-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm not going to start quoting everything you said.  To sum everything
up, I agree with everything up until this point (below).

> Whoah! there cowboy! If you are able to distinguish between probe syn
> packets and packets that are part of a connection originating 
> inside the
> network then you can do the same thing with those. 
> 
> If you have services running which are accessible from the 
> outside world
> like SMTP or a WWW Server for example then you have to allow TCP
> connects. This is why many of the tools script kiddies will 
> use just do
> port scan of known services, sometimes only one or two like 
> SMTP and WWW
> .. probably depending on the last .pl they have just picked up on the
> net... 

Sorry.  I wasn't thinking straight when I said that - if you allow SYN
connects on a port, then TCP connects have to be allowed as well (same
with FIN).  So, unless I'm grossly misunderstanding a concept of TCP, a
TCP scan will report the same as a SYN scan.  Am I correct?  The
firewall rules I laid out only report back hundreds, if not thousands,
open/closed ports.  Whether it be TCP or SYN.

I should also point out that it is much easier to detect a TCP scan.
Why else would a SYN scan be called "stealth"?

> For this type of probe or attack you need to see tcp signatures or at
> least  monitor requests to these services.  If you are 
> logging this sort
> of thing then the logs are going to be pretty big... and you 
> need to be
> logging not just what type of packet from  here to there, but 
> also what
> is in the packet. Thus you are looking at IDS. Bear in mind that these
> are packets on ports allowed by your firewall rules. Without analysing
> the packets how are you going to distinguish between what is 
> OK and what
> is an attack?
> 
> Thus, investing in IDS reduces the need for experienced ITSOs like
> yourself who know how to use things like TCPDUMP and further know what
> they are looking at. If the management of the IDS is 
> outsourced then all
> the better... for TCO.

Yes.  But I personally hate outsourcing.  A fault, I know, but I just
generally don't like the fact that I am handing over company security to
another company.

> Anyone going to DEFCON?

Yep.

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.3 for non-commercial use <http://www.pgp.com>

iQA/AwUBOSKnH/WPEBDMsfC4EQLPmgCgh911mspPLwD6L4Mb923TR5kwzLkAn3Sy
QQhREM2dS2cRoI2vyjkapP4x
=58o3
-----END PGP SIGNATURE-----
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to