[19870] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Raptor 6.5 http vulnerability

daemon@ATHENA.MIT.EDU (Alexander Bochmann)
Tue Mar 27 11:43:40 2001

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Message-ID:  <20010327162524.C846@styx.gxis.de>
Date:         Tue, 27 Mar 2001 16:25:24 +0200
Reply-To: Alexander Bochmann <ab@GXIS.DE>
From: Alexander Bochmann <ab@GXIS.DE>
X-To:         Lysel Christian Emre <chlys@wmdata.com>,
              "raptor-list@firetower.com" <raptor-list@firetower.com>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <20010327002632.F6370@styx.gxis.de>; from ab@gxis.de on Tue,
              Mar 27, 2001 at 12:26:32AM +0200

...on Tue, Mar 27, 2001 at 12:26:32AM +0200, Alexander Bochmann wrote:

 > (On another note, at least with 6.5, if spoofing protection
 > isn't activated and configured correctly on the internal
 > interfaces, you can also flood the internal network with
 > packets generated by the firewall as answer to (spoofed)
 > packets on the outside interface - if you know the networks
 > used internally.)

*ugh* yes, that was a dumb remark :(

Yes, I know it's in the docs, and I know it was changed from
"good practice" to "strongly recommended" somewhere between
5.0 and 6.5.

Alex.

home help back first fref pref prev next nref lref last post