[isalist] Re: Nothing is secure like PIX

  • From: "Egyptian Mind" <innocent_angel_eng@xxxxxxxxxxx>
  • To: isalist@xxxxxxxxxxxxx
  • Date: Mon, 26 Jun 2006 08:09:09 -0800

http://www.ISAserver.org -------------------------------------------------------

It's really a wise point :)




    Best Regards
   Mohamed Saleh
   
    Senior Network Administrator 
   
College of Business Administration, CBA
    Jeddah, Saudi Arabia
    Tel: +966-02-6563199 ext 2521
    Cell: - +966-50-2953591

 
 
!~` Yesterday is a History` ~!
!~` Tomorrow is a Mystery` ~!
!~` Today is a Gift` ~!
!~` So we call it ...............` ~!
!~` Present .......Simple` ~!
 
 

From: "Troy Radtke" <TRadtke@xxxxxxxxxxxx>
Reply-To: isalist@xxxxxxxxxxxxx
To: <isalist@xxxxxxxxxxxxx>
Subject: [isalist] Re: Nothing is secure like PIX
Date: Mon, 26 Jun 2006 10:41:49 -0500
>http://www.ISAserver.org
>-------------------------------------------------------
>
>Layered security has the trade off of complexity to (being correctly
>configured) increased security in most cases. It requires more
>planning, testing and diligence. Those three things alone can make a
>less than perfect solution much better than it is. A PIX has it's
>place, a ISA box has it's place, and even a little D-Link router has its
>place.
>
>When all you have is a hammer, everything looks like a nail. When you
>get a pneumatic hammer, everything is still a nail; it's just more fun
>to use.....
>
>
>
>________________________________
>
>From: isalist-bounce@xxxxxxxxxxxxx [mailto:isalist-bounce@xxxxxxxxxxxxx]
>On Behalf Of Egyptian Mind
>Sent: Monday, June 26, 2006 10:28 AM
>To: isalist@xxxxxxxxxxxxx
>Subject: [isalist] Re: Nothing is secure like PIX
>
>
>http://www.ISAserver.org
>-------------------------------------------------------
>
>Thanks for your suggestion , Steve
>
>It's realy appreciated, but would you take a look to this results after
>rearranging them by last modified,
>
>http://search.securityfocus.com/swsearch?query=ISA+vulnerability&sbm=%2F
>&submit=Search%21&metaname=alldoc&sort=swishlastmodified
>
>and, this special link, is written by researcher called Steve too :)
>
>http://www.securityfocus.com/archive/1/433075
>
>
>and if we search more, we will find more; about both, ISA or PIX or even
>watchgurad,
>
>as there is no full protected firewall; hardware or software, but we are
>just doing our best to protect our network from vulnerability by
>increasing the numbers of cascading gates, with different classes,
>
>but you know what ; I made something to my network....
>
>My external router has no real IP...
>
>it's just a local loop to the ISP , so that , I put the ISP security
>door as the front one,
>
>Increasing cascading different gates ,
>
>What do you think about it?
>
>
>
> Best Regards
> Mohamed Saleh
>
> Senior Network Administrator
> College of Business Administration, CBA
> Jeddah, Saudi Arabia
> Tel: +966-02-6563199 ext 2521
> Cell: - +966-50-2953591
>
>
>!~` Yesterday is a History` ~!
>!~` Tomorrow is a Mystery` ~!
>!~` Today is a Gift` ~!
>!~` So we call it ...............` ~!
>!~` Present .......Simple` ~!
>
>
>
> ________________________________
>
> From: "Steve Lunn" <Steve.Lunn@xxxxxxxxxxxxxxxx>
> Reply-To: isalist@xxxxxxxxxxxxx
> To: <isalist@xxxxxxxxxxxxx>
> Subject: [isalist] Re: Nothing is secure like PIX
> Date: Mon, 26 Jun 2006 14:42:28 +0100
>
>
>
> Can I suggest that you actually read that list of
>vulnerabilities that you just posted as they all relate to ISA 2000 and
>not ISA 2004.
>
>
>
> Regards,
>
> Steve
>
> Steve Lunn
> Technical Support Analyst - Microsoft MCP
>
>
>
> engage Mutual Assurance
> DDI: 01423 855101 Fax: 01423 855181
>
> ________________________________
>
> From: isalist-bounce@xxxxxxxxxxxxx
>[mailto:isalist-bounce@xxxxxxxxxxxxx] On Behalf Of Egyptian Mind
> Sent: 26 June 2006 13:40
> To: isalist@xxxxxxxxxxxxx
> Subject: [isalist] Re: Nothing is secure like PIX
>
>
>
>
> All right, Jim
>
> I didn't expect this bad atitude from someone supposed to be
>well educated and has a good technical knowledge as you have shown your
>self,
>
> and by the way, no body is perfect , I f you see that you know
>everything, it's a bug mistake..
>
> Knowing how the OS operating, and dealing with packets, throw
>RAM and processor,.. etc. will be easy if you r spend your life in this
>field, and your education is corosponding this issue.. ( Computing,
>processing and telecommunications), won't be ??
>
> And every one know that PIX is layer 4 device not like ISA Layer
>7,
>
> so Greg,,,,, what I was saying is that PIX is more secure than
>ISA till layer 4 processing..
>
> In addition, I said in my first mail that I'm using the two
>boxes ( PIX and ISA ) for dublication the security, and using ISA
>specially for controling application per user ( as also I said b4)
>
> and two doors are very good defender than one door only
>ofcourse,
>
> ***
>
> about the site u send Jim, I think you should select a site that
>revile PIX and give the glory to ISA , as I found the following link in
>this site too, saying 47 result about vulnerability in ISA
>
>
>http://search.securityfocus.com/swsearch?sbm=%2F&metaname=alldoc&query=I
>SA+vulnerability
><http://search.securityfocus.com/swsearch?sbm=/&metaname=alldoc&query=IS
>A+vulnerability>
>
>
>
> Finaly, I will close this issue from my side as I'm feel very
>sorry to this bad attitude reaction as the concept of this list is to
>discuss everyone issue and thoughts with eachother...., isn't it??
>
>
>
> Best Regards
>
> Mohamed Saleh
>
>
> Senior Network Administrator
> College of Business Administration, CBA
> Jeddah, Saudi Arabia
> Tel: +966-02-6563199 ext 2521
> Cell: - +966-50-2953591
>
>
>
>
> !~` Yesterday is a History` ~!
>
> !~` Tomorrow is a Mystery` ~!
>
> !~` Today is a Gift` ~!
>
> !~` So we call it ...............` ~!
>
> !~` Present .......Simple` ~!
>
>
>
>
>
> ________________________________
>
> From: "Jim Harrison" <Jim@xxxxxxxxxxxx>
> Reply-To: isalist@xxxxxxxxxxxxx
> To: <isalist@xxxxxxxxxxxxx>
> Subject: [isalist] Re: Nothing is secure like PIX
> Date: Sun, 25 Jun 2006 09:35:29 -0700
> >In response:
> >#1 - "PIX is more secure than ISA because it's a
>'hardware' firewall". This is pure, unadulterated BS, propagated by the
>same 1d10t's that ignore the *FACT* that PIX is nothing more than a
>custom OS (xNIX, usually). In fact, I've only heard of *one* "hardware"
>firewall; that it is strictly a L3-only box (much like your PIX)
> >
> >#2 - Speed & security are orthogonal. Security is
>demonstrated by resilience in teh face of unwanted traffic; speed is
>merely doing it faster.
> >
> >#3 - You need to read up on how any OS (specifically
>Windows) network functionality works. If you *ever* find packets being
>stored to disk before being processed, throw that device out the door
> >
> >#4 - I posted this for Tony Su; maybe you'll get more
>use ot of it:
>http://technet2.microsoft.com/WindowsServer/en/Library/823ca085-8b46-487
>0-a83e-8032637a87c81033.mspx After you've read up a bit, come back and
>rescind this argument
> >
> >#5 - this means nothing of the sort; if you can
>demonstrate this assertion with fact, then by all means do so. You
>should also go read up on how processes communicate in Windows.
> >
> >#6 - Let's see; if I stop the PIX firewall services,
>the machine is also open to attack <duh>.
