Re: ProFTPD

1999-09-03 Thread pb
Hi, Note that user takes the value "user@host" given at password prompt for anonymous access (forgetting any potential dns attacks into remhost) This allows anyone to smash the stack just with an anonymous access and a file to download. (see last published exploits.) Regards, Pascal On Mon, Aug

RE: Firewall-1 Information leak

2001-07-23 Thread MALIN, ALEX (PB)
SecuRemote works with 2 FireWall-1 encryption schemes, FWZ and IKE. Here's my reading on it. If you use IKE, you MUST deselect "respond to unauthenticated topology requests." However, if you use FWZ, CheckPoint recommends that you select "respond to unauthenticated topology requests." As the previ