You also have to open TCP ports 1024-65535 Outbound (Dynamic) for the negotiated H.323 
Call Control (done as part of the negotiation over port 1720).  Although I have seen 
many concerned thoughts about this aspect of H.323, that it is a "huge security hole", 
it is not really an issue the way you have it setup (which is the way I recommend) 
since the ports are only opened for calls/packets initiated from within the network, 
which does not open you up to external packets being passed into the network (i.e. you 
have it setup with reflexive access control).

I would like to also add a second point concerning the H.323 security issue:
Even if you opened up TCP ports 1024-65535 Inbound to receive inbound NM calls, the 
security risk is in principal only, and I am not aware of any exploits that are 
generated from attack vectors on these ports.  The only way an external attack/hack 
can be successful is if there are threads listening to the ports from which the attack 
takes place, and if these threads actually gain/allow access to system resources 
(files, access control, configs, etc...).  The ports with Winsock/Socks listening 
threads are 21, 25, 135, 137, 139, etc.....none over 1024.  In particular, those using 
Windows platforms should be especially concerned with TCP ports 135 (RPC) and 137,139 
(NetBIOS over TCP), as these have complete access to the system, and are extremely 
vulnerable to external attack (reference Common Insecurities Fail Scrutiny - C.I.F.S. 
document by Hobbit, which is an extremely detailed, packet level analysis of how to 
walk right into a Windows platform using SAMBA on Linux).  Although I agree with the 
principal and recommend against opening the Inbound 1024+ TCP Ports on principal, it 
is not as monstrous a security hole as has been hyped up in some of the articles I 
have seen.  Opening up the dynamic ports reflexively for outbound only (as you will 
need to do) poses no security risk.

There....I'm done ranting and raving  :)

Paul Eftis



----------
From:   Michiel van der Linden
Sent:   Wednesday, August 18, 1999 8:19 AM
To:     [EMAIL PROTECTED]
Subject:        [NetMeeting] MS proxy server settings for Netmeeting 


Hi all,
I'm having some trouble getting MS Proxy 2.0 to let me use alle the 
multimedia functionality of Netmeeting. Here is what happens: I can make a 
call to someone, and I can be called, however, after that no audio and video 
connection. We can use the chat function. Also I'm visible twice for the 
other party in a call.

I have setup MS Proxy According to the suggested settings in Netmeeting 
Resource Kit, that is one LDAP protocol, (port 389, TCP outbound), one ULS 
(port 522, TCP, outbound), one T.120 (port 1503, TCP, outbound), one H.323 
call setup (port 1720, TCP, outbound), one audio call control (port1731, 
TCP, outbound). For all protocols I added subsequent connections port range 
0 - 65535, UDP, inbound and outbound.

I'm not sure if i've covered H.323 call control/streaming protocol with 
these settings.

Can anyone enlighten me? Thanks

Michiel


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com
-----------------------------------------------------------------------
http://www.meetingbywire.com/Mailinglist.htm for unsubscribe information
-----------------------------------------------------------------------

application/ms-tnef

Reply via email to