[ previous ] [ next ] [ threads ]
 From:  Chris Dollmont <cdollmont at mac dot com>
 To:  Matthew Martz <mkm17 at psu dot edu>
 Cc:  m0n0wall at lists dot m0n0 dot ch
 Subject:  Re: [m0n0wall] detection
 Date:  Wed, 24 Aug 2005 09:20:55 -0700
Hash: SHA1

Given that m0n0wall is, in essence, a firewalling router, I'd say  
they'd have issues with it. It's possible that the first law of IT  
applies (It's always easier to beg forgiveness than seek permission),  
but that's a call you'd have to make.

m0n0wall itself is (can be) pretty dark, but at the very least there  
would be one additional hop added to the route in front of your  
laptop, so they would know that something is there. It is possible to  
make m0n0wall *appear* to be your laptop using MAC spoofing and  
whatnot, but it would definitely *not* have a Windows signature so  
any automated network mapping tools would disclose it as being  
something other than a laptop.

As far as impacting their side, there really shouldn't be any impact  
other than the loss of a direct connection to the laptop. They would  
be unable (unless you allowed them) to run inventory or other types  
of checks against the laptop.


On Aug 24, 2005, at 9:06 AM, Matthew Martz wrote:

> I am looking to run a monowall box to firewall my laptop but was  
> wondering if this can be detected by network admins and whether  
> such a setup causes any issues on their side that would become a  
> problem.   I believe they mention that they do not allow routers  
> etc. to be implemented.
> Any input?
> Thanks a million,
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: m0n0wall dash unsubscribe at lists dot m0n0 dot ch
> For additional commands, e-mail: m0n0wall dash help at lists dot m0n0 dot ch

Version: PGP Desktop 9.0.2 (Build 2425)