Alister,
> your reasoning is flawed from the outset as if a device's on
> bothe networks can communicate with the "Post-office"
> then tha become a vector for attack between the networks
> anyway.
Well, feel free to come up with a(ny) solution that /doesn't/ have any
"vector for attack". Go on, try it.
> But I suspect you are once again forwarding a non-realistic
> requirement just to see how many knots you can tie the
> responders up in.
Damn, there I was, thinking I put a rather simple question forward, and even
described how I thought that it could work. But somehow it seems to have
gone be a bit over your head ...
I must say I do not quite understand that. I mean, how hard is it to
imagine a RPi which reads datablocks from one TCP/IP interface and writes it
to the other one (and vise-verse) - and as a result dropping all IP and port
info from either side. That doesn't really sound like rocket-science, now
does it ?
Regards,
Rudy Wieser
--- SoupGate-Win32 v1.05
* Origin: Agency HUB, Dunedin - New Zealand | FidoUsenet Gateway (3:770/3)
|