[19870] in bugtraq
Re: Raptor 6.5 http vulnerability
daemon@ATHENA.MIT.EDU (Alexander Bochmann)
Tue Mar 27 11:43:40 2001
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Message-ID: <20010327162524.C846@styx.gxis.de>
Date: Tue, 27 Mar 2001 16:25:24 +0200
Reply-To: Alexander Bochmann <ab@GXIS.DE>
From: Alexander Bochmann <ab@GXIS.DE>
X-To: Lysel Christian Emre <chlys@wmdata.com>,
"raptor-list@firetower.com" <raptor-list@firetower.com>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <20010327002632.F6370@styx.gxis.de>; from ab@gxis.de on Tue,
Mar 27, 2001 at 12:26:32AM +0200
...on Tue, Mar 27, 2001 at 12:26:32AM +0200, Alexander Bochmann wrote:
> (On another note, at least with 6.5, if spoofing protection
> isn't activated and configured correctly on the internal
> interfaces, you can also flood the internal network with
> packets generated by the firewall as answer to (spoofed)
> packets on the outside interface - if you know the networks
> used internally.)
*ugh* yes, that was a dumb remark :(
Yes, I know it's in the docs, and I know it was changed from
"good practice" to "strongly recommended" somewhere between
5.0 and 6.5.
Alex.