From owner-freebsd-security Tue Aug 22 23:34:38 2000 Delivered-To: freebsd-security@freebsd.org Received: from mailhost01.reflexnet.net (mailhost01.reflexnet.net [64.6.192.82]) by hub.freebsd.org (Postfix) with ESMTP id 167F437B43F for ; Tue, 22 Aug 2000 23:34:36 -0700 (PDT) Received: from 149.211.6.64.reflexcom.com ([64.6.211.149]) by mailhost01.reflexnet.net with Microsoft SMTPSVC(5.5.1877.197.19); Tue, 22 Aug 2000 23:33:28 -0700 Received: (from cjc@localhost) by 149.211.6.64.reflexcom.com (8.9.3/8.9.3) id XAA47310 for freebsd-security@freebsd.org; Tue, 22 Aug 2000 23:34:32 -0700 (PDT) (envelope-from cjc) Date: Tue, 22 Aug 2000 23:34:32 -0700 From: "Crist J . Clark" To: freebsd-security@freebsd.org Subject: Blackhat Firewall-1 Codes Message-ID: <20000822233432.K28027@149.211.6.64.reflexcom.com> Reply-To: cjclark@alum.mit.edu Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 1.0i Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Has anyone been playing with the demonstration codes for Checkpoint's Firewall-1 from the Blackhat Briefing Presentations by Lopatic and McDonald? The URL with the codes and other information is at, http://www.dataprotect.com/bh2000/ I have been trying to get the 'fw1tun' codes to run under FreeBSD. I have been getting, $ ./icmp [args] sendto: Invalid argument I've been running the programs in the debugger, but I just don't have the experience with coding raw datagrams and sendto(3) to figure out exactly what the problem is. It's probably something obvious and the codes are only 140 and 230 lines long. Anyone have any advice? Oh, just for the record, I am trying to see if some firewalls we have (ones not on the Internet, so no games from any kids out there) can be exploited. -- Crist J. Clark cjclark@alum.mit.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message