This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/ripe-atlas@ripe.net/
[atlas] Probe cannot connect from behind IDS/IPS with HTTPS inspection
- Previous message (by thread): [atlas] Probe cannot connect from behind IDS/IPS with HTTPS inspection
- Next message (by thread): [atlas] Probe cannot connect from behind IDS/IPS with HTTPS inspection
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Ondřej Caletka
Ondrej.Caletka at cesnet.cz
Wed May 21 17:10:15 CEST 2014
Dne 21.5.2014 16:58, Philip Homburg napsal(a): > I'm curious what this firewall is trying to do. If it allows > unrestricted outbound connectivity over ssh, but not ssh on port 443. > What is that rule trying to protect? I don't think anyone ever knows. It's like with the DNS inspection modules for Cisco not allowing UDP/53 packets bigger than 512 bytes (effectively killing EDNS0 and DNSSEC) but allowing unrestricted traffic on any other UDP port :) -- Ondřej -------------- next part -------------- A non-text attachment was scrubbed... Name: smime.p7s Type: application/pkcs7-signature Size: 5563 bytes Desc: Elektronicky podpis S/MIME URL: </ripe/mail/archives/ripe-atlas/attachments/20140521/a9b682b3/attachment.p7s>
- Previous message (by thread): [atlas] Probe cannot connect from behind IDS/IPS with HTTPS inspection
- Next message (by thread): [atlas] Probe cannot connect from behind IDS/IPS with HTTPS inspection
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]