Leon -

Firewalls that have built-in proxies will solve the problem that you are
talking about.  Nowadays a wide range of proxies can be run - not just the
traditionals.  The proxies essentials take over the connection, typically
transparently to both sides of the connection.

- Lee

> -----Original Message-----
> From: leon [mailto:[EMAIL PROTECTED]]
> Sent: Wednesday, February 06, 2002 20:20
> To: [EMAIL PROTECTED]
> Subject: basic stateful inspection question
> 
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Hi everyone,
> 
> I have a question regarding stateful inspection firewalls
> (specifically pix and checkpoint).
> 
> It seems to me that a lot of people use either nat or pat and that
> these types of firewalls
> by default drop unsolicited connection attempts (meaning packets that
> arrive with the syn bit set).
> Any packet that leaves the network is put in the state table so that
> the return packets can come back in.
> My question is this; if I were to exploit a client-side buffer
> overflow and I got the system to make a
> connection to me via netcat with a destination port of 80, would I
> circumvent a majority of the stateful
> inspection firewalls?  It seems that these firewalls trust that ALL
> connections originating from the
> inside are good.  Now I know we could block off destination ports of
> services we don't want to allow
> access to (say no port 23 traffic leaves the network because we don't
> allow telnet) but I am wondering
> if either of these firewalls have a method of filtering based on
> protocol (for example allow 80 to be
> a destination port but only http traffic can cross it.  No netcat, no
> aim, no limewire just http.
> 
> I have seen a ton of networks where I came in and I found people
> using things like aim even though
> the firewall specifically only permitted port 80 traffic out
> (obviously these people switched the port
> from 5190 to 80).
> 
> So to reiterate; is there a way to configure pix or checkpoint to
> judge the connection based on protocol
> as opposed to arbitrary things like source ip, destination IP or port
> numbers?
> 
> Cheers and thanks in advance,
> 
> PS: Links are appreciated but flames are not :)
> 
> Leon
> 
> 
> -----BEGIN PGP SIGNATURE-----
> Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com>
> 
> iQA/AwUBPGHkRtqAgf0xoaEuEQJgUgCgiGaVcoapw7+T4+QYqADv/jJYIycAni9v
> W0GcE8qAvdNF6ZNanoDjjyn3
> =u/Nk
> -----END PGP SIGNATURE-----
> 

Reply via email to