[16296] in bugtraq
Response: Stateful Inspection of FireWall-1
daemon@ATHENA.MIT.EDU (Scott Walker Register)
Fri Aug 18 05:42:43 2000
Mime-Version: 1.0
Content-Type: TEXT/PLAIN; CHARSET=ISO-8859-1
Message-Id: <Chameleon.966542438.walker@stinky>
Date: Thu, 17 Aug 2000 10:22:55 -0800
Reply-To: Scott Walker Register <scott.register@US.CHECKPOINT.COM>
From: Scott Walker Register <scott.register@US.CHECKPOINT.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
Below are some additional pieces of information relevant to the original
"Stateful Inspection of FireWall-1" posting.
1. Additional information about these issues may be found at
http://www.checkpoint.com/techsupport/alerts
2. Service packs which address all of these issues may be downloaded
at www.checkpoint.com/techsupport. Please read the relevant release
notes.
3. Several of the referenced vulnerabilities rely on manually editing
the control.map file to weaken authentication. This kind of reconfiguration
is not and has never been recommended by Check Point. Specifically,
Check Point does not recommend using "127.0.0.1: */none" in control.map;
and FWN1 is not supported, documented, or recommended as an alternative
to the standard FW-1 inter-module authentication and encryption mechanisms
(S/Key and FWA1 are supported, and FWA1 is strongly recommended).
----------------------------------------------------------------
Scott.Register@us.CheckPoint.com || FireWall-1 Product Manager
Check Point Software Technologies, Inc.
2255 Glades Road / Suite 324A \ Boca Raton, FL 33431
Voice: 561.989.5418 | Fax: 561.997.5421 | 08/17/00 10:22:55
----------------------------------------------------------------