On 7/12/07, Sean Cavanaugh [EMAIL PROTECTED] wrote:
.
.
as for the pfSense people, they have a habit of working and fixing issues
with the core of pfSense pretty soon after you notify them of the issue. its
not uncommon for the FIRST response to a problem report to be try the
snapshot in 2
Bill Marquette wrote:
Please clarify. If you are referring to IPS, you get what you pay for
(and in the case of PIX, I'm not convinced you actually do get what
you paid for).
Is there an history of security holes in these components of PfSense
(PF, IPSec-Tools, QOS)?
Ugo
I know of no official audit of our code. Nor have I ever seen a post
to bugtraq, full-disclosure, or anything on secunia. But take that
for what it's worth...nothing.
--Bill
On 7/11/07, Ugo Bellavance [EMAIL PROTECTED] wrote:
Bill Marquette wrote:
Please clarify. If you are referring to
@pfsense.com From: [EMAIL PROTECTED] Date: Wed, 11 Jul 2007
14:42:10 -0400 Subject: [pfSense Support] Re: Vulnerabities? Bill
Marquette wrote: Please clarify. If you are referring to IPS, you get what
you pay for (and in the case of PIX, I'm not convinced you actually do get
what you paid
Am 11.07.2007 um 20:53 schrieb Bill Marquette:
I know of no official audit of our code. Nor have I ever seen a post
to bugtraq, full-disclosure, or anything on secunia. But take that
for what it's worth...nothing.
A code audit of the GUI/back-end would be pretty nice.
But even if the
On Wed, 2007-07-11 at 23:38 +0200, Rainer Duffner wrote:
Am 11.07.2007 um 20:53 schrieb Bill Marquette:
I know of no official audit of our code. Nor have I ever seen a post
to bugtraq, full-disclosure, or anything on secunia. But take that
for what it's worth...nothing.
A code