> >
> >#7 - no machine of any sort has "unlimited"
>capabilities. If you really believe that this is possible, you must not
>occupy the same physical world as the rest of us.
> >
> >#8 - Based on this argument, ISA is also a "hardware"
>firewall as *all* traffic inspection (not just L3 as in PIX) is
>performed in RAM. Not one single packet ever leaves the motherboard
>except to enter or leave the network itself.
> >
> >#9 - The "adaptive security mechanism" is L3-only. ISA
>policy engine and packet filter driver operate all the way to L7. Thus,
>when the PIX is allowing RPC traffic to teh internal host "because it
>asked for it", ISA is blocking it as invalid traffic. Case in point;
>Blaster passed through every PIX on the planet; ISA blocked it in every
>single case.
> >
> >#10 - is unclear at best. What's your point other than
>to show how you can spew brand names?
> >
> >#11 - I noticed that you can research ISA issues, but
>you seem unable to find PIX vulns? I wonder how that can be? Go out to
>www.securityfocus.com and search under "Cisco" for "PIX Firewall". I
>see:
> >Multiple Cisco Products WebSense Content Filtering
>Bypass Vulnerability <http://www.securityfocus.com/bid/17883>
> >2006-05-09
> >http://www.securityfocus.com/bid/17883
> >
> >OpenSSL Denial of Service Vulnerabilities
><http://www.securityfocus.com/bid/9899>
> >2006-05-05
> >http://www.securityfocus.com/bid/9899
> >
> >Multiple Vendor TCP/IP Implementation ICMP Remote
>Denial Of Service Vulnerabilities
><http://www.securityfocus.com/bid/13124>
> >2006-03-22
> >http://www.securityfocus.com/bid/13124
> >
> >Cisco PIX TCP SYN Packet Denial Of Service
>Vulnerability <http://www.securityfocus.com/bid/15525>
> >2006-03-10
> >http://www.securityfocus.com/bid/15525
> >
> >Cisco Downloadable RADIUS Policies Information
>Disclosure Vulnerability <http://www.securityfocus.com/bid/16025>
> >2005-12-21
> >http://www.securityfocus.com/bid/16025
> >
> >Cisco IPSec Unspecified IKE Traffic Denial Of Service
>Vulnerabilities <http://www.securityfocus.com/bid/15401>
> >2005-11-14
> >http://www.securityfocus.com/bid/15401
> >
> >Multiple Vendor TCP Sequence Number Approximation
>Vulnerability <http://www.securityfocus.com/bid/10183>
> >2004-04-20
> >http://www.securityfocus.com/bid/10183
> >
> >Multiple Cisco PIX Remote Denial Of Service
>Vulnerabilities <http://www.securityfocus.com/bid/9221>
> >2003-12-15
> >http://www.securityfocus.com/bid/9221
> >
> >OpenSSL ASN.1 Large Recursion Remote Denial Of Service
>Vulnerability <http://www.securityfocus.com/bid/8970>
> >2003-11-04
> >http://www.securityfocus.com/bid/8970
> >
> >Cisco PIX ICMP Echo Request Network Address Translation
>Pool Exhaustion Vulnerability <http://www.securityfocus.com/bid/8754>
> >2003-10-03
> >http://www.securityfocus.com/bid/8754
> >
> >Multiple Vendor Session Initiation Protocol
>Vulnerabilities <http://www.securityfocus.com/bid/6904>
> >2003-02-21
> >http://www.securityfocus.com/bid/6904
> >
> >Multiple Vendor SSH2 Implementation Buffer Overflow
>Vulnerabilities <http://www.securityfocus.com/bid/6407>
> >2002-12-16
> >http://www.securityfocus.com/bid/6407
> >
> >Cisco PIX VPN Session Hijacking Vulnerability
><http://www.securityfocus.com/bid/6211>
> >2002-11-20
> >http://www.securityfocus.com/bid/6211
> >
> >Cisco PIX TACACS+/RADIUS HTTP Proxy Buffer Overrun
>Vulnerability <http://www.securityfocus.com/bid/6212>
> >2002-11-20
> >http://www.securityfocus.com/bid/6212
> >
> >Cisco PIX Firewall Telnet/SSH Subnet Handling Denial Of
>Service Vulnerability <http://www.securityfocus.com/bid/6110>
> >2002-11-05
> >http://www.securityfocus.com/bid/6110
> >
> >Cisco SSH Denial of Service Vulnerability
><http://www.securityfocus.com/bid/5114>
> >2002-06-27
> >http://www.securityfocus.com/bid/5114
> >
> >Cisco Malformed SNMP Message Denial of Service
>Vulnerabilities <http://www.securityfocus.com/bid/4132>
> >2002-02-12
> >http://www.securityfocus.com/bid/4132
> >
> >Cisco PIX Firewall SMTP Content Filtering Evasion
>Vulnerability Re-Introduction <http://www.securityfocus.com/bid/3365>
> >2001-09-26
> >http://www.securityfocus.com/bid/3365
> >
> >Cisco PIX TACACS+ Denial of Service Vulnerability
><http://www.securityfocus.com/bid/2551>
> >2001-04-06
> >http://www.securityfocus.com/bid/2551
> >
> >SSH CRC-32 Compensation Attack Detector Vulnerability
><http://www.securityfocus.com/bid/2347>
> >2001-02-08
> >http://www.securityfocus.com/bid/2347
> >
> >PKCS #1 Version 1.5 Session Key Retrieval Vulnerability
><http://www.securityfocus.com/bid/2344>
> >2001-02-06
> >http://www.securityfocus.com/bid/2344
> >
> >Cisco PIX PASV Mode FTP Internal Address Disclosure
>Vulnerability <http://www.securityfocus.com/bid/1877>
> >2000-10-03
> >http://www.securityfocus.com/bid/1877
> >
> >Cisco PIX Firewall SMTP Content Filtering Evasion
>Vulnerability <http://www.securityfocus.com/bid/1698>
> >2000-09-19
> >http://www.securityfocus.com/bid/1698
> >
> >Cisco Secure PIX Firewall Forged TCP RST Vulnerability
><http://www.securityfocus.com/bid/1454>
> >2000-07-10
> >http://www.securityfocus.com/bid/1454
> >
> >Multiple Firewall Vendor FTP "ALG" Client Vulnerability
><http://www.securityfocus.com/bid/1045>
> >2000-03-10
> >http://www.securityfocus.com/bid/1045
> >
> >Multiple Firewall Vendor FTP Server Vulnerability
><http://www.securityfocus.com/bid/979>
> >2000-02-09
> >http://www.securityfocus.com/bid/979
> >
> >Cisco PIX Firewall Manager File Exposure
><http://www.securityfocus.com/bid/691>
> >1998-08-31
> >http://www.securityfocus.com/bid/691
> >
> >Cisco PIX and CBAC Fragmentation Attack
><http://www.securityfocus.com/bid/690>
> >1998-08-18
> >http://www.securityfocus.com/bid/690
> >
> >Well, waddayano; seems like PIX takes this particular
>prize.
> >
> >#12 - this is nothing more than another indication of
>your vast Windows / ISA ignorance
> >
> >Please go educate yourself before making such claims,
>or at least ask Tony Su for advice.
> >
> >________________________________
> >
> >From: isalist-bounce@xxxxxxxxxxxxx on behalf of
>Egyptian Mind
> >Sent: Sun 6/25/2006 2:32 AM
> >To: isalist@xxxxxxxxxxxxx
> >Subject: [isalist] Re: Nothing is secure like PIX
> >
> >
> >http://www.ISAserver.org
>-------------------------------------------------------
> >
> >Dears,
> >
> >
> >
> >I'm sorry for not continuing mailing about this issue,
>but I was quit busy in upgrading in our network infrastructure, but I
>should tell you that I was really surprised by the 160 mails they were
>in my inbox about this issue..
