This is not a real option. The point is to block it at the firewall. In a
company with a lot of users, its difficult to tell everyone to do this. The
whole point is to take away the control of the users.


""White, Shanice""  wrote in message
news:[EMAIL PROTECTED]...
> in morpheus, if you go to tools, options and traffic, you can turn off
your
> file sharing.
>
> -----Original Message-----
> From: Carroll Kong [mailto:[EMAIL PROTECTED]]
> Sent: Thursday, September 27, 2001 2:34 PM
> To: [EMAIL PROTECTED]
> Subject: Re: Blocking Morpheus [7:21302]
>
>
> At 11:48 AM 9/27/01 -0400, sam sneed wrote:
> >Hello,
> >   I wanted to know if anyone knew how to block the Morpheus music
sharing
> >program at the firewall. I have a checkpoint firewall which has the
> >following rules
> >Internal  net ---> Any   allow all
> >Any ---> Internet   drop all
> >I installed and ran Morpheus (a new kind of Napster from
> >http://www.musiccity.com/ ) > Within an hour other users were downloading
> >MP3's off my workstaion which should have been firewalled.
> >I know that the program starts a TCP server on port 1214. This should be
> >blocked by the firewall. Anyone know how this works and how it could be
> >blocked, monitored, or controlled?
> >
> >sam sneed
> A few possibilities.  I never used Morpheus, but I can only guess at what
> the software did.
>
> You initiated an open connection to Mr. Morpheus.  The firewall opens up
> the connection for you to go out, and has a state table to make sure your
> ACK packets can now come back in.  Mr. Morpheus has a full TCP connection
> and can send whatever information it likes.  Since you do not have the
> source code for the client, you do not know what the client is doing.  So
> let us assume the worst.  As long as Mr. Morpheus can tell your server, in
> band through the TCP connection channel wise, to open another outgoing,
and
> startup the service, it is going to fool your firewall.  If your
> client/host machine srcs from 1214 and goes to morpheus again, the
firewall
> will open the connection, and dynamically create a rule for return packets
> to 1214.  That is my best guess short of misconfiguration on your part.
>
> A variant of this is proxy features in a firewall where they dynamically
> open up after seeing some data in the input stream.  So, say you get some
> HTML code with some nasty Irc DCC request that opens below 1024 or some
> other higher port (some things run on higher ports and are still fairly
> useful) and your firewall has an irc proxy, it will open up a port through
> your firewall and voila.  You now have a direct line to the outside.  Of
> course, any proxy method with some kind of embedding can do this.  Scary,
> eh?  The silent trojan thanks to HTML based email software and random bad
> web sites.  Solution would be to use a web proxy that disables ridiculous
> attempts in the HTML code stream.
>
> As to how to solve this?  Do not use morpheus.  Or, make a restrictive
> outgoing policy.  Internal net->Any allow all although is easy to write,
> means if someone can trick your internal net, ala trojans, or weirdo
> clients to open a port out.  If it is cleverly written, they can subvert
> your firewall since it has no idea he is being fooled when he sets up the
> dynamic rules ala state tables.
>
>
>
> -Carroll Kong




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=21570&t=21302
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to