(Illustration by Gaich Muramatsu)
>>>>> "Jan" == Jan Harkes <jaharkes_at_cs.cmu.edu> writes: Jan> I guess that people who have to manage the firewall would Jan> really hate it. Anybody who allows _anything_ to pass through their firewall at the IP level by default deserves what they get, as far as I can tell. Any stream can be tunneled through, and given the conflicting incentives of users and firewall admins, the admins should assume that knowledgable users will do so. Better that we produce a well- documented tunnel that they can supervise than users produce ad-hoc solutions that are much harder to deal with. -- University of Tsukuba Tennodai 1-1-1 Tsukuba 305-8573 JAPAN Institute of Policy and Planning Sciences Tel/fax: +81 (298) 53-5091 _________________ _________________ _________________ _________________ What are those straight lines for? "XEmacs rules."Received on 2000-05-16 20:26:26