On 02/14/13 18:24, Daniel Bertrand wrote:
> Hello,
> 
> Thanks for providing such great software. It really is much
> appreciated.
> 
> I was wondering what your stance is about the constant hack attempts
> on machines on our ISP networks..

"It happens.  You can't stop the attack attempts.  You can stop them
from being successful.  It takes more than technology." (that's MY stance)

It costs them nothing to try to hit your systems.  The likelihood you
can prosecute them is just about zero.  Even if your computer has no
useful data sitting on it, it is still a very useful resource to them.

No cost, no risk, high potential gain.  Guess what is going to happen...

> I see CONSTANT scanning for ports from all over the world, mostly
> from Italy, Russia, and China.

Doesn't matter where they are from (well, you can argue this.  China and
India are mostly after Intellectual Property.  Russian mob is after
financial info.  Your next door neighbor is after adding you to their
botnet.  That's assuming your "attackers" are after you in particular.
Most likely, it's just an automated scan from someone's compromised
machine).  Some people spend a lot of time classifying them.  Me?  I
don't want any of them in my network, I don't care who they are or what
their motives are...I only care about their methods...and how I can
counter them.

> Every firewall/router product that I have purchased has been
> compromised so far.

I don't believe this at all.  Not one bit.

More likely, your machines BEHIND your firewall/router have been
compromised by careless users.  Unfortunately, no firewall will prevent
stupid...and lots of people think they can.

I work in an environment where people ARE after us in particular, they
want OUR data, it's targeted attacks, not (just) random knob twisting
(that's part of the fun -- the roar of the random knob twists helps hide
the targeted attacks).  They don't compromise our firewalls, they aim
for our users.

The normal configuration for most home firewalls or routers is "block
incoming, pass outgoing", which is easy for the users, but all that does
is block unsolicited incoming attempts.  If you can be persuaded to open
the channel to the bad guys (that's the pass outgoing), they can then
utilize your systems.  That's not your firewall/router being
compromised, that is your users being exploited.

> Is there really a secure, trustworthy adaptive filtering firewall
> configuration for each OS configuration out there?

If you have stupid users, it's unplug the wires from the back of the
computer.  If you have a block all incoming rule, your users will end up
being the weak link.  You don't need specific rule sets for each OS, and
in fact, it won't help...you are already (hopefully) blocking
unsolicited outside contact.  The problem is the invited contact: the
website visited, the application downloaded.

> Most people who are on the net are completely oblivious and helpless
> when it comes to this constant trolling for access, they have no idea
> what to do to secure their machines.
> 
> 
> Shaw has neglected me and left me for dead when I ask for better
> control and protection from malicious attackers.

not their job.
AOL tries to make it their job...and totally **** your machine up in the
process (got that, Mom?  no, didn't think so. *sigh*).

Meanwhile...if you have a simple "block all incoming" router/firewall,
disable Java, remove any product put out by Adobe, and practice safe
computing, you can live a pretty safe life at the moment on the 'net.
At the moment, Java and Adobe products are the primary things that let
bad guys onto your system through your firewall while you are behaving
yourself (that is not to say they are the only potential risk, but when
it comes to exploits in mass-market OSs, "thar's whar da gold is").

> What do I do to make sure I don't spend money on new hardware but get
> a PF configuration that I can trust besides "block in all"?
> 
> Are there published rulesets for Mac/Windows etc. that we can just
> drop into our pf.conf and /etc/pf.anchors/ directory?

No.  Your problem is basically one of users, which is outside our
ability to save you.

For sake of analogy (and my apologies to my those who have heard me
babble this one many times before) ...  let's say you run a business,
and as part of that business, you have a fleet of vehicles that are used
as an important part of that business.  You find you have a few drivers
who are responsible for a large number of "events" with those vehicles.
 Do you:

1) Fire those employees?
2) Reassign them to non-driving occupations?
3) Retrain those employees to be better drivers?
4) Put bigger bumpers and better airbags on the vehicles?

In the computer industry, we do #4.
We never do 1 through 3.  There is a belief that technology can make
dumb people safe...and it just isn't true.

Note: as I'm using it here, "dumb" or "stupid" doesn't necessarily mean
a character flaw...it's just the people who haven't been trained or
learned how attackers hit you.  Why do they teach how accidents happen
in driver's ed?  Because that's how you learn to avoid them.  You can't
just hand people computers and say "click away!" and expect technology
to keep them safe.

The usual response I get from doubters of my statement: "You can't train
everyone to never make a mistake"  My response: we don't even try to
train people.  The "technology will save us" is CLEARLY not true.

And this is waaaay off topic for this list...

Nick.

Reply via email to