I could, if I were so inclined, tell you the names of many systems that
are behind many types of firewalls. That does not mean that I got through
the firewall to get that information - I may have worked on the system,
the name of a system could have been included in a legitimate
Simply naming a system (especially when the existance of said system
hasn't been verified) isn't "proof" in my book.
I have worked on systems at govt. sites that are behind FW-1. I know the
names of many of these systems. I could probably guess the names of
others, just by following the naming conventions. This could be offered as
"proof" that the firewall was compromised, even though it was not.
My b.s. detector is going off.
On Fri, 10 Jan 1997, Gabriel Dura wrote:
> There is a guy, working on his own, who claims he knows how to penetrate
> FBI's firewall.
> As a proof I was told that behind the firewall there is there is another
> computer 'phi.fbi.gov'.
> In the case of me being correctly informed and FBI is using FW-1 you have
> an answer.
> Hope it helps,
> Gabriel Dura
> dura @
> P.S. I can not guarantee the accuracy of this information and I can not
> reveal the person who told me.
> > From: mike <mike @
> > To: firewalls @
> > Subject: FW-1 hacked?
> > Date: miercuri, ianuarie 08, 1997 16:27
> Hi all
> Does anyone know if FW-1 was ever hacked?