Martin Seeger on Nostr: nprofile1q…xd2rl I have seen this as well. But those attacks could usually have ...
nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqe7rqcsp5pypj3ac5wxnvgnwxmdl5the60wggwlqytaxm9kql0cdsaxd2rl (nprofile…d2rl) I have seen this as well. But those attacks could usually have been mitigated with a second firewall of the same vendor as good/bad as with a firewall of a different one.
Attack vectors against firewalls are usually VPN or management connections.
Doing firewalls for 30+ years now, I do not know of any incident of a firewall being successfully attacked when it was purely operating as firewall in the original sense.
I usually recommend companies to replace the second firewall by one of the same vendor but reducing it to basic functionality.
In all cases where I was involved and a firewall was „hacked“ it happened after patches were available and usually went through functions the company wasn’t even using.
Even without patch they would have been safe if they had understood their system and disabled unused functionality.
Firewalls (even multiple ones) are no magic bullets. Attention to policy and config matters.
In IT security a realistic approach to your own capabilities is essential. You don’t get more secure by spreading a tiny bit of butter on tons of bread.
Attack vectors against firewalls are usually VPN or management connections.
Doing firewalls for 30+ years now, I do not know of any incident of a firewall being successfully attacked when it was purely operating as firewall in the original sense.
I usually recommend companies to replace the second firewall by one of the same vendor but reducing it to basic functionality.
In all cases where I was involved and a firewall was „hacked“ it happened after patches were available and usually went through functions the company wasn’t even using.
Even without patch they would have been safe if they had understood their system and disabled unused functionality.
Firewalls (even multiple ones) are no magic bullets. Attention to policy and config matters.
In IT security a realistic approach to your own capabilities is essential. You don’t get more secure by spreading a tiny bit of butter on tons of bread.