Penetration Testing mailing list archives
Re: Raptor Firewall
From: Mike Shaw <mshaw () wwisp com>
Date: Fri, 07 Dec 2001 08:35:54 -0600
I used raptor for about 4 years at an old job.One thing you always have to do with raptor is check the log files. It usually tells you something that will at least get you started.
The other thing about Raptor is make absolutely sure you have more than enough RAM, and a very very large swapfile (at least double the regular NT recommended size was our rule of thumb). There were three times where we had weird things like this and upping the swapfile/RAM helped.
Do you have SYN flood protection on? Older versions had real performance problems when this was enabled.
Another thing is to make sure they don't have any strange configurations--massive port redirections, etc. Check the configs and make sure it's not the product of a non-educated 'configurer'.
If anything, your pen-test just found a quick way to dos the site! But we very rarely had problems with Raptor, it's a top-notch product so make sure they aren't doing something incorrect.
-Mike At 12:06 AM 12/7/2001 +0000, Stuart wrote:
We've run a pentest against a customer recently and found that the very act of port scanning their Raptor firewall (running on NT) crippled its ability to accept incoming connections for their web site. The firewall is a new high spec PIII and the least line is a decent size. The nmap scans were standard timing (not T5 or anything daft) - once the scans were stopped, things burst back in to life within about 10minutes. This sounds like a lack of available connections type problem (similar to SYN flooding) to me. The firewall was running at about 10% CPU usage at the time and was not swapping to disk at all, also strangely, internal access outbound to the net for web browsing seemed unaffected? Its the latest version of Raptor and we're told its fully patched up to date. Does this ring any bells with anyone? Seems very odd to me... a portscan should not cause a DOS by itself... thanks Stuart IT Security Consultant, UK ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
Current thread:
- Writing to Windows Security Log Tina Bird (Dec 05)
- Stunnel Problems Stuart (Dec 06)
- Re: Stunnel Problems Joerg Over (Dec 10)
- RE: Stunnel Problems Bugtraq (Dec 10)
- Raptor Firewall Stuart (Dec 06)
- Re: Raptor Firewall H D Moore (Dec 10)
- Re: Raptor Firewall Alex Butcher (pentest) (Dec 10)
- Re: Raptor Firewall Mike Shaw (Dec 10)
- Re: Raptor Firewall Erik Parker (Dec 10)
- <Possible follow-ups>
- Re: Writing to Windows Security Log Tina Bird (Dec 06)
- Re: Writing to Windows Security Log Adrien de Beaupre (Dec 10)
- RE: Writing to Windows Security Log Brass, Phil (ISS Atlanta) (Dec 10)
- Stunnel Problems Stuart (Dec 06)