You'd have to snoop every time a user connects, which could be
scripted. But sooner or later this approach will break other services -
especially FTP and more legit streaming media.
All those people who've blocked Napster by defining it in their DNS had
better get ready for the exciting world of Gnutella...
--
Jack Coates, Rainfinity SE
t: 650-962-5301 m: 650-280-4376
On Fri, 28 Jul 2000 [EMAIL PROTECTED] wrote:
>
> Can anyone suggest method of adequately testing these port numbers?
>
> -----Original Message-----
> From: Michael Hernandez [mailto:[EMAIL PROTECTED]]
> Sent: Friday, July 28, 2000 8:54 AM
> To: 'Michael Tench'; Gijs Wuyts; 'Mike Anning';
> [EMAIL PROTECTED]
> Subject: RE: [FW1] Napster
>
>
>
> Just to add a little more, as Michael Tench said real world counts, and
> after serving 10 years in the Navy working in NOC's I can say that besides
> agreeing with his approach you may also opt for an easier way, meaning setup
> a single rule with your workstation and on the log filter only
> outbound/inbound traffic as you hit napster, you'll notice napster will open
> 2 ports initially, one port is a UDP port which queries for a napster
> server, once found then send another request via TCP (on a different port)
> to establish a connection (<--- this is how others can download from you!).
> Once you see those ports, all you have to do is close those 2 ports and the
> napster application will be useless!.
>
> --Michael H.
>
> -----Original Message-----
> From: Michael Tench [mailto:[EMAIL PROTECTED]]
> Sent: Friday, July 28, 2000 8:12 AM
> To: Gijs Wuyts; 'Mike Anning'; [EMAIL PROTECTED]
> Subject: RE: [FW1] Napster
>
>
>
> Instead of worrying about the ports these programs use (some of these
> utilities will use what ever port you have open), I would reccommend
> changing your security stance. I.E....I do not allow any workstations on my
> network to have direct outbound access. I only allow a proxy to have
> outbound access through FW1...the proxy can then filter at the application
> layer.
> Additionally, a security policy should be "deny all except what is required"
> that way you are already denying access to various "esoteric" ports.
> I know this wasn't what you asked, but believe me...it will save you alot of
> heartache at a later date.
>
> Michael Tench
> Yeah I have a whole lot of alphabet soup after my name too...so what..
> certifications mean nothing. Real world knowledge mean everything.
>
> On Fri, 28 Jul 2000 13:42:55 +0200, Gijs Wuyts wrote:
>
> >
> > First posting, so ignore my level of knowledge...
> >
> > Is there a comprehensive resources regarding ports for exotic
> applications
> > like these.
> > Most protocols I can find via ietf, but e.g. I don't think Napster, etc
> are
> > using ports described via RFC's?
> >
> > Gijs
> >
> > -----Original Message-----
> > From: [EMAIL PROTECTED]
> > [mailto:[EMAIL PROTECTED]]On Behalf Of Mike
> > Anning
> > Sent: Friday, July 28, 2000 10:31 AM
> > To: [EMAIL PROTECTED]
> > Subject: [FW1] Napster
> >
> >
> >
> >
> >
> > So it seems, according to CNN, that the battle is finally won.... but the
> > war is
> > far from over!
> >
> >
> ----------------------------------------------------------------------------
> > -----
> > DISCLAIMER:
> > This E-mail is strictly confidential and intended solely for the
> addressee.
> > It may contain information that is covered by legal, professional or
> other
> > privilege. If you are not the intended addressee you must not use,
> disclose
> > or
> > copy this transmission.
> >
> > This E-mail is not intended to impose nor shall it be construed as
> imposing
> > any
> > legally binding obligation upon CHEP and/or any of its subsidiaries or
> > associated companies.
> >
> > Neither CHEP nor any of its subsidiaries or associated companies gives
> any
> > representation or warranty as to the accuracy or completeness of the
> > contents of
> > this E-mail.
> >
> > CHEP shall not be held liable to any person resulting from the use of any
> > information contained in this E-mail and shall not be liable to any
> person
> > who
> > acts or omits to do anything in reliance upon it.
> >
> >
> >
> >
> >
> ============================================================================
> > ====
> > To unsubscribe from this mailing list, please see the instructions
> at
> > http://www.checkpoint.com/services/mailing.html
> >
> ============================================================================
> > ====
> >
> >
> >
> >
> ============================================================================
> ====
> > To unsubscribe from this mailing list, please see the instructions
> at
> > http://www.checkpoint.com/services/mailing.html
> >
> ============================================================================
> ====
>
>
> Michael Tench
>
>
>
>
>
> _______________________________________________________
> Say Bye to Slow Internet!
> http://www.home.com/xinbox/signup.html
>
>
>
> ============================================================================
> ====
> To unsubscribe from this mailing list, please see the instructions at
> http://www.checkpoint.com/services/mailing.html
> ============================================================================
> ====
>
>
> ============================================================================
> ====
> To unsubscribe from this mailing list, please see the instructions at
> http://www.checkpoint.com/services/mailing.html
> ============================================================================
> ====
>
>
> ================================================================================
> To unsubscribe from this mailing list, please see the instructions at
> http://www.checkpoint.com/services/mailing.html
> ================================================================================
>
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================