> >
> >It means that this matter has gained a lot of
>attentions to most of members here in ISA List... I've really get amused
>by these mails which come from different members with different cultures
>and experiences about using hardware or software as a firewall boundary,
>although that some of you have taking this issue as some kind of joke,
>or to get amused by mocking ... :-):-):-)
> >
> >Anyway, I've really get amused by your mail, TOM, It
>was really funny and your way of talking and mocking the Idea is very
>interesting... Honestly, I laughed for 15 minutes ; none-stop when I was
>reading your blog :-):-):-):-):-) (( It does not mean ridiculing of you,
>but it means that your way of present your Idea is really interesting
>:-) :-):-)
> >
> >But let's start examine this issue in neutrality way...
>"and let me borrow your link for ' ISA Server 2006 Firewall Core' which
>u have send as you ask" :-)
> >
> >
> >
> >First: I didn't say that PIX is the most secure
>firewall in the world, and ' Supernova; The greatest hacker' can grantee
>this, I just said that PIX is more secure than ISA server, which is our
>issue here...( I mean that PIX as a Hardware firewall, is more secure
>than ISA as a software firewall)
> >
> >Second: you say that " Faster is not the better" and
>you repeated it in a very interesting way, but I think you should look
>at " ISA Server Firewall Core " in this paragraph:::::
> >
> >"""" Firewall Engine ( Firewall Packet Engine)
> >
> >Handling these operations in Kernal Mode, improves both
>performance and security. """""
> >
> >This means that Microsoft tends to increase the
>performance of firewall service and security service in ISA to make it
>faster as possible :-).
> >
> >Third: ISA 2006 firewall core depends on Network Driver
>Interface Specification ( NDIS) and Microsoft Networking Stack, that
>means that packet should pass the network interface, the processor, RAM,
>harddisk, till it reach the network driver in windows ( Kernal Layer)
>which located over the hardware layer and assembly layer, in the other
>hand, the packet is analyzed, interpreted and processed in hardware
>layer in any hardware firewall.
> >
> >Fourth: The TCP/IP Stack in firewall core in Kernal
>mode is controlled by windows , which refers to the previous point of
>even the firewall engine is analyzing the packet in layer 3 and 4 before
>beginning processing, it will of course reach layer 5 of windows which
>send it to the firewall engine in kernel mode.... (( Does it make
>sense??? )) or it's better to analyze the packet as soon as it reaches
>the network interface card, Isn't it??
> >
> >Fifth: In the purposed document
> >
> >" Policy Engine
> >
> >The policy engine communicates with all components of
>the ISA server firewall core, both with the Kernal-mode firewall engine
>and the user-mode firewall service, in addition the Policy Engine
>communicates with both layers of application and web filters""
> >
> >This means that there are a lot of channels opened
>between Firewall core and other applications running in ISA, which means
>" open ports", even this ports are opened in Kernal-mode, but it's still
>opened port :-)
> >
> >Sixth: These are some comments gathering from viewing
>just the first three papers of Microsoft Document, and I will not
>telling the comments getting from the rest of this document, or the mail
>will be too long :-) to read, but just I'd like to present this comment
>written in the document as my last word about this document;
> >
> >" Note The firewall engine driver is the root of the
>firewall dependency tree. Stopping the firewall engine driver ( by using
>net stop fweng /y at the command prompt) also stops the other Firewall
>components, which opens the computer to all network traffic """
> >
> >Open to all network traffic !!!!!!!!!!!!!!!!!!!!!, it
>means fully penetrated... how could it be that one command can penetrate
>my network to all attacks?????? ... it does not make sense at all, Does
>it??
> >
> >Seventh: you compares the ISA server 2006 ( which is
>last release) with PIX firewall, which is in market over than 20 years,
>and you didn't specify which version,, Microsoft has ISA 2000, 2004,
>2006... But CISCO has 501,501E,506E,515,525, and the greatest PIX 535,
>which has unlimited number of users ad unlimited numbers of concurrent
>VPN Connections ....
> >
> >Eighth : The OS of PIX is too small which can be loaded
>in RAM and some portion of processor, It doesn't mean just that it will
>be faster and faster than any software firewall, but I mean that the
>packet inspector process will be done at the hardware level, and in fact
>it happens in the assembly level... More than that, every interface in
>PIX has it's own firewall policy, firewall engine, access control,,,
>although you manage all interfaces by one screen, but in fact this
>screen is collecting policies and access controls and firewall services
>for all interfaces,,, as the OS of PIX divide itself to make each
>interface has it's own control, so no need to contact with the core OS
>or the kernel for any operations....
> >
> >Ninth: The adaptive security algorithm, included in
>PIX, will never allow an incoming traffic to go inside, except if there
>is a request for this traffic from inside, and it should match a random
>signature it has been given to the requested traffic, or if u make a
>policy on the outside interface to allow this traffic to come in, and is
>called ADAPTIVE , it means that it will strengthen it self upon the
>signature of the attack or the requested traffic and how it will be
>filtered to insure that this " man in the middle" will not gain access
>though the incoming traffic.
> >
> >Tenth: I was talking here about PIX 535 which support
>all clustering features, as well as redundancy, as the corresponding
>issue is between ISA and PIX, as a hardware and software firewall, but
>If we go to market, we will find Watch Guard, Cyber Guard, Alphafilter,
>CyberCom, D-Link,.....etc as well as we will see Symantec , Mcafee,
>....etc,,, and for linux there are a lot of firewall software like
>Netfilter
> >
> >Eleventh: you talked about ISA 2006, and you give me a
>document coming from Microsoft itself, so what will mama said about her
>child???????
> >
> >So if you want this, you can take a look of the
>following links ::
> >
> > PIX 535
> >
>
> >http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_data_she
>et09186a008007d05d.html
> >
>
> >http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_data_she
>et09186a00801daa53.html
> >
> >ASA 5500
> >
>
> >http://www.cisco.com/en/US/products/ps6120/products_data_sheet0900aecd8
>02930c5.html
> >
>
> >http://www.cisco.com/en/US/products/ps6120/products_data_sheet0900aecd8
>0404916.html
> >
> >Note that ASA 5500 has been developed in order to
>satisfy market need of application filtering and Active Directory
>Integrated..
> >
> >But if we go to neutralized sites, we will find that
>most of them are preferred PIX than ISA as a front door
> >
> >and I will not go far away,
> >
> >This link is in ISASERVER.org itself with your
>handwriting about ISA 2000, which shown some issue
> >
>
> >http://www.isaserver.org/articles/Microsoft_Confirms_DoS_Vulnerability_
>in_ISA_Server_2000.html
> >
> >right?
> >
> >And also :
> >
>
> >http://forums.isaserver.org/m_240057200/mpage_1/key_/tm.htm#240057210
> >
> >and please see this
> >
> >http://www.critical-error.com/Article724.phtml
> >
> >http://www.techspot.com/vb/archive/index/t-10247.html
> >
>
> >http://www.checkpoint.com/defense/advisories/public/2006/printer/cpai_p
>rint-03-Jun.html
> >
>
> >http://www.networksecurityarchive.org/html/NTBugtraq/2004-11/msg00009.h
>tml
> >
> >
> >
> > Which means that you should be standby for any
>articles and newsgroup to find out if there any discover Vulnerability,
>and not just using windows update"
> >
> >Twelfth: There is a fact that any GUI operating system
>should open ports to hardware to operate well, and this is refer to fact
>that the first 1024 ports in windows you can't change or reconfigure,
>and the other act that the most secure operating system till now is UNIX
>, as it is a command prompt operating system and have never been hacked
>except when it become LINUX, with a GUI.
> >
> >And even if it has been hacked, it records the least
>amount of hacking processes than windows ofcourse.
> >
> >Finally : No Doubt that Microsoft is the greatest
>marketing company in the world, as it depends on user need, and nothing
>is more important to user more than the fancy of GUI , Graphical User
>Interface,
> >
> >I think most of you agree with me that this concept ; I
>mean GUI, is the main reason for Bill Jates treasure which made up his
>riches, isn't it???
