowing inbound HTTP posts with well known data
content.
Perhaps you have some different data that you could share with
us?
Larry
--
http://www.parc.xerox.com/masinter