>From: "Paul D. Robertson" <[EMAIL PROTECTED]>
>Maybe because most people who install Gauntlet turn off everything that
>isn't totally necessary?  I don't know why anyone would choose a default
>installation of a critical security product.  I've installed and helped
>others install a fair number of Gauntlet systems (along with a few
>different commercial firewalls- none of which recieved a default install),
>and I've never had even one with Cyberpatrol enabled

Hey Paul when you do an install, do you use the GUI tool to administer the 
firewall?  My guess is yes since that is where most people do it now.  Did 
you happen to know there is a neat little bug in the GUI tool?  Oh yea, if 
you turn off the Cyberpatrol proxy, it says its off, but nope, its still 
running.  So now lets assume that there are installers out there that think 
they are turning it off even when they are not.  Not such a neat little 
issue eh?


>>Perhaps also because most of them have had the product for more than 30
>days?  It certainly took a lot longer than that at my last install to get
>through testing/patching/testing

It takes you longer then 30 days to install a Gauntlet Firewall?  Please 
remind me note to invite you to do an install at our site!  I agree that 
there is testing and patching, but 30 days?

>As to why there's been little discussion, perhaps it's because it's not
>that interesting.  Since you can MD5 the installation through normal
>procedures and archive those off-box, it's not that difficult to check to
>see if your system has been changed if you had Cyberpatrol activated.

The concern is not if the system has been changed.  Obviously now people are 
becoming aware of the issue.  The problem is the people who were not aware 
or might still not be.  If I were going to exploit this, I would just write 
code that gave me a remote shell when I attacked the port.  I would then 
just restart the daemon when I was done.  Now there is no code loaded on the 
box and MD5 wont be finding anything.  So I am confused how the first 
exploit of this type (As in gaining access to the firewall) is not 
interesting???  I just read an article over at businessweek about this 
exploit under the BW daily section and after reading that it seems even more 
interesting.


>It looks to me like the widely available exploit code requires a
>compromised client or malicious Web server to realize, since you can't
>connect to the http proxy from the external network even in a default
>install.

I am not sure what code you saw, but the code over at security focus can be 
used by anyone on any remote machine.  Granted that it is setup to be used 
from a Linux box, but find me one person who doesnt have linux now that has 
a clue whats going on.  Not to mention its very easy to port.

>
>Lastly, it could be because most of us are jaded about code quality or
>firewalling anymore.

I do agree with you there.  If you look at all the exploits coming out on 
security products, you can't help but feel jaded.

_Gramble_
________________________________________________________________________
Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to