Thank you.
Although, I can be pretty daft on occasion, I am trying to ``do the
right thing.'' It is not always easy knowing what that maybe in a
variety of contexts.
For me, from my humble experience, when I do not know something, it
works best to try to summarize what it is that I know, especially when I
am asking for help.
Either this is an erroneous process on this list or I did a very poor
job of communicating, or both . . .
Whether or not I am believed, I always try to present the minimum amount
of data/information necessary to get to the next step. For example, in
my original post, I hoped to either find somebody experienced with this
problem (highest hope) or, in lieu of that, suggestions on where to go
and what to do next.
Finally, today, I am receiving responses that address the latter.
Thank you.
Ray Olszewski wrote:
>
> Michael -- It is unlikely that there is a lot of AOL expertise here on this
> list (others, please correct me if I am wrong), so the most valuable
> information to provide here would be a better description of what "users
> logging into AOL over our high speed internet connections" means ...
> particularly the "logging in" part.
OK -- good point.
[ snip ]
> In any case, I don't know if this is what the users at the offending
> workstations are doing, and really *you* are the only one in a position to
> find this out. So ...
>
> Are they running some proprietary AOL software that
> does secret things? (If so, what does sniffing
> the traffic tell you?)
>
> Are they just connecting to an http(s) site and
> authenticating themselves somehow? (Might this be
> launching spyware apps or the like?)
>
> Are they doing something else? (What?)
OK.
> I do note that you wrote ...
>
> >We have been told that, apparently, logging into aol over a lan
> >connection results in some kind of connection to a special aol network.
> >I have never used aol and I do not understand this -- hence the first
> >two questions.
>
> ... so please don't reply with one of your "read what I wrote more
> carefully" responses. Even if you don't know yet, only you are in a position
> to find out what the users at your client site are actually doing. We're
> troubleshooters here, not the Psychic Friends Network.
>
> As a general matter, if what you are looking for is ONLY someone who has
> already seen the exact problem you are seeing and knows the exact answer,
> then what you've sent up to now is fine (and I'm wasting both your and my
> time by replying), since it is probably enough to find such a person. But in
> that case, you might do better on an AOL support list than here. And I am
> certainly not the person whose help you want.
To me, it is obvious that that is what I wanted; but, also obviously, it
was not so obvious to those who responded. I am sorry for my poor
communications.
> If you want help analyzing something that is a new problem to all of us ...
> then my suggestion above is a good place to start. So are Jeff's suggestions
> (about reporting the routing table and such on an "offending" workstation
> when it is "logged in" to AOL).
Just as you say, ``We're ... not the Psychic Friends Network.'' Nor am
I! What does it hurt to test the waters for somebody already
experienced in addressing these issues? If there is one, I cannot know
it without asking; nor can I know that there is not one without asking.
However, if there is, then a considerable amount of bandwidth is saved
by asking brief questions.
Also, I, for one, learn alot regarding where to go and what to do next
by probing List Services (>20!), not the least of which is this one. I
do not and cannot know everything, so I ask questions, starting simple
and progressing in complexity as need arises. Is this a bad process?
> This would probably be a good topic to explore further, either here or on
> the -devel list, and that is why I am bothering to reply at all. It is (or
> may be) a concrete, and potentially widespread, instance of a general
> problem with firewalling ... what is the difference between a tunnel and a
> hole? If users can run software that punches hard-to-find holes in firewalls
> (and we know they can, as a general matter), what's a sysadmin to do?
YES! This is exactly why I posted, yesterday.
Prior to yesterday, I had only noticed the aol connections; and, being
busy managing other fires across thousands of users, hundreds of servers
and dozens of networks, I put off indepth root-cause analysis of these
issues and assumed that the martian-blocking nature of the firewalls was
adequate protection.
Then, I noticed the United Airlines log entry!
Yesterday, I questioned that assumption, took note of what I did know,
searched the archives and posted three (3) simple questions.
> But for that sort of discussion to work, you need to be interested enough in
> exploring the problem with us, not just finding a known answer quickly, to
> share the sorts of information I mention above and that others have already
> suggested. Your call.
Excusable or not, ``people who should know better fail'' set me off!
What followed in that post (NOTE: I am not picking on you, Jeff; but,
yours was the first response) was reference to dialup, which I thought
that I had precluded, and a summary:
``Insufficient data.''
This was inadequate to my task and offensive to me, since I did not know
where to go and what to do next. That is why I asked the question --
why I am trying, in followups, to very carefully communicate to you and
others what I cannot know that you want to see. Where in the
troubleshooting documents does it address this sort of situation? I am
*NOT* saying that it is not in the docs; simply, that I do not know
where it is -- kindly, show me.
> Let me close with one specific response. You wrote:
>
> >From the ``ll header'' entries
> >that accompany each martian, we have identified the mac address of
> >culprit workstations and determined that they are not dialing out on
> >modems; but, even if they were, I do not see any change to my
> >questioning. What is the difference?
>
> The difference is that holes caused by dialout workstations are old news,
> and there is really no way to address this problem at the firewall (except
> by blocking traffic routed through it with the martians rules, as you are
> already doing). So it's not really a LEAF issue.
Perhaps, this is ``old news'' to you; but, not to me -- hence, my
question. Again, I do not find this in the troubleshooting docs, nor
did I find such in the archives. Please, point me to the documentation
and I will rtfm . . .
[ snip ]
> >It maybe interesting to know that aol installs a special ``adapter''
> >that is purported to behave similarly to an hardware nic. In fact, on
> >win9x, at least, it is next to the nic in network neighborhood
> >properties and is near identically configured.
>
> This certainly suggests to me that AOL is somehow tunneling through your
> firewall, causing the behaviors you note, and creating the sort of hole that
> is at least potentially exploitable. When you have access to an offending
> workstation, perhaps you will be able to tell us if this characteristic
> applies to the sorts of logins your users are doing or just to AOL's dial-up
> service.
Thank you, for this useful suggestion. Do you know how to quantify
this?
Also, since I do not know everything there is to know about networks and
quantifying everything quantifiable about same, regarding your sniffer
questions, can you describe a simple, open source process to accomplish
these tasks?
Thank you, for a constructive post -- I learned alot . . .
--
Best Regards,
mds
mds resource
888.250.3987
Dare to fix things before they break . . .
Our capacity for understanding is inversely proportional to how much we
think we know. The more I know, the more I know I don't know . . .
_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user