From mboxrd@z Thu Jan 1 00:00:00 1970 Message-ID: To: 9fans@cse.psu.edu Subject: Re: [9fans] circular logic (was webdav...) From: "Skip Tavakkolian" MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit Date: Mon, 4 Nov 2002 15:32:45 -0500 Topicbox-Message-UUID: 156192c8-eacb-11e9-9e20-41e7f4b1d025 It is a circuitous approach -- forced by many external factors -- that gets to the right solution (eventually). Something like: the proxy/firewall device doesn't know the protocol, therefore the IT department wont allow it, which forces the HTTP tunneling, which gives the system/protocol a chance to become popular, which makes it a legitimate protocol and gets it on the vendors' radars, which is then supported, obviating the need for tunneling. > non-http protocols are dangerous. > therefore we'll only allow http. > > only http is allowed. > therefore we'll tunnel everything over http.