> >
> >Now, can you tell me
> >
> >- Why the great companies and the effective and
>sensitive corporations ( Like BMW, Aramco, Nokia ) prefer to put a
>hardware firewall instead of ISA server?? ( This is a fact, I see it
>myself )
> >
> >
> >
> >- Why most of multinational banks ( Like CIB, HSBC )
>put more than three cascading hardware firewalls as it's front door to
>internet??? ( This is a fact, I see it myself)
> >
> >
> >
> >- Why Microsoft itself didn't use any of it's products,
>in it's server farms, instead they using UNIX for mail server as an
>example??? ( you can check it your self by reading the arguments shown
>to you in the address bar of internet explorer when you open your
>hotmail inbox, and ask a good web programmer about it )
> >
> >
> >
> >- Why you don't recommend ISA server for DAN as the
>cheapest way for a firewall system, as he can install it on a high
>hardware qualified workstation, not should be a server, if you think
>that ISA server can manage?????
> >
> >
> >
> >
> > Best Regards
> > Mohamed Saleh
> >
> > Senior Network Administrator
> > College of Business Administration, CBA
> > Jeddah, Saudi Arabia
> > Tel: +966-02-6563199 ext 2521
> > Cell: - +966-50-2953591
> >
> >
> >!~` Yesterday is a History` ~!
> >!~` Tomorrow is a Mystery` ~!
> >!~` Today is a Gift` ~!
> >!~` So we call it ...............` ~!
> >!~` Present .......Simple` ~!
> >
> >
> >
> >
> >________________________________
> >
> > From: "D PIETRUSZKA USWRN INTERLINK INFRA"
><DPietruszka@xxxxxx>
> > Reply-To: isalist@xxxxxxxxxxxxx
> > To: <isalist@xxxxxxxxxxxxx>
> > Subject: [isalist] Re: Nothing is secure like PIX
> > Date: Thu, 22 Jun 2006 07:16:07 -0400
> > >http://www.ISAserver.org
> >
> >-------------------------------------------------------
> > >
> > >Probably you need to move your test to a more
>realistic and complex
> > >scenario.
> > >
> > >Regards
> > >Diego R. Pietruszka
> > >
> > >
> > >-----Original Message-----
> > >From: isalist-bounce@xxxxxxxxxxxxx
>[mailto:isalist-bounce@xxxxxxxxxxxxx]
> > >On Behalf Of Thomas W Shinder
> > >Sent: Wednesday, June 21, 2006 6:28 PM
> > >To: isalist@xxxxxxxxxxxxx
> > >Subject: [isalist] Re: Nothing is secure like PIX
> > >
> > >http://www.ISAserver.org
> >
> >-------------------------------------------------------
> > >
> > >In my tests, I found them to be the same.
> > >
> > >I have one box running ISA 2000 that hasn't been
>upgraded or service
> > >packed for over two years, and it's been running
>without stop for that
> > >period of time. This is on a white box install.
> > >
> > >There really isn't any difference in stability from
>my perspective. If
> > >you don't treat it like a workstation, don't install
>non-ISA firewall
> > >related services on it, it will run as long as any
>PIX. And the good
> > >thing is, it updates itself. Unlike the PIX, which
>does need to be
> > >updated like any other device, it doesn't do it
>itself and most
> > >"hardware" firewall admins just ignore it. Not very
>smart or secure, but
> > >I see that all the time in the field. After all, it's
>hardware, it must
> > >be secure [sic].
> > >
> > >NOT.
> > >
> > >Tom
> > >
> > >Thomas W Shinder, M.D.
> > >Site: www.isaserver.org
> > >Blog: http://blogs.isaserver.org/shinder/
> > >Book: http://tinyurl.com/3xqb7
> > >MVP -- ISA Firewalls
> > >
> > >
> > >
> > > > -----Original Message-----
> > > > From: isalist-bounce@xxxxxxxxxxxxx
> > > > [mailto:isalist-bounce@xxxxxxxxxxxxx] On Behalf Of
>D
> > > > PIETRUSZKA USWRN INTERLINK INFRA
> > > > Sent: Wednesday, June 21, 2006 2:02 PM
> > > > To: isalist@xxxxxxxxxxxxx
> > > > Subject: [isalist] Re: Nothing is secure like PIX
> > > >
> > > > http://www.ISAserver.org
> > > >
>-------------------------------------------------------
> > > >
> > > > Do you know the difference between stability (what
>I mentioned on my
> > > > email) and vulnerability?
> > > >
> > > > Regards
> > > > Diego R. Pietruszka
> > > >
> > > >
> > > > -----Original Message-----
> > > > From: isalist-bounce@xxxxxxxxxxxxx
> > > > [mailto:isalist-bounce@xxxxxxxxxxxxx]
> > > > On Behalf Of Jim Harrison
> > > > Sent: Wednesday, June 21, 2006 1:51 PM
> > > > To: isalist@xxxxxxxxxxxxx
> > > > Subject: [isalist] Re: Nothing is secure like PIX
> > > >
> > > > http://www.ISAserver.org
> > > >
>-------------------------------------------------------
> > > >
> > > > This is a completely specious argument, with
>absolutely no basis in
> > > > historical fact.
> > > > When you can demonstrate that a
>properly-configured ISA server has
> > > > *EVER* been compromised due to a Windows
>vulnerability, this
> > > > claim *may*
> > > > warrant consideration.
> > > >
> > > > Until then, it's nothing more or less than simple
>punditious
> > > > regurgitation.
> > > >
> > > >
>-------------------------------------------------------
> > > > Jim Harrison
> > > > MCP(NT4, W2K), A+, Network+, PCG
> > > > http://isaserver.org/Jim_Harrison/
> > > > http://isatools.org
> > > > Read the help / books / articles!
> > > >
>-------------------------------------------------------
> > > >
> > > >
> > > > -----Original Message-----
> > > > From: isalist-bounce@xxxxxxxxxxxxx
> > > > [mailto:isalist-bounce@xxxxxxxxxxxxx]
> > > > On Behalf Of D PIETRUSZKA USWRN INTERLINK INFRA
> > > > Sent: Wednesday, June 21, 2006 08:53
> > > > To: isalist@xxxxxxxxxxxxx
> > > > Subject: [isalist] Re: Nothing is secure like PIX
> > > >
> > > > I completely agree that ISA is far more secure
>than PIX, the
> > > > only part I
> > > > would concede to PIX (and that is why is still on
>the market) is the
> > > > stability and that is because don't run on windows
>as ISA do.
> > > >
> > > >
> > > >
> > > > Regards
> > > >
> > > > Diego R. Pietruszka
> > > >
> > > >
> > > >
> > > > ________________________________
> > > >
> > > > From: isalist-bounce@xxxxxxxxxxxxx
> > > > [mailto:isalist-bounce@xxxxxxxxxxxxx]
> > > > On Behalf Of Thomas W Shinder
> > > > Sent: Wednesday, June 21, 2006 11:05 AM
> > > > To: isalist@xxxxxxxxxxxxx
> > > > Cc: isapros-repost@xxxxxxxxxxxxx
> > > > Subject: [isalist] Re: Nothing is secure like PIX
> > > >
> > > >
> > > >
> > > > Hi EM,
> > > >
> > > >
> > > >
> > > > You are right. PIX is not very secure. It's a
>router with
> > > > some advanced
> > > > ACLs and does neat routing tricks. But when it
>comes to
> > > > security, you're
> > > > very very wrong that it's more secure. Hardware
>doesn't fall from
> > > > heaven, and all "hardware" is controlled by
>software, and
> > > > Syphco's core
> > > > compentancy is not application protection -- it's
>routing and
> > > > switching.
> > > >
> > > >
> > > >
> > > >
> > > > I agree that there is no comparison between PIX
>and ISA -- only a fool
> > > > would be convinced that they get any real security
>from a PIX, becuase
> > > > they never took the time to learn about network
>security and what the
> > > > end game was. Check Point? That's another story.
>Like the ISA
> > > > firewall,
> > > > Check Point is a so-called "software firewall"
>(something to pothead
> > > > "hardware" firewall guys often forget). Check
>Point is better than ISA
> > > > and you pay a LOT for that. However, a PIX is a
>joke and I think the
> > > > more thoughtful firewall admins out there realize
>they've
> > > > been hyMOtized
> > > > by the Syphco sales reps.
> > > >
> > > >
> > > >
> > > > PIX is a puppy dog, a little terrier, a laptop or
>a pretty little
> > > > Persian kitty cat -- the ISA firewall is the
>brobdingnagian that
> > > > provides your real security. The PIX is an
>emotional blanket,
> > > > a network
> > > > Prozac, an expensive and illusory work for
>security fiction.
