You are also assuming that only Windows is vulnerable to this. Are
Linux and BSD network card drivers somehow immune?
--- Puryear Information Technology, LLC Baton Rouge, LA * 225-706-8414 http://www.puryear-it.com Author: "Best Practices for Managing Linux and UNIX Servers" "Spam Fighting and Email Security in the 21st Century" Download your free copies: http://www.puryear-it.com/publications.htm Wednesday, April 11, 2007, 3:28:23 PM, you wrote: > Sorry for the top-posting. > I agree that if you're surfing with *BSD inside VMware running on a > Windows host, the Windows host is still vulnerable (the TCP/IP stack, > your windows NIC drivers, the OS itself, and who knows what else can > be compromised). However, if you open a VPN session back to a secure > host (say a Linux box on your LAN at home), and direct all surfing > traffic through the tunnel, I would think that your Windows host would > probably be safe from attack via your actual surfing. > However, the Windows host is still connecting to the access point, > which is in my mind the likeliest attack vector in the described > setup. A fake AP (remember the stories about trojan APs in various > airports over the Christmas holidays? I remember seeing one of them in > Atlanta Hartsfield), some fool sniffing traffic out in the parking > lot, worms spread from the infected laptop 2 tables away, etc.... you > get the picture. Sure, your bank transactions via *BSD and VMware, > tunneled back to your Linux box at home, may be secure, but your > Windows laptop is still subject to attack. > --Joey > On 4/11/07, Dustin Puryear <dustin@puryear-it.com> wrote: >> I thought this was an interesting thread.. > <mass snippage> ___________________ Nolug mailing list nolug@nolug.orgReceived on 04/11/07
This archive was generated by hypermail 2.2.0 : 12/19/08 EST