Since you are asking these type of questions, then I am assuming that a 
security escalation matrix and troubleshooting procedures have not been 
written at your organization.

The simplest way is to assemble a basic packet filter on your external 
router if maintained by your organization, dropping those packets.  If you 
do not maintain your internet router, than contact your ISP to institute a 
packet filter dropping the listed address as in not just the specific ip 
address listed in your log file, but the whole address range.  In the 
meantime, this buys you some time to devise or re-architect your packet 
filtering rules, compose a RFP or RFQ to send out to the various security 
consultants that have real experience in constructing viable and scaleable 
organizational networks with active/reactive security features.

Your revised architecture should incorporate some of the following:

Approval from upper management  to spend lots of money on building the 
internal and DMZ network correctly.(usually this take a long time, once 
this happens, asking them for money for hardware gets easier.  )

If you do not get approval to spend lots of money seek out URL's like the 
following:http://www.clark.net/pub/mjr/pubs/pdf/VPN-homebrew.pdf. to get 
your through, remember if you do use ideas in the URL, please remember to 
send a considerable contribution to the author.

Security Policy and Procedures that are customized to your work culture 
and environment.
Buy-in from the end users.
A well developed and though out network architecture that can scale and 
can last at least 24 - 36 months.  Refer to Building Internet Firewalls 
for avg number of when to rebuild your security architecture.

A well developed Intrusion Detection System with a proper constructed 
policy that identified anomalous traffic and not every day crud ( again, 
refer to Network Flight Recorder for some hints on what an real IDS system 
is: www.nfr.net)

An A-OK Firewall certificate from Marcus Ranum.  If you decide to go for 
an A-OK firewall certificate, it will cost you but definitely much cheaper 
than an ICSA certification.. :)

If those on the list do not know what the A-OK firewall certificate is, 
drop Marcus Ranum an email say you want your firewall to be A-OK 
certified.. Be prepared to have your checkbook ready.. :)

/m





Dave Harris <[EMAIL PROTECTED]>
Sent by: [EMAIL PROTECTED]
02/20/00 02:23 PM

 
        To:     "[EMAIL PROTECTED]" <[EMAIL PROTECTED]>
        cc: 
        Subject:        Packets not destined for my network


Hi all

Some interesting discussion going on here re: 'Someone is scanning me'

Do you guys actually get time to do any work? (kidding)

I get scans all the time but lately these alerts have been showing in my
FW log
with a destination of who knows?

Feb 19 08:06:45 gw kernel: securityalert: tcp if=ppp0 from
24.27.38.162:3721 to 210.9.41.5 on unserved port 8080
Feb 19 08:06:45 gw kernel: securityalert: tcp if=ppp0 from
24.27.38.162:3719 to 210.9.41.4 on unserved port 8080
Feb 19 08:06:45 gw kernel: securityalert: tcp if=ppp0 from
24.27.38.162:3723 to 210.9.41.6 on unserved port 8080
Feb 19 08:06:45 gw kernel: securityalert: tcp if=ppp0 from
24.27.38.162:3725 to 210.9.41.7 on unserved port 8080
Feb 19 08:42:19 gw kernel: securityalert: udp if=ppp0 from
199.4.142.161:137 to 210.9.41.5 on unserved port 137
Feb 19 08:42:27 gw kernel: securityalert: udp if=ppp0 from
199.4.142.161:137 to 210.9.41.6 on unserved port 137
Feb 19 08:42:34 gw kernel: securityalert: udp if=ppp0 from
199.4.142.161:137 to 210.9.41.7 on unserved port 137
Feb 19 17:02:07 gw kernel: securityalert: tcp if=ppp0 from
200.16.84.11:25685 to 210.9.41.5 on unserved port 143

My traceroute to 24.27.38.162 got cs2738-162.austin.rr.com

My traceroute to 210.9.41.5 got as far as FFAVA-RECYT4-128.secyt.gov.ar
(200.9.245.18)  1029.140 ms  1021.824 ms

Looks like Austin, Texas going to somewhere in Argentina?

The question is how did these packets end up at my firewall? Is it
routing? DNS?

We do not support or advertise a webserver in our domain.

Who can I talk to about this? My ISP? Their ISP?

Cheers

TIA






-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to