> I'm looking for a URL or article (I belive last year) where hackers broke
> into a site and obtained source for a particular firewall.
> Apparently this was from a firewall vendor partner site. The hackers broke
> through the firewall to get to the source.
> Due to insinutations that I may be slandering a company, or making negative
> statements that can't be disproved, I won't name the firewall. However it
> does use stateful inspection. ;)
I won't say this is an urban myth, but it could be.
What somebody got somehow (not clear that they broke through a firewall) was
some Checkpoint FireWall-1 INSPECT code. INSPECT is Checkpoint's scripting
language for defining the filtering rules used by the filtering engine. This
is no big deal. No one stole any source code.
Besides, Checkpoint does not distribute sources to their partners.
> Bill Stout