> > > > The PIX is
> > > > the emperor with no clothes and is front of my
>hacked Web sites and
> > > > networks than any other firewall.
> > > >
> > > >
> > > >
> > > > You mention that the PIX software is "advanced" --
>I'll give you the
> > > > opposite perspective and proffer that it's a
>trisomy 13 baby
> > > > compared to
> > > > the robust and healthy child that is the ISA
>firewall. No one has ever
> > > > broken into an ISA firewall and I consider the ISA
>firewall
> > > > mandatory. A
> > > > PIX is nothing more than a historical
>superstition, a carry over from
> > > > the dawn days of the Internet. I never never never
>never never never
> > > > NEVER recommend putting a PIX in front or behind
>or anywhere near the
> > > > ISA firewall (a Check Point? Sometimes that's
>useful for defense in
> > > > depth -- Check Point, unlike PIX, is a real
>network security
> > > > solution).
> > > >
> > > >
> > > >
> > > > The PIX with worthless and weak. Who is it? What
>is it? What does it
> > > > plan to do with it's life? (name that tune!) On
>the other
> > > > hand, the ISA
> > > > firewall is built by people who understand
>software, understand
> > > > security, and is much more than a stupid router
>with a
> > > > "firewall" decal
> > > > slapped on its bezel.
> > > >
> > > >
> > > >
> > > > The ISA firewall's VPN server is MUCH MORE SECURE
>than the simple PIX
> > > > VPN. I've always wondered about the IQ of folks
>who have thought
> > > > otherwise. It's probably not an intelligence
>issue, but just an
> > > > ignorance issue, since they probably don't
>understand the
> > > > weaknesses of
> > > > the PIX VPN solution or the strengths of the ISA
>firewall's VPN
> > > > solutions -- but that's par for the course for
>folks who've been
> > > > hypmotized by the Syphco sales reps, and have had
>the implanted
> > > > suggestions reinforced by the ABMer idiot echo
>chamber.
> > > >
> > > >
> > > >
> > > > Faster is not more secure.
> > > >
> > > > Repeat
> > > >
> > > > Faster is NOT more secure
> > > >
> > > > Repeat
> > > >
> > > > Faster is NOT more secure
> > > >
> > > > Repeat
> > > >
> > > > Faster is NOT NOT NOT more secure
> > > >
> > > >
> > > >
> > > > Hardware is NOT more secure
> > > >
> > > > Repeat
> > > >
> > > > Hardware is NOT more secure
> > > >
> > > > Repeat
> > > >
> > > > Hardware is NOT more secure
> > > >
> > > > Repeat
> > > >
> > > > Hardware is NOT more secure
> > > >
> > > > Repeat
> > > >
> > > > Hardware is NOT more secure
> > > >
> > > > Repeat
> > > >
> > > > Hardware is NOT more secure
> > > >
> > > > Repeat
> > > >
> > > > Hardware is NOT more secure
> > > >
> > > > Repeat
> > > >
> > > >
> > > >
> > > > Remember, PIX has many security vulnerabilies that
>you can
> > > > check out at
> > > > Secunia. Strangely enough, the ISA firewall has
>NONE. And
> > > > don't feed me
> > > > that tired old drivel about "but it runs on
>Windows". If you
> > > > can show me
> > > > how this is an issue after reading this
> > > >
>http://www.microsoft.com/isaserver/2006/prodinfo/Firewall_Corewp.mspx
> > > > (which you won't do if you depend on your Syphco
>sales rep for tech
> > > > info).
> > > >
> > > >
> > > >
> > > > Finally, be careful about throwing Syphco PIX FUD
>around here. I've
> > > > worked with the worthless PIX for a long time and
>studied it
> > > > in depth. I
> > > > know it's cr*p on a cracker and it survives
>because it's been
> > > > grandfathered into the business. We're all now
>suffering badly because
> > > > the "network guys" who are clueless lusers when it
>comes to understand
> > > > application security, have hijacked network
>security and companies get
> > > > hacked far more often than they should because
>these dolts are "port
> > > > openers" and "port closers". The current situation
>has the clowns
> > > > running the circus.
> > > >
> > > >
> > > >
> > > > In conclusion, there are several neuroleptic
>medications I
> > > > can recommend
> > > > to anyone who seriously believes the worthless PIX
>is more secure than
> > > > an ISA firewall.
> > > >
> > > >
> > > >
> > > > IMNHO,
> > > >
> > > > Tom
> > > >
> > > >
> > > >
> > > > P.S. You're welcome to borrow any of the creative
>phases I've included
> > > > in this email. I only ask that you give the props
>:)
> > > >
> > > > Thomas W Shinder, M.D.
> > > > Site: www.isaserver.org
><http://www.isaserver.org/>
> > > > Blog: http://blogs.isaserver.org/shinder/
> > > > Book: http://tinyurl.com/3xqb7
> > > > MVP -- ISA Firewalls
> > > >
> > > >
> > > >
> > > >
> > > >
> > > >
> > > > ________________________________
> > > >
> > > >
> > > > From: isalist-bounce@xxxxxxxxxxxxx
> > > > [mailto:isalist-bounce@xxxxxxxxxxxxx] On Behalf Of
>Egyptian Mind
> > > > Sent: Wednesday, June 21, 2006 9:01 AM
> > > > To: isalist@xxxxxxxxxxxxx
> > > > Subject: [isalist] Nothing is secure like PIX
> > > >
> > > > http://www.ISAserver.org
> > > >
>-------------------------------------------------------
> > > >
> > > >
> > > >
> > > > Dears,
> > > >
> > > > No doubt that ISA 2000 or 2004 or even 2006, have
>increased the
> > > > possibility of controling user access,,, by
>allowing or denying the
> > > > browsing or a tiny issue like downloding gif and
>not
> > > > downloading jpg as
> > > > an example..
> > > >
> > > > This shows how much we can control user action,,,
> > > >
> > > > Moreover, features like firewall services,
>securing VPN
> > > > connection, Nating, Publishing web sites, etc....
>are very helpfull
> > > > features to make or Network Control is much
>easier...
> > > >
> > > > But Nothing is secure like PIX...
> > > >
> > > > I don't mean that PIX is more secure than ISA, or
>more capable
> > > > of handling requests... I'm talking about features
>and design and even
> > > > the hardware specification.... There is no
>comparison between ISA and
> > > > PIX
> > > >
> > > > I'm here, in my network ; using two failover PIX
>and two
> > > > clustering ISA servers as well.. every device has
>it's
> > > > responsiblities...
> > > >
> > > > ISA is responisble for handling he request from
>users and
> > > > filtering it depends on customized rules, and the
>great thing that ISA
> > > > server is a domain member, so I can customized the
>rules directly to
> > > > specific user ,,,
> > > >
> > > > PIX is my Huge Body Guard which stand infront of
>my Out Door, to
> > > > filter any request come in or out my door... YEs
>..( in or out ) not
> > > > just in .... and it is built on a very advanced
>built-in
> > > > program in the
> > > > hardware it self, it is the adaptive security
>algorithm,
> > > > which has alot
> > > > of tools to scan the coming packet,... like if we
>said , the
> > > > ultravoilet, infarraed, and eye scanner and
>everything...
> > > >
> > > > It's a very adaptive algorithm and it's very hard
>to
> > > > penetrate,,, note that this alogorithm is working
>on every packet goes
> > > > or come , also depend on your own cutomized rule
>you make on PIX,,,
> > > >
> > > > and instead that the windows how operates, the
>adaptive security
> > > > algorithm are running using the same processing
>speed of it's
> > > > processor,
> > > > as it is already loaded in the PIX processor and
>rams..
> > > >
> > > > How faster do you think it will be !!!!!!?????
> > > >
> > > > it also has a complete secure process for VPN
>connection and
> > > > PATING, NATING , ... etc
> > > >
> > > > But PIX is not function as layer 7 appliance, so
>we use ISA for
> > > > this purpose,,, to control the Application layer
>and presentation
> > > > layer... nothing more, nothing less,, and also
>because PIX is not
> > > > integrating with Active Directory..
