Since you are asking these type of questions, then I am assuming that a
security escalation matrix and troubleshooting procedures have not been
written at your organization.
The simplest way is to assemble a basic packet filter on your external
router if maintained by your organization, dropping those packets. If you
do not maintain your internet router, than contact your ISP to institute a
packet filter dropping the listed address as in not just the specific ip
address listed in your log file, but the whole address range. In the
meantime, this buys you some time to devise or re-architect your packet
filtering rules, compose a RFP or RFQ to send out to the various security
consultants that have real experience in constructing viable and scaleable
organizational networks with active/reactive security features.
Your revised architecture should incorporate some of the following:
Approval from upper management to spend lots of money on building the
internal and DMZ network correctly.(usually this take a long time, once
this happens, asking them for money for hardware gets easier. )
If you do not get approval to spend lots of money seek out URL's like the
following:http://www.clark.net/pub/mjr/pubs/pdf/VPN-homebrew.pdf. to get
your through, remember if you do use ideas in the URL, please remember to
send a considerable contribution to the author.
Security Policy and Procedures that are customized to your work culture
and environment.
Buy-in from the end users.
A well developed and though out network architecture that can scale and
can last at least 24 - 36 months. Refer to Building Internet Firewalls
for avg number of when to rebuild your security architecture.
A well developed Intrusion Detection System with a proper constructed
policy that identified anomalous traffic and not every day crud ( again,
refer to Network Flight Recorder for some hints on what an real IDS system
is: www.nfr.net)
An A-OK Firewall certificate from Marcus Ranum. If you decide to go for
an A-OK firewall certificate, it will cost you but definitely much cheaper
than an ICSA certification.. :)
If those on the list do not know what the A-OK firewall certificate is,
drop Marcus Ranum an email say you want your firewall to be A-OK
certified.. Be prepared to have your checkbook ready.. :)
/m
Dave Harris <[EMAIL PROTECTED]>
Sent by: [EMAIL PROTECTED]
02/20/00 02:23 PM
To: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]>
cc:
Subject: Packets not destined for my network
Hi all
Some interesting discussion going on here re: 'Someone is scanning me'
Do you guys actually get time to do any work? (kidding)
I get scans all the time but lately these alerts have been showing in my
FW log
with a destination of who knows?
Feb 19 08:06:45 gw kernel: securityalert: tcp if=ppp0 from
24.27.38.162:3721 to 210.9.41.5 on unserved port 8080
Feb 19 08:06:45 gw kernel: securityalert: tcp if=ppp0 from
24.27.38.162:3719 to 210.9.41.4 on unserved port 8080
Feb 19 08:06:45 gw kernel: securityalert: tcp if=ppp0 from
24.27.38.162:3723 to 210.9.41.6 on unserved port 8080
Feb 19 08:06:45 gw kernel: securityalert: tcp if=ppp0 from
24.27.38.162:3725 to 210.9.41.7 on unserved port 8080
Feb 19 08:42:19 gw kernel: securityalert: udp if=ppp0 from
199.4.142.161:137 to 210.9.41.5 on unserved port 137
Feb 19 08:42:27 gw kernel: securityalert: udp if=ppp0 from
199.4.142.161:137 to 210.9.41.6 on unserved port 137
Feb 19 08:42:34 gw kernel: securityalert: udp if=ppp0 from
199.4.142.161:137 to 210.9.41.7 on unserved port 137
Feb 19 17:02:07 gw kernel: securityalert: tcp if=ppp0 from
200.16.84.11:25685 to 210.9.41.5 on unserved port 143
My traceroute to 24.27.38.162 got cs2738-162.austin.rr.com
My traceroute to 210.9.41.5 got as far as FFAVA-RECYT4-128.secyt.gov.ar
(200.9.245.18) 1029.140 ms 1021.824 ms
Looks like Austin, Texas going to somewhere in Argentina?
The question is how did these packets end up at my firewall? Is it
routing? DNS?
We do not support or advertise a webserver in our domain.
Who can I talk to about this? My ISP? Their ISP?
Cheers
TIA
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]