Through some discussions I have had with several people, I have a concern
about NAV 7.5 server/client setup.  I wanted other expert opinions on this
issue.  I am including some text from an email with a Symantec Engineer.  My
questions/comments are in [brackets].

>When NSCTOP starts, it initiates a quick discovery, which is 
>essentially a broadcast ping to the entire subnet. It asks 
>that any application listening on port 38293 please respond 
>with a pong packet. Any computers running PDS will respond to 
>the ping with a pong packet.
[Can this be used in a type of smurf amplification attack??? Especially
taken with the next comment?]
>Intense Discovery. Walks the Network Neighborhood, attempting 
>to ping all computers it finds.

[And lastly we have a built in Network scanner??]:
>Scan Network tab. The scan network feature of the "Find 
>Computer" dialog allows you to scan a range of IP Addresses, 
>or IP subnets in order to find computers. Using the IP address 
>scan, you enter a range of IP addresses, which the dialog will 
>then loop through. The dialog requests the discovery service 
>to ping each address, and brings in any servers it finds. 
>Using the IP subnet scan, you can send broadcast packets to 
>specific subnets. This scan can circumvent routers that stop 
>normal broadcast packets. 

------------
 
Am I missing something here or am I being way to paranoid about this
application?  Does anybody use server/client setup in their organization
that can send me comments about this traffic and how it affects their
bandwidth?  Has anybody tried to use this as a smurf amplification tool?

Beth Young
MOREnet Security
1.800.509.6673
http://www.more.net/

_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to