[10036] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Possible security hole

daemon@ATHENA.MIT.EDU (Ryan Russell)
Mon Mar 29 17:26:04 1999

Date: 	Sun, 28 Mar 1999 19:07:57 -0800
Reply-To: Ryan Russell <Ryan.Russell@SYBASE.COM>
From: Ryan Russell <Ryan.Russell@SYBASE.COM>
X-To:         Christoforos Karatzinis <chka@SOLUTIONS.IE>
To: BUGTRAQ@NETSPACE.ORG

>The first 25 packets were lost before the interface's initialization. The
>packets with sequence number greater than 34 are droped from the firewall.
>What about the packets with sequence number 25-34? Is it possible that
>someone can use this time (after the interface's initialization and before
>the firewall's initialization) to do something bad?

Absolutely.  There is a period of time while the FW is booting when the
OS is up, but the FW software is not.  FW-1 makes no attempt to hook
the IP stack in such a way to prevent this.  You MUST secure the
underlying OS ON YOUR OWN.  FW-1 does NOT "harden" the OS..

As for pings being dropped.. it's not unusual for some OSes
(IOS included) to respond to pings, and then not, and then
respond again during a boot.  The second time not responding
may be when the FW software kicked it, depending on the rules
set.

                         Ryan

home help back first fref pref prev next nref lref last post