Raptor Firewall

From: Stuart (stuart.hackinfoat_private)
Date: Thu Dec 06 2001 - 16:06:23 PST

  • Next message: H D Moore: "Re: Raptor Firewall"

    We've run a pentest against a customer recently and found that the very act
    of port scanning their Raptor firewall (running on NT) crippled its ability
    to accept incoming connections for their web site. The firewall is a new
    high spec PIII and the least line is a decent size. The nmap scans were
    standard timing (not T5 or anything daft) - once the scans were stopped,
    things burst back in to life within about 10minutes.
    
    This sounds like a lack of available connections type problem (similar to
    SYN flooding) to me. The firewall was running at about 10% CPU usage at the
    time and was not swapping to disk at all, also strangely, internal access
    outbound to the net for web browsing seemed unaffected?
    
    Its the latest version of Raptor and we're told its fully patched up to
    date.
    
    Does this ring any bells with anyone? Seems very odd to me... a portscan
    should not cause a DOS by itself...
    
    
    thanks
    Stuart
    IT Security Consultant, UK
    
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
    Service. For more information on SecurityFocus' SIA service which
    automatically alerts you to the latest security vulnerabilities please see:
    https://alerts.securityfocus.com/
    



    This archive was generated by hypermail 2b30 : Thu Dec 06 2001 - 22:02:07 PST