Penetration Testing mailing list archives

Raptor Firewall


From: "Stuart" <stuart.hackinfo () btinternet com>
Date: Fri, 7 Dec 2001 00:06:23 -0000

We've run a pentest against a customer recently and found that the very act
of port scanning their Raptor firewall (running on NT) crippled its ability
to accept incoming connections for their web site. The firewall is a new
high spec PIII and the least line is a decent size. The nmap scans were
standard timing (not T5 or anything daft) - once the scans were stopped,
things burst back in to life within about 10minutes.

This sounds like a lack of available connections type problem (similar to
SYN flooding) to me. The firewall was running at about 10% CPU usage at the
time and was not swapping to disk at all, also strangely, internal access
outbound to the net for web browsing seemed unaffected?

Its the latest version of Raptor and we're told its fully patched up to
date.

Does this ring any bells with anyone? Seems very odd to me... a portscan
should not cause a DOS by itself...


thanks
Stuart
IT Security Consultant, UK


----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


Current thread: