On 11/20/2017 07:58 PM, Mke C> wrote:
On 11/20/2017 05:54 PM, plug-requ...@pdxlinux.org wrote:
-clip -
When the firewall receives an ICMP packet, ping and traceroute both will
show failure and/or lack of "up: state. If the attacker knows the
device is
there by DNS resolution or IP address, they have a known target, and the
dropping of packets (IMO) is just obscuring things a little bit.
This is more of an ol' skool mentality that reflects a serious lack of a
deeper understanding of networking and of being a good & useful netizen.
In reality, we should actually see less and less of this over time as
the ICMP protocol suite is very useful and blocking it doesn't amount to
very much that's good and/or useful.
Coming from an admin background, you are correct that I don't have a
deep understanding of networking. I am continually trying to learn from
my mistakes, the input of others, and from readings that I can pick up.
I agree that ICMP is a useful too, and I am frustrated by the security
group at $WORK that has disabled the return of these packets.
Other tools that you can try are telnet to the port for the service in
question, nmap to check for all open ports (potential for looking like an
attacker), and netcat (nc) to test for specific, or scan for all open,
ports.
A deeper way to search if things are connecting at all is the use of
netstat, Wireshark, or tcpdump in some cases.
I've been a network engineer for over a decade and I've learned to use
the simplest tool possible for a task. In this case tcping is a very
good simple and easy to use tool for anyone who's just wanting to test
connectivity to network host. Most implementations allow for a port
number to be specified. If you're unsure of the port number from the
Linux cli you can cat the /etc/services file to get a listing of udp &
tcp ports w. description that's updated by IANA.
e.g.
~$ cat /etc/services
# Network services, Internet style
#
# Note that it is presently the policy of IANA to assign a single
well-known port number for both TCP and UDP; hence, officially ports
have two entries
# even if the protocol doesn't support UDP operations.
#
# Updated from http://www.iana.org/assignments/port-numbers and other
sources like http://www.freebsd.org/cgi/cvsweb.cgi/src/etc/services .
# New ports will be added on request if they have been officially
assigned by IANA and used in the real-world or are needed by a debian
package.
# If you need a huge list of used numbers please install the nmap package.
tcpmux 1/tcp # TCP port service multiplexer
echo 7/tcp
echo 7/udp
discard 9/tcp sink null
discard 9/udp sink null
systat 11/tcp users
This particular implementation,
https://www.elifulkerson.com/projects/tcping.php , provides a lot of
HTTP mode options as well setting wait interval for a response,
calculating jitter (variance in delay) and prefer ipv4 or ipv6.
Cool, a new tool to check out. Thank you for this information.
Network connectivity is going to likely become more problematic, and
our means of testing things will likely become more restricted as time
passes.
Just my guess, but it's a trend I have been noticing.
I don't follow nor subscribe to this logic at all. I expect network
connectivity and ways to test to it to only get better as everyone and
their grandparents demand well performing, highly reliable internet
connectivity from all of their devices, everywhere. 5 years ago while
working at an ISP in downtown Portland I had to work on networking
problems from end-users of our ISP business partners who where
complaining about high ping times in their favorite online game. And I'm
talking about sub 150 ms round-trip ping times which is used as the
measuring stick for toll quality VoIP.
My pessimism revolves around the increasing number of attacks by black
hats (thinking of Mirai), human errors that impact large networks
(recent Level 3 / Comcast routing issues), and the potential of the
federal government trying to take away a level playing field.
It is my hope that the tools will get better and with it the willingness
on the part of the major ISP players to provide more transparency and
information real time as problems happen in the future.
> Also, consider that IPv6 provides improved QOS functionality, better
> security and faster routing on an end to end connection basis. As
> infrastructure gets re-designed and changed out I only expect network
> connectivity to get less problematic with greater visibility into
> problems provided by better tools and information.
All good things for me to learn from and consider. IPv6 is not something
that I have deep understanding of, and maybe now is the time to start
looking at, and learning, it again.
dafr
_______________________________________________
PLUG mailing list
PLUG@pdxlinux.org
http://lists.pdxlinux.org/mailman/listinfo/plug