Firewall Wizards mailing list archives
AW: AW: Blocking Offensive Material(??) with Firewall
From: "Kunz, Peter" <Peter.Kunz () sisclear com>
Date: Thu, 24 Jun 1999 15:13:45 +0200
[Kunz, Peter] Basically, this is trivial. I'd liek to see soemthing dropping a connection absed on the stream content. Any chance we'll everseesomething liek that? The FW rule being:Drop all malicious JAVA code.Actually, that feature already exists to some degree. See http://www.checkpoint.com/products/firewall-1/contsec.html for further information on their Content Security hooks. It says that it can do a number of things. It can strip Java applet tags from HTML pages, strip Java applets from all server-to-client replies, block suspicious back connections and rip out ActiveX (Huzzah) and Javascript. Unfortunately, it can't really differentiate "malicious" code from any other. It's an all-or-none approach at the moment.
[Kunz, Peter] Ok, now this sounds one step better than blocking IPs - thus making it seem quite practical.
3)Blocking isn't a pure science. They may add something to their black-list because it has the word 'cervix' or the like, when it's a legitimate site talking about uterine cancer. Who knows how in depththeyinvestigate before adding it to their list.[Kunz, Peter] Yeah, look at the case of that Cyberwatch company also bannign gays, lesbians, balck rights, etc. Big scandal that somehow never got too public...I was waiting for something like that to happen...
[Kunz, Peter] 1996: Solid Oaks Software's CyberSitter. The hidden agenda was discovered by Cyberwire Dispatch. In Inetenet time, this happened looooong ago :-)) cu -pete
Current thread:
- AW: AW: Blocking Offensive Material(??) with Firewall Kunz, Peter (Jun 25)