On Sun, 28 Jun 2020 18:46:03 +0200, R.Wieser wrote:
> Alister,
>
>> your reasoning is flawed from the outset as if a device's on bothe
>> networks can communicate with the "Post-office"
>> then tha become a vector for attack between the networks anyway.
>
> Well, feel free to come up with a(ny) solution that /doesn't/ have any
> "vector for attack". Go on, try it.
Exactly!
>
>> But I suspect you are once again forwarding a non-realistic requirement
>> just to see how many knots you can tie the responders up in.
>
> Damn, there I was, thinking I put a rather simple question forward, and
> even described how I thought that it could work. But somehow it seems
> to have gone be a bit over your head ...
>
> I must say I do not quite understand that. I mean, how hard is it to
> imagine a RPi which reads datablocks from one TCP/IP interface and
> writes it to the other one (and vise-verse) - and as a result dropping
> all IP and port info from either side. That doesn't really sound like
> rocket-science, now does it ?
No It sounds exactly like A ROUTER!
>
> Regards,
> Rudy Wieser
--
We are anthill men upon an anthill world.
-- Ray Bradbury
--- SoupGate-Win32 v1.05
* Origin: Agency HUB, Dunedin - New Zealand | FidoUsenet Gateway (3:770/3)
|