Many thanks to all who replied. I've got some good verbage now. In particular the multi-layer defense.
> -----Original Message----- > From: Evans, TJ (BearingPoint) [mailto:[EMAIL PROTECTED] > Sent: Thursday, April 03, 2003 12:36 PM > To: [EMAIL PROTECTED] > Subject: RE: hacking challenge [7:66720] > > > So ... doesn't that give them enough supporting evidence all > by itself? > If not, maybe it is a lost cause? > > As an aside - a pix, if it was permitting the offending port > through as > well, may not have stopped the worm either. Think "Defense > in Depth". A > firewall, while a necessity for -everyone- (IMHO) is not a > cure-all; it is a > piece of a very large, very complex puzzle (even for a small > network!). > > .. > Have someone in a Decision-making position there read > "Hacking __(pick an os > - Windows2k, Linux, etc.)____", or attend a SANS course (or > just visit their > reading room - TONS of articles). Read Eric Cole's or Ed > Skoudis's books. > .. or, teach him/her to use google ... > > > Thanks! > TJ > -----Original Message----- > From: Wilmes, Rusty [mailto:[EMAIL PROTECTED] > Sent: Thursday, April 03, 2003 2:05 PM > To: [EMAIL PROTECTED] > Subject: RE: hacking challenge [7:66720] > > there's an access list on the ethernet interface thats > directly connected to > a dsl modem. > > they're allowing telnet and smpt to basically, any any plus > various other > protocols from/to specific addresses. There're only two > outside addresses > that are natted but its really hideous and the access list is > the only thing > resembling a layer of security between the internet and their > server farm. > > I was just hoping to hear some really good verbage about how > vulnerable they > are. I've told them for 3 months to get a pix but it just > aint sinking in. > Now they've got a worm loose on their mail server thats > bringing down their > main host system and their internet line (but thats another story). > > > > > -----Original Message----- > > From: Priscilla Oppenheimer [mailto:[EMAIL PROTECTED] > > Sent: Thursday, April 03, 2003 8:46 AM > > To: [EMAIL PROTECTED] > > Subject: RE: hacking challenge [7:66720] > > > > > > Wilmes, Rusty wrote: > > > > > > this is a general question for the security specialists. > > > > > > Im trying to convince a client that they need a firewall.... > > > > > > so hypothetically, > > > > > > if you had telnet via the internet open to a router (with an > > > access list > > > that allowed smtp and telnet) (assuming you didn't know the > > > telnet password > > > or the enable password)that had a bunch of nt servers on > > > another interface, > > > > Do you actually mean that you are allowing Telnet and SMTP to > > go through the > > router? You said "to" above which is confusing. Allowing > Telnet to the > > router unrestricted would be a horrible security hole, even > > for people who > > don't know the password because passwords are often guessable. > > > > But I don't think that's what you meant... > > > > Allowing Telnet and SMTP through the router is more common, > > especially SMTP. > > You have to allow SMTP if you have an e-mail server that gets > > mail from the > > outside world. Avoid Telnet, though, if you can. It sends all > > text as clear > > text, including passwords. > > > > The question is really how vulnerable is the operating system > > that the SMTP > > server is running on? It's probably horribly vulnerable if > your client > > hasn't kept up with the latest patches, and it sounds like > > your client is > > the type that hasn't? In fact, the server is probably busy > > attacking the > > rest of us right now! ;-0 > > > > So, as far as convicing your customer.... > > > > The best way may be to put a free firewall, like Zone Alarm, > > on the decision > > maker's computer and show her/him all the attacks happening > > all the time. Or > > if she already has a firewall, walk her through the log. > > > > Good luck. I have a good book to recommend on this topic: > > > > Greenberg, Eric. "Mission-Critical Security Planner." New > > York, New York, > > Wiley Publishing, Inc., 2003. > > > > Here's an Amazon link: > > > > http://www.amazon.com/exec/obidos/ASIN/0471211656/opendoornetw > > inc/104-9901005-4572707 > > > > Priscilla > > > > > how long would it take a determined hacker a) cause some kind > > > of network > > > downtime and b) to map a network drive to a share on a file > > > server over the > > > internet. > > > > > > Thanks, > > > Rusty > > > > > > > -----Original Message----- > > > > From: Larry Letterman [mailto:[EMAIL PROTECTED] > > > > Sent: Wednesday, April 02, 2003 1:44 PM > > > > To: [EMAIL PROTECTED] > > > > Subject: RE: VLAN loop problem [7:66656] > > > > > > > > > > > > Yes, > > > > it prevents loops in spanning tree on layer 2 switches from > > > > causing a loop > > > > by disabling the port on a cisco switch... > > > > > > > > > > > > Larry Letterman > > > > Network Engineer > > > > Cisco Systems > > > > > > > > > > > > > > > > > > > > > > > > > -----Original Message----- > > > > > From: [EMAIL PROTECTED] > > > > [mailto:[EMAIL PROTECTED] Behalf Of > > > > > Thomas N. > > > > > Sent: Wednesday, April 02, 2003 12:18 PM > > > > > To: [EMAIL PROTECTED] > > > > > Subject: Re: VLAN loop problem [7:66656] > > > > > > > > > > > > > > > What does "portfast bpdu-guard" do? Does it prevent > > > interfaces with > > > > > portfast enabled from causing the loop in my scenario? > > > > > > > > > > > > > > > ""Larry Letterman"" wrote in message > > > > > news:[EMAIL PROTECTED] > > > > > > > > > > > port mac address security might work, altho its a lot of > > > admin > > > > > > overhead..are you running portfast bpdu-guard on the > > > access ports? > > > > > > > > > > > > > > > > > > Larry Letterman > > > > > > Network Engineer > > > > > > Cisco Systems > > > > > > > > > > > > > > > > > > ----- Original Message ----- > > > > > > From: Thomas N. > > > > > > To: [EMAIL PROTECTED] > > > > > > Sent: Tuesday, April 01, 2003 8:14 PM > > > > > > Subject: VLAN loop problem [7:66656] > > > > > > > > > > > > > > > > > > Hi All, > > > > > > > > > > > > I got a problem in the production campus LAN here > > > between > > > > > VLANs. Please > > > > > > help me out! Below is the scenario: > > > > > > > > > > > > We have VLAN 10 (10.10.x.x) and VLAN 20 (10.20.x.x) > > > subnets. > > > > > Routing is > > > > > > enable/allowed between the two subnets using MSFC of > > > > the 6500. Each > > > > > subnet > > > > > > has a DHCP server to assign IP address to devices on > > > its subnet. > > > > > > Spanning-tree is enable; however, portfast is turned on > > > on all > > > > > > non-trunking/uplink ports. Recently, devices on VLAN > > > 10 got > > > > > assigned an > > > > > IP > > > > > > address of 10.20.x.x , which is from the DHCP on the > > > > other scope and > > > > > also > > > > > > from 10.10.x.x scope, and vice versa. It seems that we > > > a > > > > > loop somewhere > > > > > > between the 2 subnets but we don't know where. I > > > > noticed lots of end > > > > > users > > > > > > have a little unmanged hub/switch hang off the network > > > > jacks in their > > > > > > cubicals and potentially cause loop. > > > > > > > > > > > > Is there any way that we can block the loop on the > > > > Cisco switches > > > > > without > > > > > > visiting cubicals taking those little umanaged > > > > hubs/switches? Thanks! > > > > > > > > > > > > Thomas > ************************************************************** > **************** > The information in this email is confidential and may be legally > privileged. Access to this email by anyone other than the > intended addressee is unauthorized. If you are not the intended > recipient of this message, any review, disclosure, copying, > distribution, retention, or any action taken or omitted to be taken > in reliance on it is prohibited and may be unlawful. If you are not > the intended recipient, please reply to or forward a copy of this > message to the sender and delete the message, any attachments, > and any copies thereof from your system. > ************************************************************** > **************** Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=66853&t=66720 -------------------------------------------------- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]