Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 10 Oct 2000 07:26:49 +0200
From:      Saad KADHI <obsidian@cybercable.fr>
To:        freebsd-chat@freebsd.org
Subject:   Re: Check Point FW-1
Message-ID:  <39E2A899.3BB2151C@cybercable.fr>
References:  <20001008125715.T25121@149.211.6.64.reflexcom.com> <Pine.LNX.4.10.10010090101210.18821-100000@jamus.xpert.com> <20001008225125.A25121@149.211.6.64.reflexcom.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi there,

"Crist J . Clark" wrote:

> On Mon, Oct 09, 2000 at 01:03:08AM +0200, Roman Shterenzon wrote:
> > On Sun, 8 Oct 2000, Crist J . Clark wrote:
> >
> > > On Sat, Oct 07, 2000 at 01:33:04PM -0400, Brian Reichert wrote:
> > > > On Fri, Oct 06, 2000 at 10:57:37PM -0700, Craig Cowen wrote:
> > > > > The big cheeses at work want to use check point instead of ipf or any
> > > > > other open source solution.
> > > > > Can anybody help me with vunerabilities to this so that I can change
> > > > > thier minds?

There are a "lot" of vulnerabilities in FireWall-1 that can scare the hell out
of the big cakes (or was it cheeses ?) ;-). On security-focus.com, there are at
least 5 vulnerabilities (for both 4.0 and 4.1) that I have tested myself and
found to be working. Just go to www.security-focus.com and click on
vulnerabilities and select Check Point Software from the drop-down menu. Look at
the latest 5 vulnerabilities. Try them to make sure they are still working.

Also, get a look @:
http://www.dataprotect.com/bh2000/blackhat-fw1.html
This is a very good paper about how to bypass FireWall-1 security checkings that
was discussed during the black hat conf' in Las Vegas.

If the above couldn't change their minds to IPF (this is REALLY a very good
piece of firewall), then nothing would!

HTH

>
> > > >
> > > > I found that Checkpoint 4.0 (this may have changed) doesn't do NAT
> > > > right; it uses NAT across _all_ interfaces, instead of letting you
> > > > pick one.
> > >
> > > Right, it determines whether to do NAT by source address, destination
> > > address, and destination port. Actually, it is not possible to do
> > > _anything_ per interface from the GUI. Wouldn't it be nice (and
> > > wouldn't you expect a firewall to be able) to block anything not
> > > destined for a small block of registered IPs at the external
> > > interface? Well, you can't put a rule to do that in the GUI.
> >
> > That's rule 0 - it does antispoofing stuff.
> > It's really simple. From the GUI.
>
> It's only simple if you have only a LAN behind the box. If you've got
> multiple, non-adjacent logical netblocks routed behind the box, it is
> non-trivial to setup the "built-in" antispoofing.
>
> > Now, does it have anything to do with FreeBSD-security?
>
> Not much anymore, redirected to -chat if anyone still cares.
> --
> Crist J. Clark                           cjclark@alum.mit.edu
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message

--
Saad KADHI -- Security Engineer
---------------------------------
perl -e 'print ($myself=pack(c2,unpack(c,EOF)-3,(((hex(0x666)/6)-666)/2)-66+4),
pack(c3,((int(exp(666)/10e287)+int(log(666)*2))*2)+10,int(crypt(ski,72)),oct(12)));'





To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-chat" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?39E2A899.3BB2151C>