From owner-freebsd-security Thu Oct 7 18:12:47 1999 Delivered-To: freebsd-security@freebsd.org Received: from cc942873-a.ewndsr1.nj.home.com (cc942873-a.ewndsr1.nj.home.com [24.2.89.207]) by hub.freebsd.org (Postfix) with ESMTP id 8C8C114C9A for ; Thu, 7 Oct 1999 18:12:43 -0700 (PDT) (envelope-from cjc@cc942873-a.ewndsr1.nj.home.com) Received: (from cjc@localhost) by cc942873-a.ewndsr1.nj.home.com (8.9.3/8.9.3) id VAA19639; Thu, 7 Oct 1999 21:15:20 -0400 (EDT) (envelope-from cjc) From: "Crist J. Clark" Message-Id: <199910080115.VAA19639@cc942873-a.ewndsr1.nj.home.com> Subject: Re: Syslog over serial In-Reply-To: <4.1.19991005185332.009763d0@mail.thegrid.net> from The Mad Scientist at "Oct 5, 1999 06:54:25 pm" To: madscientist@thegrid.net (The Mad Scientist) Date: Thu, 7 Oct 1999 21:15:20 -0400 (EDT) Cc: freebsd-security@FreeBSD.ORG Reply-To: cjclark@home.com X-Mailer: ELM [version 2.4ME+ PL54 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The Mad Scientist wrote, > I figured all the normal rules of tcp/ip applied to a ptp connection over > parallel. This means that I've created a connection across my inner > firewall. I suppose one solution would be to run ipfw on the logging host > and allow only udp-port-514-traffic in. Of course, I might as well be > using ethernet. ^_^ Parallel lines add some protection from snooping > though. How does a peer-to-peer parallel connection offer more protection from snooping that a peer-to-peer crossover cable? -- Crist J. Clark cjclark@home.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message