At 02:29 PM 11/28/00 -0500, Marcus J. Ranum wrote:
>Basically, here's what I've managed to find out: An early version
>of FW-1 was examined by people from X group at NSA. They wrote
>a classified technical report and one of the things in it was
>an observation that allegedly some of the files in FW-1 contained
>hardcoded IP addresses of machines in Israel. The modules in
>question were apparently the SNMP trap generation code, which
>was based on the CMU SNMP library - which, I believe, used to

Checkpoint had a report done by CSC for them to address these exact
issues.  You might be able to see a copy from Checkpoint under some
set of conditions (asking, non-disclosure, begging, ...).  

This thread belongs in: http://www.urbanlegends.com/
and resurfaces with regularity like most urban legends.

Marcus'  comments about sleazy marketing sum up the origin, IMHO.

Consider also: http://www.checkpoint.com/press/1999/nsa101999.html
Believe it or not.

If you are in a position where you can not afford the level of trust
you would get from a binary version of Checkpoint:

  1. pay them for the source or right to examine it
  2. write your own software


Allen Leibowitz         <[EMAIL PROTECTED]>               http://www.anzen.com
Anzen Computing, Inc.           514 E. Washington               Ann Arbor, MI  48104
+1.734.669.0800 Voice   +1.734.669.0404 FAX

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to