> > > >
> > > > Finally, PIX is mandatory for security, and ISA is
>mandatory for
> > > > controling... but if we talked about the ability
>to be hacked
> > > > , I think
> > > > you will agree with me that hacking a program
>runing on
> > > > Windows platform
> > > > is much easier from penetrating program runing on
>security dedicated
> > > > appliance........ (( you can ask Bill Jates about
>it ))
> > > >
> > > >
> > > >
> > > >
> > > >
> > > > Best Regards
> > > >
> > > > Mohamed Saleh
> > > >
> > > >
> > > > Senior Network Administrator
> > > > College of Business Administration, CBA
> > > > Jeddah, Saudi Arabia
> > > > Tel: +966-02-6563199 ext 2521
> > > > Cell: - +966-50-2953591
> > > >
> > > >
> > > >
> > > >
> > > > !~` Yesterday is a History` ~!
> > > >
> > > > !~` Tomorrow is a Mystery` ~!
> > > >
> > > > !~` Today is a Gift` ~!
> > > >
> > > > !~` So we call it ...............` ~!
> > > >
> > > > !~` Present .......Simple` ~!
> > > >
> > > >
> > > >
> > > >
> > > >
> > > >
> > > > ________________________________
> > > >
> > > >
> > > > From: "Shane Mullins" <tsmullins@xxxxxxxxxxxxxx>
> > > > Reply-To: isalist@xxxxxxxxxxxxx
> > > > To: <isalist@xxxxxxxxxxxxx>
> > > > Subject: [isalist] Re: Hardware.... (cringe)
>...firewall
> > > > ?
> > > > Date: Tue, 20 Jun 2006 13:12:08 -0400
> > > > >http://www.ISAserver.org
> > > >
> >-------------------------------------------------------
> > > > > Good Deal,
> > > > >
> > > > > We have used ISA since Proxy 2.0. I really liked
>the
> > > > upgrade
> > > > >from 2.0 to ISA 2000. But, I really really like
>ISA
> > > > 2004. Some of
> > > > >the new features are great, esp in the VPN areas,
> > > > stateful packet
> > > > >inspection. Also, I like the way ISA integrates
>into
> > > > AD, this is
> > > > >huge if you are a Windows shop. Also, there are
>some
> > > > third party
> > > > >snap ins that are very helpful.
> > > > >
> > > > >Shane
> > > > >
> > > > >PS I also really enjoyed reading your ISA 2004
>book.
> > > > >
> > > > >
> > > > >
> > > > >----- Original Message ----- From: "Thomas W
>Shinder"
> > > > ><tshinder@xxxxxxxxxxx>
> > > > >To: <isalist@xxxxxxxxxxxxx>
> > > > >Sent: Tuesday, June 20, 2006 10:33 AM
> > > > >Subject: [isalist] Re: Hardware.... (cringe)
> > > > ...firewall ?
> > > > >
> > > > >
> > > > >http://www.ISAserver.org
> > > >
> >-------------------------------------------------------
> > > > >
> > > > >Hi Shane,
> > > > >
> > > > >No problems, that's how I took it! :)
> > > > >
> > > > >The PIX tax reminds of when in the middle ages
>you
> > > > could pay the
> > > > >church
> > > > >to absolve you of your sins. The situation here
>is that
> > > > they're
> > > > >paying
> > > > >Cisco for their sin of slothfullness. Slothful in
>that
> > > > they haven't
> > > > >spent the time and effort to understand real
>network
> > > > security and
> > > > >blindly pay a router and switch company big money
>to
> > > > protect
> > > > >comporate
> > > > >data (does anyone see the paradox in this?)
> > > > >
> > > > >Thanks!
> > > > >Tom
> > > > >
> > > > >Thomas W Shinder, M.D.
> > > > >Site: www.isaserver.org
> > > > >Blog: http://blogs.isaserver.org/shinder/
> > > > >Book: http://tinyurl.com/3xqb7
> > > > >MVP -- ISA Firewalls
> > > > >
> > > > >
> > > > >
> > > > >>-----Original Message-----
> > > > >>From: isalist-bounce@xxxxxxxxxxxxx
> > > > >>[mailto:isalist-bounce@xxxxxxxxxxxxx] On Behalf
>Of
> > > > Shane Mullins
> > > > >>Sent: Tuesday, June 20, 2006 7:56 AM
> > > > >>To: isalist@xxxxxxxxxxxxx
> > > > >>Subject: [isalist] Re: Hardware.... (cringe)
> > > > ...firewall ?
> > > > >>
> > > > >>http://www.ISAserver.org
> > > >
> > > >
> >>-------------------------------------------------------
> > > > >>
> > > > >>Hey Thomas,
> > > > >>
> > > > >> I meant that to be a plug for ISA 2004. I think
>ISA
> > > > 2004
> > > > >>is great. We
> > > > >>have two ISA 2004 boxes that firewall and
>provide
> > > > internet
> > > > >>access for 3,500
> > > > >>machines. ISA 2004 has been rock solid for us.
>ISA
> > > > 2004
> > > > >>provides advanced
> > > > >>logging and caching functions that a "hardware"
> > > > firewall
> > > > >>cannot provide. I
> > > > >>have nothing against unix, but ISA 2004 is
>great.
> > > > >> We could have paid 50k for a single pix to
>provide
> > > > >>firewall services.
> > > > >>Then signed up for a 5k a year maintenance
>agreement
> > > > (so we could
> > > > >>rcv
> > > > >>updates). And all machines need updates, even
> > > > "hardware"
> > > > >>firewalls have an
> > > > >>OS. And ISA still does so much more.
> > > > >>
> > > > >>Shane
> > > > >>
> > > > >>
> > > > >>
> > > > >>
> > > > >>
> > > > >> > On 6/19/06, Thomas W Shinder
><tshinder@xxxxxxxxxxx>
> > > > wrote:
> > > > >> >> http://www.ISAserver.org
> > > > >> >>
> > > >
>-------------------------------------------------------
> > > > >> >>
> > > > >> >> Yes, it's that good. Go Daddy and the ISP
>are
> > > > clueless.
> > > > >>Have you ever
> > > > >> >> talked to your ISP's "tech guys" who make
>these
> > > > >>recommendations? Let's
> > > > >> >> just say that the typical interaction leaves
>you
> > > > with the
> > > > >>feeling that
> > > > >> >> they're not on the top of the firewall and
> > > > networking food
> > > > >>chains :)
> > > > >> >>
> > > > >> >> Thomas W Shinder, M.D.
> > > > >> >> Site: www.isaserver.org
> > > > >> >> Blog: http://blogs.isaserver.org/shinder/
> > > > >> >> Book: http://tinyurl.com/3xqb7
> > > > >> >> MVP -- ISA Firewalls
> > > > >> >>
> > > > >> >>
> > > > >> >>
> > > > >> >> > -----Original Message-----
> > > > >> >> > From: isalist-bounce@xxxxxxxxxxxxx
> > > > >> >> > [mailto:isalist-bounce@xxxxxxxxxxxxx] On
>Behalf
> > > > Of Shane
> > > > >>Mullins
> > > > >> >> > Sent: Monday, June 19, 2006 1:10 PM
> > > > >> >> > To: isalist@xxxxxxxxxxxxx
> > > > >> >> > Subject: [isalist] Re: Hardware....
>(cringe)
> > > > ...firewall ?
> > > > >> >> >
> > > > >> >> > http://www.ISAserver.org
> > > > >> >> >
> > > >
>-------------------------------------------------------
> > > > >> >> >
> > > > >> >> > ISA 2K4 is really good? There is an eval
> > > > version. Maybe he
> > > > >> >> > would let you
> > > > >> >> > try that.
> > > > >> >> >
> > > > >> >> >
> > > > >> >> > Shane
> > > > >> >> >
> > > > >> >> > ----- Original Message -----
> > > > >> >> > From: "G.Waleed Kavalec"
><kavalec@xxxxxxxxx>
> > > > >> >> > To: <isalist@xxxxxxxxxxxxx>
> > > > >> >> > Sent: Monday, June 19, 2006 1:08 PM
> > > > >> >> > Subject: [isalist] Hardware.... (cringe)
> > > > ...firewall ?
