This document contains important information not included in the FireWall-1 User Guide. Please review this information before installing or using FireWall-1.
A license password is required to activate FireWall-1 after installation.
Bugs fixed in this release include but are not limited to the following:
/usr/share/lib/terminfo/
, which causes two problems:
$FWDIR/conf/fwauthd.conf
is not modified (because the command ex -
, which is used to edit the file, does not work in the absence of a dumb terminal) and all services remain secured by default.
/rcS.d/r30rootusr.sh
file (a file needed for boot security) is not edited and so there is no boot security.
/etc/rcS.d/S30rootusr.sh
gets corrupted, and the system fails to reboot. Before installing the software, please contact Sun for a patch that solves this problem.
The FTP Security Server is invoked when a rule specifies an FTP Resource in the Service field and/or User Authentication in the Action field. If no FTP Resource is specified in the rule (that is, if the Security Server is invoked because the Action is User Authentication), then an FTP Resource of GET and PUT allowed for all files is applied.
The FireWall-1 FTP Security Server passes all other FTP commands to the FTP server for execution.
File Names
File name matching is based on the concatenation of the file name in the command and the current working directory (unless the file name is already a full path name) and comparing the result to the path specified in the FTP Resource definition. When specifying the path name in the FTP Resource definition, only lower case characters and a directory separator character / can be used.
The Security Server modifies the file name in the command as follows:
When the Security Server cannot resolve a file name, the action it takes depends on the Action specified in the rule being applied:
$FWDIR/bin/fw stat
|
Another "low cost" alternative is to deploy SYNDefender Gateway, and if a SYN attack occurs, to deploy SYNDefender Relay.
In SYNDefender Relay, the FireWalled gateway completely isolates the server from SYN flooding attacks, that is, the connection is not passed to the server until after its validity is verified. The cost is that the FireWalled gateway must relay (with some overhead) every single TCP packet for the lifetime of the connection. In contrast, with SYNDefender Gateway, the gateway "forgets" about the connection after a short timeout period or after the connection has been established.
In addition, problems may arise when a FireWall's Security Policy is uninstalled, or when a FireWall is rebooted. Since every connection was relayed by the FireWall, these connections become "confused," and the network may be overloaded by the servers' futile attempts to resolve this confusion.
In summary, if SYNDefender is required, start with SYNDefender Gateway. If you find that your servers are coming under frequent SYN flooding attacks (as apparent from the Log Files), and that your server performance deteriorates as a result of the non-active (short timeout) connections created for each attack attempt, then you should consider the SYNDefender Relay method.
Passive SYNDefender Gateway is an inferior method to both SYNDefender Gateway and SYNDefender Relay. The guidelines above refer to SYNDefender Gateway rather than to Passive SYNDefender Gateway.
Please have the following information ready when you call: