>State vs. proxy is a religious issue for some, but then again, some
>swear by MS-Proxy as a firewall.
Indeed, I've participated in such discussions.
>I've seen the problem first hand, and the Checkpoint-1 report from the
>NSA points this out also.
You must be referring to the table filling up, and the firewall dropping
connections. I've confirmed this on this list as well. I don't consider
this to be a corruption of the table, as it behaves exactly as
expected, and disallows new connections and doesn't crash. The one
bad thing I will say is that it starts burning CPU time under those
and I don't know why that should be. Perhaps it has to do with the
it uses to clear old entries? Set the fwhmem parameter low, and
run IS from ISS through it if you want to see it in action.
>The NSA pointed out state-based specific vulnerabilities (which their
>report admits they did not fully test):
> Exploitation of an allowed service
> Insider threat - opening up ports to the outside
> Exploitation of ports opened by a legitimate user
> Subversion of the stateful packet filtering mechanism
In fact, the article states quite clearly that these are not SPF
specific, except for the last one.
>The test "Test 6: Overflow of internal tables" describes the overflow,
>results, and DOS attack. The problem should be fixed by now. Staunch
>defenders of the packet filter faith deny it ever happened. See
I don't deny it happened, and I think I qualify as a staunch
SPF defender. As mentioned before, I can confirm those results.
I've also seen my old AG go choke regularly, mostly due to slow
hardware and an older OS (SunOS on Sparc 5.) The TCP SYN
attack is a similar example. If your table fills up, and denies new
requests, and doesn't overflow onto the stack or some such,
that's really OK, and as it should be.
Received: from tunnel.sybase.com ([22.214.171.124]) by ibwest.sybase.com
(Lotus SMTP MTA v4.6.1 (569.2 2-6-1998)) with SMTP id 882565DE.0068FDBD;
Mon, 6 Apr 1998 12:06:47 -0700
Received: from smtp1.sybase.com (smtp1 [126.96.36.199])
by tunnel.sybase.com (8.8.4/8.8.4) with SMTP
id MAA01172 for <Ryan_Russell @
tunnel-w>; Mon, 6 Apr 1998 12:05:50
Received: from inergen.sybase.com by smtp1.sybase.com
id AA28776; Mon, 6 Apr 98 12:05:49 PDT
Received: from pse02.pios.com ([188.8.131.52])
by inergen.sybase.com (8.8.4/8.8.4) with SMTP
id MAA11843 for <ryanr @
com>; Mon, 6 Apr 1998 12:07:32 -0700
Received: by pse02.pios.com; (5.65v3.2/1.3/10May95) id AA07796; Mon, 6 Apr
1998 15:05:39 -0400
Date: Mon, 06 Apr 1998 15:05:35 -0400
From: "Stout, William" <StoutW @
Subject: RE: socks versus fw-1 stateful inspection vulnerabilities
To: "'Ryan Russell'" <ryanr @
Cc: "'firewalls @
COM'" <firewalls @
X-Mailer: Microsoft Exchange Server Internet Mail Connector Version
Content-Type: text/plain; charset="us-ascii"