> > > > >> >> >
> > > > >> >> >
> > > > >> >> > > http://www.ISAserver.org
> > > > >> >> > >
> > > >
>-------------------------------------------------------
> > > > >> >> > > My boss has been talking to our ISP and
>also
> > > > to some folks
> > > > >> >> > at GoDaddy.
> > > > >> >> > >
> > > > >> >> > > Both use - and recommend - hardware
>firewall
> > > > solutions.
> > > > >> >> > >
> > > > >> >> > > What do I tell him? He is poised to make
>one
> > > > of those
> > > > >>classic PHB
> > > > >> >> > > decisions.
> > > > >> >> > >
> > > > >> >> > > (currently on ISA 2K)
> > > > >> >> > >
> > > > >> >> > > --
> > > > >> >> > >
> > > > >> >> > > G. Waleed Kavalec
> > > > >> >> > > -------------------------
> > > > >> >> > > Why are we all in this handbasket
> > > > >> >> > > and where is it going so fast?
> > > > >> >> > >
> > > >
>------------------------------------------------------
> > > > >> >> > > List Archives:
> > > > //www.freelists.org/archives/isalist/
> > > > >> >> > ISA Server
> > > > >> >> > > Newsletter:
> > > > http://www.isaserver.org/pages/newsletter.asp
> > > > >> >> > ISA Server
> > > > >> >> > > Articles and Tutorials:
> > > > >> >> >
>http://www.isaserver.org/articles_tutorials/ ISA
> > > > >> >> > > Server Blogs:
> > > > >> >> > > http://blogs.isaserver.org/
> > > > >> >> >
> > > >
>------------------------------------------------------
> > > > >> >> > > Visit TechGenix.com for more information
>about
> > > > our other
> > > > >>sites:
> > > > >> >> > > http://www.techgenix.com
> > > > >> >> >
> > > >
>------------------------------------------------------
> > > > >> >> > > To unsubscribe visit
> > > > >> >> > http://www.isaserver.org/pages/isalist.asp
> > > > Report
> > > > >> >> > > abuse to listadmin@xxxxxxxxxxxxx
> > > > >> >> > >
> > > > >> >> >
> > > > >> >> >
> > > >
>------------------------------------------------------
> > > > >> >> > List Archives:
> > > > //www.freelists.org/archives/isalist/
> > > > >> >> > ISA Server Newsletter:
> > > > >>http://www.isaserver.org/pages/newsletter.asp
> > > > >> >> > ISA Server Articles and Tutorials:
> > > > >> >> >
>http://www.isaserver.org/articles_tutorials/
> > > > >> >> > ISA Server Blogs:
>http://blogs.isaserver.org/
> > > > >> >> >
> > > >
>------------------------------------------------------
> > > > >> >> > Visit TechGenix.com for more information
>about
> > > > our other
> > > > >>sites:
> > > > >> >> > http://www.techgenix.com
> > > > >> >> >
> > > >
>------------------------------------------------------
> > > > >> >> > To unsubscribe visit
> > > > >>http://www.isaserver.org/pages/isalist.asp
> > > > >> >> > Report abuse to listadmin@xxxxxxxxxxxxx
> > > > >> >> >
> > > > >> >> >
> > > > >> >> >
> > > > >> >>
> > > >
>------------------------------------------------------
> > > > >> >> List Archives:
> > > > //www.freelists.org/archives/isalist/
> > > > >> >> ISA Server Newsletter:
> > > > >>http://www.isaserver.org/pages/newsletter.asp
> > > > >> >> ISA Server Articles and Tutorials:
> > > > >> >> http://www.isaserver.org/articles_tutorials/
> > > > >> >> ISA Server Blogs:
>http://blogs.isaserver.org/
> > > > >> >>
> > > >
>------------------------------------------------------
> > > > >> >> Visit TechGenix.com for more information
>about our
> > > > other sites:
> > > > >> >> http://www.techgenix.com
> > > > >> >>
> > > >
>------------------------------------------------------
> > > > >> >> To unsubscribe visit
> > > > http://www.isaserver.org/pages/isalist.asp
> > > > >> >> Report abuse to listadmin@xxxxxxxxxxxxx
> > > > >> >>
> > > > >> >>
> > > > >> >
> > > > >> >
> > > > >> > -- >
> > > > >> > G. Waleed Kavalec
> > > > >> > -------------------------
> > > > >> > Why are we all in this handbasket
> > > > >> > and where is it going so fast?
> > > > >> >
> > > > >> > http://www.kavalec.com/thisisislam.swf
> > > > >> >
> > > >
>------------------------------------------------------
> > > > >> > List Archives:
> > > > //www.freelists.org/archives/isalist/
> > > > >>ISA Server
> > > > >> > Newsletter:
> > > > http://www.isaserver.org/pages/newsletter.asp
> > > > >>ISA Server
> > > > >> > Articles and Tutorials:
> > > > >>http://www.isaserver.org/articles_tutorials/ ISA
> > > > >> > Server Blogs:
> > > > >> > http://blogs.isaserver.org/
> > > >
> >>------------------------------------------------------
> > > > >> > Visit TechGenix.com for more information
>about our
> > > > other sites:
> > > > >> > http://www.techgenix.com
> > > >
> >>------------------------------------------------------
> > > > >> > To unsubscribe visit
> > > > >>http://www.isaserver.org/pages/isalist.asp
>Report
> > > > >> > abuse to listadmin@xxxxxxxxxxxxx
> > > > >>
> > > >
> >>------------------------------------------------------
> > > > >>List Archives:
> > > > //www.freelists.org/archives/isalist/
> > > > >>ISA Server Newsletter:
> > > > >>http://www.isaserver.org/pages/newsletter.asp
> > > > >>ISA Server Articles and Tutorials:
> > > > >>http://www.isaserver.org/articles_tutorials/
> > > > >>ISA Server Blogs: http://blogs.isaserver.org/
> > > >
> >>------------------------------------------------------
> > > > >>Visit TechGenix.com for more information about
>our
> > > > other sites:
> > > > >>http://www.techgenix.com
> > > >
> >>------------------------------------------------------
> > > > >>To unsubscribe visit
> > > > http://www.isaserver.org/pages/isalist.asp
> > > > >>Report abuse to listadmin@xxxxxxxxxxxxx
> > > > >>
> > > > >>
> > > > >>
> > > >
> >------------------------------------------------------
> > > > >List Archives:
> > > > //www.freelists.org/archives/isalist/
> > > > >ISA Server Newsletter:
> > > > http://www.isaserver.org/pages/newsletter.asp
> > > > >ISA Server Articles and Tutorials:
> > > > >http://www.isaserver.org/articles_tutorials/
> > > > >ISA Server Blogs: http://blogs.isaserver.org/
> > > >
> >------------------------------------------------------
> > > > >Visit TechGenix.com for more information about
>our
> > > > other sites:
> > > > >http://www.techgenix.com
> > > >
> >------------------------------------------------------
> > > > >To unsubscribe visit
> > > > http://www.isaserver.org/pages/isalist.asp
> > > > >Report abuse to listadmin@xxxxxxxxxxxxx
> > > > >
> > > >
> >------------------------------------------------------
> > > > >List Archives:
> > > > //www.freelists.org/archives/isalist/ ISA
> > > > >Server Newsletter:
> > > > http://www.isaserver.org/pages/newsletter.asp ISA
> > > > >Server Articles and Tutorials:
> > > > >http://www.isaserver.org/articles_tutorials/ ISA
>Server
> > > > Blogs:
> > > > >http://blogs.isaserver.org/
> > > >
> >------------------------------------------------------
> > > > >Visit TechGenix.com for more information about
>our
> > > > other sites:
> > > > >http://www.techgenix.com
> > > >
> >------------------------------------------------------
> > > > >To unsubscribe visit
> > > > http://www.isaserver.org/pages/isalist.asp
> > > > >Report abuse to listadmin@xxxxxxxxxxxxx
> > > > >
> > > >
> > > >
>------------------------------------------------------ List
> > > > Archives:
>//www.freelists.org/archives/isalist/ ISA Server
> > > > Newsletter:
>http://www.isaserver.org/pages/newsletter.asp ISA Server
> > > > Articles and Tutorials:
> > > > http://www.isaserver.org/articles_tutorials/ ISA
> > > > Server Blogs: http://blogs.isaserver.org/
> > > >
>------------------------------------------------------ Visit
> > > > TechGenix.com for more information about our other
>sites:
> > > > http://www.techgenix.com
> > > >
>------------------------------------------------------ To unsubscribe
> > > > visit http://www.isaserver.org/pages/isalist.asp
>Report abuse to
> > > > listadmin@xxxxxxxxxxxxx
> > > >
> > > >
> > > > All mail to and from this domain is GFI-scanned.
