MSGID: <10j5sc7$3etcd$10@dont-email.me> 97e783a4   
   REPLY: 61f54d99   
   PID: PyGate 1.5.2   
   TID: PyGate/Linux 1.5.2   
   CHRS: ASCII 1   
   TZUTC: 0000   
   REPLYADDR tnp@invalid.invalid   
   REPLYTO 3:633/10 UUCP   
   On 01/01/2026 12:26, Richard Kettlewell wrote:   
   > The internal network destination address_is_ in its routing table.   
      
   But not its port. And not in its NAT table,   
      
   The essence of NAT is that the originating port cannot be accessed directly.   
      
   And that *everything* gets translated, There is no concept of 'allowing    
   some shit through even though it's not in my NAT tables' beyond    
   theoretical.   
      
   Whether that is a feature of NAT or a firewall, is semantics, but *in    
   practice* it is not a security risk.   
      
   If the police want to examine my server, they simply knock on the door    
   with a warrant. No matter what protocol is on the interface   
      
      
      
   --    
   All political activity makes complete sense once the proposition that    
   all government is basically a self-legalising protection racket, is    
   fully understood.   
      
      
      
   --- PyGate Linux v1.5.2   
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 112 134 200 206 275 300 317 400 426   
   SEEN-BY: 229/428 470 616 664 700 705 266/512 291/111 292/854 320/219   
   SEEN-BY: 322/757 342/200 396/45 460/58 633/10 280 414 418 420 422   
   SEEN-BY: 633/509 2744 712/848 770/1 902/26 2320/105 5020/400 5075/35   
   PATH: 633/10 280 229/426   
      
|