PDA

Bekijk Volledige Versie : Re: Backdoor in Fortinet´



Derek Martin
04/06/05, 00:55
--sm4nu43k4a2Rpi4c
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline

On Thu, Jun 02, 2005 at 12:28:53PM -0700, Michael J McCafferty wrote:
>
> This is a documented feature of the FortiGate and FortiLog devices.
> You must have a local serial connection. So, this is not remotely
> exploitble. If someone has physical access to your firewall to make
> a serial connection, then you have plenty of other problems too.

While this is definitely so, in the real world we do not always have
complete control over who has physical access to our devices. We may,
for example, have co-located devices in a facility managed by some
other entity.

Some PC manufacturers have a jumper on the motherboard which can be
used to reset BIOS passwords/defaults, which requires that the machine
be taken out of service in order to be reset (or tampered with). I
think this is a much better model for device recovery than a default
password on a console login... We are probably a lot more likely to
notice our firewall being taken out of service than we are to notice
someone tampering with the console...

--
Derek D. Martin
http://www.pizzashack.org/
GPG Key ID: 0x81CFE75D


--sm4nu43k4a2Rpi4c
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFCoJyHdjdlQoHP510RAoH5AKCZkUD4D/Aww6iocTVt32jqP70OOgCeNHF3
DQ9DW5og05v3NDiyTJ46csQ=
=LvSW
-----END PGP SIGNATURE-----

--sm4nu43k4a2Rpi4c--