> > > >
> > > >
>------------------------------------------------------
> > > > List Archives:
>//www.freelists.org/archives/isalist/
> > > > ISA Server Newsletter:
>http://www.isaserver.org/pages/newsletter.asp
> > > > ISA Server Articles and Tutorials:
> > > > http://www.isaserver.org/articles_tutorials/
> > > > ISA Server Blogs: http://blogs.isaserver.org/
> > > >
>------------------------------------------------------
> > > > Visit TechGenix.com for more information about our
>other sites:
> > > > http://www.techgenix.com
> > > >
>------------------------------------------------------
> > > > To unsubscribe visit
>http://www.isaserver.org/pages/isalist.asp
> > > > Report abuse to listadmin@xxxxxxxxxxxxx
> > > >
> > > >
>------------------------------------------------------
> > > > List Archives:
>//www.freelists.org/archives/isalist/
> > > > ISA Server Newsletter:
>http://www.isaserver.org/pages/newsletter.asp
> > > > ISA Server Articles and Tutorials:
> > > > http://www.isaserver.org/articles_tutorials/
> > > > ISA Server Blogs: http://blogs.isaserver.org/
> > > >
>------------------------------------------------------
> > > > Visit TechGenix.com for more information about our
>other sites:
> > > > http://www.techgenix.com
> > > >
>------------------------------------------------------
> > > > To unsubscribe visit
>http://www.isaserver.org/pages/isalist.asp
> > > > Report abuse to listadmin@xxxxxxxxxxxxx
> > > >
> > > >
> > > >
> >
> >------------------------------------------------------
> > >List Archives:
>//www.freelists.org/archives/isalist/
> > >ISA Server Newsletter:
>http://www.isaserver.org/pages/newsletter.asp
> > >ISA Server Articles and Tutorials:
> > >http://www.isaserver.org/articles_tutorials/
> > >ISA Server Blogs: http://blogs.isaserver.org/
> >
> >------------------------------------------------------
> > >Visit TechGenix.com for more information about our
>other sites:
> > >http://www.techgenix.com
> >
> >------------------------------------------------------
> > >To unsubscribe visit
>http://www.isaserver.org/pages/isalist.asp
> > >Report abuse to listadmin@xxxxxxxxxxxxx
> > >
> >
> >------------------------------------------------------
> > >List Archives:
>//www.freelists.org/archives/isalist/
> > >ISA Server Newsletter:
>http://www.isaserver.org/pages/newsletter.asp
> > >ISA Server Articles and Tutorials:
>http://www.isaserver.org/articles_tutorials/
> > >ISA Server Blogs: http://blogs.isaserver.org/
> >
> >------------------------------------------------------
> > >Visit TechGenix.com for more information about our
>other sites:
> > >http://www.techgenix.com
> >
> >------------------------------------------------------
> > >To unsubscribe visit
>http://www.isaserver.org/pages/isalist.asp
> > >Report abuse to listadmin@xxxxxxxxxxxxx
> > >
> >
> >
> >------------------------------------------------------
>List Archives: //www.freelists.org/archives/isalist/ ISA Server
>Newsletter: http://www.isaserver.org/pages/newsletter.asp ISA Server
>Articles and Tutorials: http://www.isaserver.org/articles_tutorials/ ISA
>Server Blogs: http://blogs.isaserver.org/
>------------------------------------------------------ Visit
>TechGenix.com for more information about our other sites:
>http://www.techgenix.com
>------------------------------------------------------ To unsubscribe
>visit http://www.isaserver.org/pages/isalist.asp Report abuse to
>listadmin@xxxxxxxxxxxxx
> >
> >All mail to and from this domain is GFI-scanned.
> >
>
> ><< winmail.dat >>
>
> engage Mutual Assurance is a trading name of Homeowners Friendly
>Society Limited (HFSL), Registered and Incorporated under the Friendly
>Societies Act 1992, Reg. No. 964F, and its wholly owned subsidiary
>engage Mutual Funds Limited (eMFL), Reg. No. 3224780, HFSL and eMFL are
>both authorised and regulated by the Financial Services Authority (FSA).
>HFSL's FSA Register no. is 110072, eMFL's FSA Register no. is 181487.
>You can check this on the FSA's Register by visiting the FSA's website
>http://www.fsa.gov.uk/register or by contacting the FSA on 0845 606 1234
>
> engage Mutual Investment Funds ICVC is an investment company
>with variable capital. Registered in England No. IC00044.
>
> engage Mutual Administration Limited Reg. No. 4301736, engage
>Mutual Services Limited Reg. No. 3088162 and Homeowners Membership
>Services Limited Reg. No. 3091667 are non-regulated limited companies.
>
> United Kingdom Civil Service Benefit Society (UKCSBS) and United
>Kingdom Armed Forces Benefit Society (UKAFBS) are trading styles of
>Homeowners Friendly Society Limited
>
> All registered at Hornbeam Park Avenue, Harrogate. HG2 8XE. Tel:
>01423 855000 Web: http://www.engagemutual.com
><http://www.engagemutual.com/> This e-mail is intended only for the
>person named as recipient. The contents are confidential. If you are not
>the intended recipient of this e-mail, please notify us as soon as
>possible and delete it. If you are not the intended recipient of the
>e-mail, any use by you is prohibited.
>------------------------------------------------------ List Archives:
>//www.freelists.org/archives/isalist/ ISA Server Newsletter:
>http://www.isaserver.org/pages/newsletter.asp ISA Server Articles and
>Tutorials: http://www.isaserver.org/articles_tutorials/ ISA Server
>Blogs: http://blogs.isaserver.org/
>------------------------------------------------------ Visit
>TechGenix.com for more information about our other sites:
>http://www.techgenix.com
>------------------------------------------------------ To unsubscribe
>visit http://www.isaserver.org/pages/isalist.asp Report abuse to
>listadmin@xxxxxxxxxxxxx
>
>
>------------------------------------------------------ List Archives:
>//www.freelists.org/archives/isalist/ ISA Server Newsletter:
>http://www.isaserver.org/pages/newsletter.asp ISA Server Articles and
>Tutorials: http://www.isaserver.org/articles_tutorials/ ISA Server
>Blogs: http://blogs.isaserver.org/
>------------------------------------------------------ Visit
>TechGenix.com for more information about our other sites:
>http://www.techgenix.com
>------------------------------------------------------ To unsubscribe
>visit http://www.isaserver.org/pages/isalist.asp Report abuse to
>listadmin@xxxxxxxxxxxxx
>------------------------------------------------------
>List Archives: //www.freelists.org/archives/isalist/
>ISA Server Newsletter: http://www.isaserver.org/pages/newsletter.asp
>ISA Server Articles and Tutorials: http://www.isaserver.org/articles_tutorials/
>ISA Server Blogs: http://blogs.isaserver.org/
>------------------------------------------------------
>Visit TechGenix.com for more information about our other sites:
>http://www.techgenix.com
>------------------------------------------------------
>To unsubscribe visit http://www.isaserver.org/pages/isalist.asp
>Report abuse to listadmin@xxxxxxxxxxxxx
>
------------------------------------------------------ List Archives: //www.freelists.org/archives/isalist/ ISA Server Newsletter: http://www.isaserver.org/pages/newsletter.asp ISA Server Articles and Tutorials: http://www.isaserver.org/articles_tutorials/ ISA Server Blogs: http://blogs.isaserver.org/ ------------------------------------------------------ Visit TechGenix.com for more information about our other sites: http://www.techgenix.com ------------------------------------------------------ To unsubscribe visit http://www.isaserver.org/pages/isalist.asp Report abuse to listadmin@xxxxxxxxxxxxx

Other related posts: