Re: IPv6 vs IPv4 (Re: Sprint NOC? Are you awake now?)

2003-09-03 Thread Iljitsch van Beijnum
On dinsdag, sep 2, 2003, at 23:18 Europe/Amsterdam, Nenad Pudar wrote:

Again my point is that your site (or any other that use the same dns 
for ipv4 and 6) may be blackholed by ipv6 (it is not the question 
primary about the quality ipv6 connction it is the fact that your ipv4 
connection which may be excelant is blackholed with your ipv6 
connection which may not be good and to me the most obvious solution 
is not to use the same dns name for both)
First of all, why are you repeating everything the previous posters 
said? This is a waste of bandwidth. Not only on the network, but also 
where it really matters: in the synapses.

The real problem is that your software assumes that if there are 
several addresses in the DNS, it can just pick one and assume that 
address works. That has never been a good idea, but in IPv4 you can get 
away with it. In IPv6, you can't. IPv6 hosts are required to support 
more than a single address per interface, and when people actually use 
this then it's only a matter of time before address #1 becomes 
unreachable while address #2 is still reachable. So this means you have 
to try them all.

The new name to address mechanisms for IPv6 are such that you can ask 
for IPv4 addresses, IPv6 addresses or both for a certain FQDN. If you 
choose both, you'll usually get an IPv6 address first.

I don't see how it would be reasonable to have separate FQDNs for all 
these addresses and have the user try them all rather than simply have 
the application walk through the list of addresses and try them all 
until it gets a live one.

(And yes, I've suffered from decreased performance because of 
non-optimal or even nonexisting IPv6 connectivity, but that's the price 
of being an early adapter.)

Now if your argument is that it's not a good idea to depend on 
applications handling this they way they should _today_ that is 
something I'm willing to discuss, although I don't necessarily agree.

BTW, my IPv6 connectivity for www.bgpexpert.com is in some ways better 
than IPv4 as there is an extra path available over IPv6 that isn't 
available over IPv4.



Re: Automatic shutdown of infected network connections

2003-09-03 Thread Matthew S. Hallacy

On Tue, Sep 02, 2003 at 09:59:51AM -0500, Jonathan Crockett wrote:
 I work for a cable modem provider.  What we came up with is a modem config
 that allows http, pop, and smtp while cutting the allowed bandwidth to 56k
 upstream and 56k downstrem.  This way they can still get the needed updates,
 but are not able to blast our network.  Secondary effect is that customer
 will call in an complain about slow speeds, then our techs can tell them why,
 they are slow and inform them how to fix the problem.

Why in the world would you do that? the DOCSIS specification allows for
filtering rules at the CPE, which means you could simply block icmp echo
and ports 135-139+445 directly at their home network, causing no load 
whatsoever on your network, _and_ no more infected boxes (even at 56k).

Besides, have you ever tried updating an XP system at 56k? It could 
literally take days.

-- 
Matthew S. HallacyFUBAR, LART, BOFH Certified
http://www.poptix.net   GPG public key 0x01938203


Re: Automatic shutdown of infected network connections

2003-09-03 Thread Nathan E Norman

On Wed, Sep 03, 2003 at 07:39:17AM -0500, Matthew S. Hallacy wrote:
 
 On Tue, Sep 02, 2003 at 09:59:51AM -0500, Jonathan Crockett wrote:
  I work for a cable modem provider.  What we came up with is a modem config
  that allows http, pop, and smtp while cutting the allowed bandwidth to 56k
  upstream and 56k downstrem.  This way they can still get the needed updates,
  but are not able to blast our network.  Secondary effect is that customer
  will call in an complain about slow speeds, then our techs can tell them why,
  they are slow and inform them how to fix the problem.
 
 Why in the world would you do that? the DOCSIS specification allows for
 filtering rules at the CPE, which means you could simply block icmp echo
 and ports 135-139+445 directly at their home network, causing no load 
 whatsoever on your network, _and_ no more infected boxes (even at 56k).

The modem _is_ the CPE.  There's no load on the network; just CPU on
the modem.  modem config != CMTS config.
 
 Besides, have you ever tried updating an XP system at 56k? It could 
 literally take days.

You may have a point there.

-- 
Nathan Norman - Incanus Networking mailto:[EMAIL PROTECTED]
  Perilous to all of us are the devices of an art deeper than we
  ourselves possess.
  -- Gandalf the Grey


Re: Automatic shutdown of infected network connections

2003-09-03 Thread Omachonu Ogali

 Besides, have you ever tried updating an XP system at 56k? It could 
 literally take days.

Yes, days if you have never updated the system at all or if you count
minutes as days.

And if you just bought a new system, it should have the big update
(SP2) installed on the machine already, unless you're dealing with
an incompetent PC manufacturer/reseller/whatever that likes to cut
corners (say something idiotic like buying plain XP OEM CDs instead
of XP+SP2 OEM CDs because it saves them $1-3 per seat from some gray
distributor) or not stay up to speed on MS security because they
don't want to deal with after-sale support or provide it.

Right now, Windows XP says I'm Connected at 50.6Kbps, and there
are no annoying There are critical updates available for your
system nag messages beaming from the taskbar.


Re: Automatic shutdown of infected network connections

2003-09-03 Thread Mike Tancsa
At 10:41 AM 03/09/2003 -0400, Omachonu Ogali wrote:
And if you just bought a new system, it should have the big update
(SP2) installed on the machine already, unless you're dealing with
an incompetent PC manufacturer/reseller/whatever that likes to cut
corners (say something idiotic like buying plain XP OEM CDs instead
of XP+SP2 OEM CDs because it saves them $1-3 per seat from some gray
distributor) or not stay up to speed on MS security because they
don't want to deal with after-sale support or provide it.


FYI, the last 3 Dell laptops we bought (2 weeks ago) all needed about 56MB 
of patches OOTB

---Mike 



RE: bgp as-path info

2003-09-03 Thread Truman, Michelle, RTSLS

Jay,

 Customer care should be able to help you. If you have any trouble let me know. I can 
tell you the community you need to use to get your more specific route out. 

Michelle

Michelle Truman   CCIE # 8098
Principal Technical Consultant
ATT Solutions Center
mailto:[EMAIL PROTECTED]
Work: 651-998-0949 





-Original Message-
From: Austad, Jay [mailto:[EMAIL PROTECTED]
Sent: Tuesday, September 02, 2003 1:19 PM
To: 'Jack Bates'; Austad, Jay
Cc: [EMAIL PROTECTED]
Subject: RE: bgp as-path info



Actually, it looks like this is what they are doing.  I've already put a
call in with them.

 -Original Message-
 From: Jack Bates [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, September 02, 2003 1:17 PM
 To: Austad, Jay
 Cc: [EMAIL PROTECTED]
 Subject: Re: bgp as-path info
 
 
 If you look closely, they are probably not just stripping 
 your AS. They 
 are probably aggregating your network. One provider that I am 
 aware of 
 that does this is ATT. Since your advertisements out the 
 other network 
 will be more specific, traffic will only come through them. If the 
 networks are the same size, then traffic will most likely 
 come through 
 your first provider due to AS path counts.
 
 Usually, you have to request that your more specific routes 
 be allowed 
 out due to multi-homing. In the case of ATT, they have a 
 community that 
 you must send with the route to have it sent beyond their 
 local network. 
 It's really just a matter of default preference on the part of your 
 provider. Some default to advertise more specific while 
 others default 
 to advertising their aggregates. The latter is used most 
 commonly when a 
 provider does a lot of BGP peering that is not multi-homed. 
 It's not a 
 bad policy when it comes to looking at the BGP tables.
 
 -Jack
 
 Austad, Jay wrote:
 
  I just brought up a BGP session with one of my providers, 
 they are stripping
  our AS as it leaves their network, so it looks like the 
 route is originating
  from their network.  I have another provider that I will be 
 bringing up BGP
  with later this week.  Once I bring up the other provider, I will be
  advertising several networks out both of them.
  
  Is this as-path stripping going to cause issues?  Does it 
 matter either way?
  
  -jay
 
 
 


RE: bgp as-path info

2003-09-03 Thread Ejay Hire

IIRC, They will advertise your specifics if you attach a community of
7018:20 to the route as you send it to them.  Otherwise they aggregate
all of the routes in the 12/8.

-Ejay

-Original Message-
From: Austad, Jay [mailto:[EMAIL PROTECTED]
Sent: Tuesday, September 02, 2003 1:19 PM
To: 'Jack Bates'; Austad, Jay
Cc: [EMAIL PROTECTED]
Subject: RE: bgp as-path info



Actually, it looks like this is what they are doing.  I've already put a
call in with them.

 -Original Message-
 From: Jack Bates [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, September 02, 2003 1:17 PM
 To: Austad, Jay
 Cc: [EMAIL PROTECTED]
 Subject: Re: bgp as-path info
 
 
 If you look closely, they are probably not just stripping 
 your AS. They 
 are probably aggregating your network. One provider that I am 
 aware of 
 that does this is ATT. Since your advertisements out the 
 other network 
 will be more specific, traffic will only come through them. If the 
 networks are the same size, then traffic will most likely 
 come through 
 your first provider due to AS path counts.
 
 Usually, you have to request that your more specific routes 
 be allowed 
 out due to multi-homing. In the case of ATT, they have a 
 community that 
 you must send with the route to have it sent beyond their 
 local network. 
 It's really just a matter of default preference on the part of your 
 provider. Some default to advertise more specific while 
 others default 
 to advertising their aggregates. The latter is used most 
 commonly when a 
 provider does a lot of BGP peering that is not multi-homed. 
 It's not a 
 bad policy when it comes to looking at the BGP tables.
 
 -Jack
 
 Austad, Jay wrote:
 
  I just brought up a BGP session with one of my providers, 
 they are stripping
  our AS as it leaves their network, so it looks like the 
 route is originating
  from their network.  I have another provider that I will be 
 bringing up BGP
  with later this week.  Once I bring up the other provider, I will be
  advertising several networks out both of them.
  
  Is this as-path stripping going to cause issues?  Does it 
 matter either way?
  
  -jay
 
 
 



Re: Automatic shutdown of infected network connections

2003-09-03 Thread Matthew S. Hallacy

On Wed, Sep 03, 2003 at 07:20:28AM -0500, Nathan E Norman wrote:
 On Wed, Sep 03, 2003 at 07:39:17AM -0500, Matthew S. Hallacy wrote:
  Why in the world would you do that? the DOCSIS specification allows for
  filtering rules at the CPE, which means you could simply block icmp echo
  and ports 135-139+445 directly at their home network, causing no load 
  whatsoever on your network, _and_ no more infected boxes (even at 56k).
 
 The modem _is_ the CPE.  There's no load on the network; just CPU on
 the modem.  modem config != CMTS config.

I think that's exactly what I said, perhaps you misread my comment.

My point was that you're rate limiting and filtering customers for no 
reason when you have the ability to filter the attack vectors in a very
effective and 'clean' way. You should consider leaving those ports filtered
seeing how they're the #1 way for windows systems to be infected/hijacked.

-- 
Matthew S. HallacyFUBAR, LART, BOFH Certified
http://www.poptix.net   GPG public key 0x01938203


Anyone here from Earthlink?

2003-09-03 Thread chuck goolsbee
Please contact me offlist. Normal contact methodologies have 
failed, and a problem is now four days old.

Thank you.

--

Chuck Goolsbee  V.P. Technical Operations
_
digital.forest  Phone: +1-877-720-0483, x2001
where Internet solutions grow  Int'l: +1-425-483-0483
19515 North Creek ParkwayFax: +1-425-482-6871
Suite 208   http://www.forest.net
Bothell, WA 98011email: [EMAIL PROTECTED]


Re: Automatic shutdown of infected network connections

2003-09-03 Thread Nathan E Norman

On Wed, Sep 03, 2003 at 10:45:26AM -0500, Matthew S. Hallacy wrote:
 
 On Wed, Sep 03, 2003 at 07:20:28AM -0500, Nathan E Norman wrote:
[ Jonathan said we are filtering and rate limiting at the modem ...  ]

  On Wed, Sep 03, 2003 at 07:39:17AM -0500, Matthew S. Hallacy wrote:
   Why in the world would you do that? the DOCSIS specification allows for
  ^^
   filtering rules at the CPE, which means you could simply block icmp echo
   and ports 135-139+445 directly at their home network, causing no load 
   whatsoever on your network, _and_ no more infected boxes (even at 56k).
  
  The modem _is_ the CPE.  There's no load on the network; just CPU on
  the modem.  modem config != CMTS config.
 
 I think that's exactly what I said, perhaps you misread my comment.

What you said is highlighted above.  I don't think I misread it ... I
may have misunderstood what you meant.  Did you intend to take issue
_only_ with rate limiting, as opposed to filtering, or are you taking
issue with the broad filtering described, or both?  i'm trying to
parse Why in the world ... :-)
 
 My point was that you're rate limiting and filtering customers for no 
 reason when you have the ability to filter the attack vectors in a very
 effective and 'clean' way. You should consider leaving those ports filtered
 seeing how they're the #1 way for windows systems to be infected/hijacked.

The provider in question has a long-standing tradition of providing
unfiltered access.  Perhaps recent events will cause them to change
their policy as you suggest.  Personally I think it's a great idea.

[ I'm no longer an employee of said provider ]

Best regards,

-- 
Nathan Norman - Incanus Networking mailto:[EMAIL PROTECTED]
  This message cannot be considered spam, even though it is.  Some
  law that never was enacted says so.
  -- Arkadiy Belousov


Cisco Service Provider code - Any good?

2003-09-03 Thread Jason Frisvold
All,

It was requested that I post this email to the Nanog list as the person
in question does not have posting ability...  :)

Hello All,

We're currently looking into migrating our Cisco 72xx and 75xx routers
to Service Provider IOS and I was wondering if anyone has had any good
luck with a certain version?  We've seen that 12.0(25)S1 seems to be an
ok version but I have also heard some gripes about it.  The PAs that we
run in most of the units are the following:

ATM-OC3-MM
ATM-OC12-MM
FastE
GigE

The IOS would also have to support RFC-1483 connections (Preferrably
RBE), BGP, IS-IS and any other basic services of the such.

Thanks in advance

-- 
---
Jason H. Frisvold
Backbone Engineering Supervisor
Penteledata Engineering
[EMAIL PROTECTED]
RedHat Engineer - RHCE # 807302349405893
Cisco Certified - CCNA # CSCO10151622
MySQL Core Certified - ID# 205982910
---
Imagination is more important than knowledge.
Knowledge is limited. Imagination encircles
the world.
  -- Albert Einstein [1879-1955]


signature.asc
Description: This is a digitally signed message part


Re: Automatic shutdown of infected network connections

2003-09-03 Thread Roland Perry
In article [EMAIL PROTECTED], Mike Tancsa 
[EMAIL PROTECTED] writes
FYI, the last 3 Dell laptops we bought (2 weeks ago) all needed about 
56MB of patches OOTB
That's exactly the same as I needed for a copy of XP-Upgrade I bought in 
a high-turnover retail store (Staples, in USA) last week.
--
Roland Perry


Distributed sniffer products

2003-09-03 Thread Austad, Jay

Anyone have any experience with these?  I'm looking for something similar to
Network Associates Sniffer product.

Are there any open source projects that are decent?  What are others using?


Jay Austad
Senior Network Analyst
Travelers Express / MoneyGram
e: [EMAIL PROTECTED] p: 952.591.3779


Re: Automatic shutdown of infected network connections

2003-09-03 Thread Matthew S. Hallacy

On Wed, Sep 03, 2003 at 10:12:16AM -0500, Nathan E Norman wrote:

 What you said is highlighted above.  I don't think I misread it ... I
 may have misunderstood what you meant.  Did you intend to take issue
 _only_ with rate limiting, as opposed to filtering, or are you taking
 issue with the broad filtering described, or both?  i'm trying to
 parse Why in the world ... :-)

I was taking issue with the deny all, allow pop3, smtp, http, .. + rate
limit approach, I did see the 'filtering at the modem' part, perhaps restating
the ability of DOCSIS compliant CPE's was confusing.

-- 
Matthew S. HallacyFUBAR, LART, BOFH Certified
http://www.poptix.net   GPG public key 0x01938203


Re: Automatic shutdown of infected network connections

2003-09-03 Thread Omachonu Ogali

On Wed, Sep 03, 2003 at 10:55:47AM -0400, [EMAIL PROTECTED] wrote:
 On Wed, 3 Sep 2003, at 10:41am, [EMAIL PROTECTED] wrote:
  And if you just bought a new system, it should have the big update (SP2)
  installed on the machine already ...
 
   Service Pack 2 for Windows XP has not been released yet.

Weird, when I go to Add/Remove programs, I see (SP2) next to the
hotfixes I applied, from that I assumed SP2 was out or something.
 
   As of 1 Sep 2003, there are 21 post-SP1 security-related hotfixes posted
 for Windows XP.  The total download size is quite large, if you are on a 56
 kilobit modem.

Most of my updates were done on this same modem, and if I recall
correctly, most of them varied in size from 300KB to 2MB. Then
again, I haven't done a fresh XP install ever since I installed
it on this laptop so I don't know how big the initial lump is
right now.
 
  ... unless you're dealing with an incompetent PC
  manufacturer/reseller/whatever that likes to cut corners ...
 
   Like, say, most of them?

Eek. :(

Hate to rehash the responsibility debate...but shouldn't the
manufacturers/whatever slap the latest service packs on their
products that they're selling?

If GM puts out a recall on their vehicles for a GE lamp. Yeah,
I'm sure GE takes the blame and a hit to their stock, but the
dealers go to GM (the aggregator) for the replacement and fix
the vehicles they have on the lot before another one gets sold,
right?

Subtract one level of hierarchy (the dealer, or you could leave
it in, since most system builders are rolling out their own
stores...Apple, Dell, Gateway, etc.) and you have the common
relationship of Microsoft-OEM-End User. Shouldn't the OEM be
responsible for any product coming off their shelf that's been
recalled up until the point of the recall?


Re: Distributed sniffer products

2003-09-03 Thread Joel Jaeggli

On Wed, 3 Sep 2003, Austad, Jay wrote:

 
 Anyone have any experience with these?  I'm looking for something similar to
 Network Associates Sniffer product.
 
 Are there any open source projects that are decent?  What are others using?

we use bro and snort...

http://www.snort.org/

http://www-nrg.ee.lbl.gov/bro-info.html
 
 
 Jay Austad
 Senior Network Analyst
 Travelers Express / MoneyGram
 e: [EMAIL PROTECTED] p: 952.591.3779
 

-- 
-- 
Joel Jaeggli   Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2




RE: Distributed sniffer products

2003-09-03 Thread Luke Starrett

I took a different approach and run a Windows XP machine with multiple
network cards to the segments that I regularly need to sniff.  I use the
remote desktop feature to access the box.  It has one NIC for regular
connectivity, and a couple others that are just used for sniffing.
Others are using cheap linux boxes running ethereal in a similar fashion
using VNC to access the box.  

Luke

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
 Behalf Of Austad, Jay
 Sent: Wednesday, September 03, 2003 11:08 AM
 To: '[EMAIL PROTECTED]'
 Subject: Distributed sniffer products
 
 
 
 Anyone have any experience with these?  I'm looking for 
 something similar to Network Associates Sniffer product.
 
 Are there any open source projects that are decent?  What are 
 others using?
 
 
 Jay Austad
 Senior Network Analyst
 Travelers Express / MoneyGram
 e: [EMAIL PROTECTED] p: 952.591.3779
 



Re: What do you want your ISP to block today?

2003-09-03 Thread Johannes Ullrich


I just summarized my thoughts on this topic here:
http://www.sans.org/rr/special/isp_blocking.php

Overall: I think there are some ports (135, 137, 139, 445),
a consumer ISP should block as close to the customer as
they can. 

One basic issue is that people discussing this topic on 
mailing lists like these are not average home users. Most
of us here have seen a DOS prompt at some point and know
about Service Packs and Hotfixes.




-- 
--
Johannes Ullrich [EMAIL PROTECTED]
pgp key: http://johannes.homepc.org/PGPKEYS
--
   We regret to inform you that we do not enable any of the 
security functions within the routers that we install.
 [EMAIL PROTECTED]
--




Re: Automatic shutdown of infected network connections

2003-09-03 Thread Mike Tancsa
At 02:21 PM 03/09/2003 -0400, Omachonu Ogali wrote:
Eek. :(

Hate to rehash the responsibility debate...but shouldn't the
manufacturers/whatever slap the latest service packs on their
products that they're selling?
That would add cost.  You either eat that cost or pass it on to the 
consumer.  As price is the number one criteria for the mass market I am 
sure vendors are shy about raising prices and equally shy about eating into 
meager profits


If GM puts out a recall on their vehicles for a GE lamp.
You know its not that simple Changing a light bulb does not have the 
same potentially unforeseen and unintended consequences of installing 56MB 
of new code.  It WILL break some things.

Vendor A laptop price = $x
Vendor B laptop price = $x+ $20
A-Laptop == B-Laptop

Given the choice between the two where one has all the service packs 
installed and the other for $20 less does not Sad to say most will take 
the one for $20 less as the other is ripping me off!  Most consumers dont 
have a hope in hell sometimes of understanding value in the tech world and 
instead fixate totally on price.

---Mike 



NANOG 29 (Chicago) Meeting Information

2003-09-03 Thread Carol Wadsworth
Registration is now open for NANOG 29, October 19-21,
in Chicago.  The meeting will be hosted by Server Central.
Call for Presentations (submit by September 8):

  http://www.nanog.org/mtg-0310/call29.html

Additional meeting information:

   http://www.nanog.org

Of special note, vendor sponsors can now display equipment
during the continental breakfasts and afternoon breaks.
Vendor sponsor information:
  http://www.nanog.org/vendor.html

See you there!


Re: Automatic shutdown of infected network connections

2003-09-03 Thread Chris Horry
Omachonu Ogali wrote:

On Wed, Sep 03, 2003 at 10:55:47AM -0400, [EMAIL PROTECTED] wrote:

On Wed, 3 Sep 2003, at 10:41am, [EMAIL PROTECTED] wrote:

And if you just bought a new system, it should have the big update (SP2)
installed on the machine already ...
 Service Pack 2 for Windows XP has not been released yet.


Weird, when I go to Add/Remove programs, I see (SP2) next to the
hotfixes I applied, from that I assumed SP2 was out or something.
Those are pre SP2 updates, which means they'll be integrated into 
Service Pack 2.

Chris

--
Chris Horry   Don't submit to stupid rules,
[EMAIL PROTECTED] Be yourself and not a fool.
PGP: DSA/2B4C654E  Don't accept average habits,
Amateur Radio: KG4TSM   Open your heart and push the limits.


Re: Cisco Service Provider code - Any good?

2003-09-03 Thread Peter E. Fry

Jason Frisvold wrote:

[...]
 We're currently looking into migrating our Cisco 72xx and 75xx routers
 to Service Provider IOS [...]

 The IOS would also have to support RFC-1483 connections (Preferrably
 RBE), BGP, IS-IS and any other basic services of the such.

  Looks like bridging (IRB and RBE) is spanky new to the S feature sets
-- 12.2-14S range, so a 12.0-S load doesn't sound like it'll do the job
for you.

Peter E. Fry


Re: What do you want your ISP to block today?

2003-09-03 Thread Sean Donelan

On Wed, 3 Sep 2003, Johannes Ullrich wrote:
 I just summarized my thoughts on this topic here:
 http://www.sans.org/rr/special/isp_blocking.php

 Overall: I think there are some ports (135, 137, 139, 445),
 a consumer ISP should block as close to the customer as
 they can.

If ISPs had blocked port 119, Sobig could not have been distributed
via USENET.


Perhaps unbelievably to people on this mailing list, many people
legitimately use 135, 137, 139 and 445 over the open Internet
everyday. Which protocols do you think are used more on today's
Internet?  SSH or NETBIOS?

Some businesses have create an entire industry of outsourcing Exchange
service which need all their customers to be able to use those ports.

http://www.mailstreet.net/MS/urgent.asp

http://dmoz.org/Computers/Software/Groupware/Microsoft_Exchange/

If done properly, those ports are no more or less dangerous than
any other 16-bit port number used for TCP or UDP protocol headers.


But we need to be careful not to make the mistake that just because
we don't use those ports that the protocols aren't useful to other
people.




RE: What do you want your ISP to block today?

2003-09-03 Thread Matthew Kaufman

I just read the paper... Sounds like as an ISP, I should offer a new product
The Internet Minus Four Port Numbers Microsoft Can't Handle. What I can't
tell is whether this should cost more or less than The Internet

Matthew Kaufman

 On Behalf Of Johannes Ullrich:
 
 I just summarized my thoughts on this topic here: 
 http://www.sans.org/rr/special/isp_blocking.php
 
 Overall: I 
 think there are some ports (135, 137, 139, 
 445),
 a consumer ISP should block as close to the customer as
 they can. 
 



RE: Distributed sniffer products

2003-09-03 Thread Owen DeLong
OK... I'll leave the XP thing al0wned.

As to the linux solution, why would you bother with VNC rather than just
ssh.  Pull the libpcap file back to a local desktop for analysis in 
ethereal.

Owen

--On Wednesday, September 3, 2003 11:26 AM -0700 Luke Starrett 
[EMAIL PROTECTED] wrote:

I took a different approach and run a Windows XP machine with multiple
network cards to the segments that I regularly need to sniff.  I use the
remote desktop feature to access the box.  It has one NIC for regular
connectivity, and a couple others that are just used for sniffing.
Others are using cheap linux boxes running ethereal in a similar fashion
using VNC to access the box.
Luke

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Austad, Jay
Sent: Wednesday, September 03, 2003 11:08 AM
To: '[EMAIL PROTECTED]'
Subject: Distributed sniffer products


Anyone have any experience with these?  I'm looking for
something similar to Network Associates Sniffer product.
Are there any open source projects that are decent?  What are
others using?

Jay Austad
Senior Network Analyst
Travelers Express / MoneyGram
e: [EMAIL PROTECTED] p: 952.591.3779





Re: Automatic shutdown of infected network connections

2003-09-03 Thread Chris Lewis
Sean Donelan wrote:

How many ISPs disconnect infected computers from the network?  Do you
leave them connected because they are paying customers, and how else
could they download the patch from microsoft?
As an aside:

As a corporation (no customers per-se), we disconnect infected computers 
_completely_ (via remote router/switch control tools).  We can do it 
automatically (via various detectors), but usually do it manually.

This is primarily to maintain service levels with non-infected stuff.

Fixing the computer is usually done by support staff.  Via CD if it's 
unsafe to reconnect the machine to the net.

If we get infested bad enough, we block the attack ports 
subnet-by-subnet as necessary until we've sterilized the subnet.




RE: Distributed sniffer products

2003-09-03 Thread Luke Starrett

 OK... I'll leave the XP thing al0wned.

Understood...  It was a quick (and dirty) solution.

 As to the linux solution, why would you bother with VNC 
 rather than just ssh.  Pull the libpcap file back to a local 
 desktop for analysis in 
 ethereal.

SSH works, but it's sometimes nice to have a persistent session that I
can pick back up later (or from a different PC).  

Luke



Re: What do you want your ISP to block today?

2003-09-03 Thread Vinny Abello
At 02:51 PM 9/3/2003, Sean Donelan wrote:

On Wed, 3 Sep 2003, Johannes Ullrich wrote:
 I just summarized my thoughts on this topic here:
 http://www.sans.org/rr/special/isp_blocking.php

 Overall: I think there are some ports (135, 137, 139, 445),
 a consumer ISP should block as close to the customer as
 they can.
If ISPs had blocked port 119, Sobig could not have been distributed
via USENET.
Perhaps unbelievably to people on this mailing list, many people
legitimately use 135, 137, 139 and 445 over the open Internet
everyday. Which protocols do you think are used more on today's
Internet?  SSH or NETBIOS?
Some businesses have create an entire industry of outsourcing Exchange
service which need all their customers to be able to use those ports.
http://www.mailstreet.net/MS/urgent.asp

http://dmoz.org/Computers/Software/Groupware/Microsoft_Exchange/

If done properly, those ports are no more or less dangerous than
any other 16-bit port number used for TCP or UDP protocol headers.
But we need to be careful not to make the mistake that just because
we don't use those ports that the protocols aren't useful to other
people.
Even on Windows they can be used in a much safer fashion (although I would 
never attempt it for any of my stuff). It is possible to use IPSec policies 
on 2000 and higher to encrypt all traffic on specified ports to specified 
hosts/networks and block all other traffic. I bet some people are using 
this to join remote locations securely to each other for Windows networking 
with these ports and IPSec policies.

Vinny Abello
Network Engineer
Server Management
[EMAIL PROTECTED]
(973)300-9211 x 125
(973)940-6125 (Direct)
PGP Key Fingerprint: 3BC5 9A48 FC78 03D3 82E0  E935 5325 FBCB 0100 977A
Tellurian Networks - The Ultimate Internet Connection
http://www.tellurian.com (888)TELLURIAN
There are 10 kinds of people in the world. Those who understand binary and 
those that don't.



Re: What do you want your ISP to block today?

2003-09-03 Thread Johannes Ullrich



 Some businesses have create an entire industry of outsourcing Exchange
 service which need all their customers to be able to use those ports.

So should everyone else be required to keep their doors open so they can
offer the service? Who is wrong/right? Millions of vulnerable users that
need some basic protection now, or a few businesses?


-- 
--
Johannes Ullrich [EMAIL PROTECTED]
pgp key: http://johannes.homepc.org/PGPKEYS
--
   We regret to inform you that we do not enable any of the 
security functions within the routers that we install.
 [EMAIL PROTECTED]
--




RE: Distributed sniffer products

2003-09-03 Thread Owen DeLong

OK... I'll leave the XP thing al0wned.
Understood...  It was a quick (and dirty) solution.

How was that any quicker than the same thing running on Linux?
(hint:  XP install time on P4/1.6Ghz/512MB - ~2 hours
RH8.0 install time on same machine - ~30 minutes)
As to the linux solution, why would you bother with VNC
rather than just ssh.  Pull the libpcap file back to a local
desktop for analysis in
ethereal.
SSH works, but it's sometimes nice to have a persistent session that I
can pick back up later (or from a different PC).
That's what screen is for. :-)

Luke

Owen



RE: What do you want your ISP to block today?

2003-09-03 Thread Johannes Ullrich

On Wed, 2003-09-03 at 14:53, Matthew Kaufman wrote:
 I just read the paper... Sounds like as an ISP, I should offer a new product
 The Internet Minus Four Port Numbers Microsoft Can't Handle. What I can't
 tell is whether this should cost more or less than The Internet

Charge the same and take your 'abuse' team out for lunch on the change
you save by blocking the ports ;-)

-- 
--
Johannes Ullrich [EMAIL PROTECTED]
pgp key: http://johannes.homepc.org/PGPKEYS
--
   We regret to inform you that we do not enable any of the 
security functions within the routers that we install.
 [EMAIL PROTECTED]
--




Re: Cisco Service Provider code - Any good?

2003-09-03 Thread Peter E. Fry

Peter E. Fry wrote:

   Looks like bridging (IRB and RBE) is spanky new to the S feature sets
 -- 12.2-14S range, so a 12.0-S load doesn't sound like it'll do the job
 for you.

  Ooops...  RBE is available for the 7500 and IRB for the 7200 in the
late 12.0-S loads, apparently.  Well, that's new and unusual.  Bridging
was unavailable on the 7500 in earlier 12.0-S versions, and I made the
mistake of searching initially for both features at once.

Peter E. Fry


Re: What do you want your ISP to block today?

2003-09-03 Thread William Devine, II

I would think that any company that outsourced exchange services to another
entity would want either a VPN between their two offices or a direct PtP
link.
But I also know that the most logical method is not always understandable to
the pointy haired people.

william

- Original Message - 
From: Sean Donelan [EMAIL PROTECTED]
To: Johannes Ullrich [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Wednesday, September 03, 2003 1:51 PM
Subject: Re: What do you want your ISP to block today?



 On Wed, 3 Sep 2003, Johannes Ullrich wrote:
  I just summarized my thoughts on this topic here:
  http://www.sans.org/rr/special/isp_blocking.php
 
  Overall: I think there are some ports (135, 137, 139, 445),
  a consumer ISP should block as close to the customer as
  they can.

 If ISPs had blocked port 119, Sobig could not have been distributed
 via USENET.


 Perhaps unbelievably to people on this mailing list, many people
 legitimately use 135, 137, 139 and 445 over the open Internet
 everyday. Which protocols do you think are used more on today's
 Internet?  SSH or NETBIOS?

 Some businesses have create an entire industry of outsourcing Exchange
 service which need all their customers to be able to use those ports.

 http://www.mailstreet.net/MS/urgent.asp

 http://dmoz.org/Computers/Software/Groupware/Microsoft_Exchange/

 If done properly, those ports are no more or less dangerous than
 any other 16-bit port number used for TCP or UDP protocol headers.


 But we need to be careful not to make the mistake that just because
 we don't use those ports that the protocols aren't useful to other
 people.







Re: Distributed sniffer products

2003-09-03 Thread ravi pina

On Wed, Sep 03, 2003 at 12:05:06PM -0700, Luke Starrett said at one point in time:
 
 SSH works, but it's sometimes nice to have a persistent session that I
 can pick back up later (or from a different PC).  
 
 Luke


http://www.gnu.org/software/screen/

-r


Re: What do you want your ISP to block today?

2003-09-03 Thread Petri Helenius
Johannes Ullrich wrote:

So should everyone else be required to keep their doors open so they can
offer the service? Who is wrong/right? Millions of vulnerable users that
need some basic protection now, or a few businesses?
 

That depends if you are buying the 100% internet or 99.993% internet 
service.

Pete





RE: Distributed sniffer products

2003-09-03 Thread Joel Jaeggli

On Wed, 3 Sep 2003, Luke Starrett wrote:

 
  OK... I'll leave the XP thing al0wned.
 
 Understood...  It was a quick (and dirty) solution.
 
  As to the linux solution, why would you bother with VNC 
  rather than just ssh.  Pull the libpcap file back to a local 
  desktop for analysis in 
  ethereal.
 
 SSH works, but it's sometimes nice to have a persistent session that I
 can pick back up later (or from a different PC).  

screen
 
 Luke
 

-- 
-- 
Joel Jaeggli   Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2




Re: Distributed sniffer products

2003-09-03 Thread Larry Rosenman


--On Wednesday, September 03, 2003 15:22:55 -0400 ravi pina [EMAIL PROTECTED] 
wrote:

On Wed, Sep 03, 2003 at 12:05:06PM -0700, Luke Starrett said at one point
in time:
SSH works, but it's sometimes nice to have a persistent session that I
can pick back up later (or from a different PC).
Luke


http://www.gnu.org/software/screen/

-r

Does anyone have a *GOOD* screenrc example config?  I was VERY confused by
the info file.
(OT, I know, but...)

LER

--
Larry Rosenman http://www.lerctr.org/~ler
Phone: +1 972-414-9812 E-Mail: [EMAIL PROTECTED]
US Mail: 1905 Steamboat Springs Drive, Garland, TX 75044-6749


Re: What do you want your ISP to block today?

2003-09-03 Thread Johannes Ullrich


 Even on Windows they can be used in a much safer fashion (although I would 
 never attempt it for any of my stuff). It is possible to use IPSec policies 
 on 2000 and higher to encrypt all traffic on specified ports to specified 
 hosts/networks and block all other traffic. I bet some people are using 
 this to join remote locations securely to each other for Windows networking 
 with these ports and IPSec policies.

If you explain the difference between IPSec, The Web to
an end user, and can convince them that they have enough
Pentium for it, you win and don't have to block the ports.

 There are 10 kinds of people in the world. Those who understand binary
 and those that don't.

ISPs should either block the mentioned ports, or send out bills in
binary.



-- 
--
Johannes Ullrich [EMAIL PROTECTED]
pgp key: http://johannes.homepc.org/PGPKEYS
--
   We regret to inform you that we do not enable any of the 
security functions within the routers that we install.
 [EMAIL PROTECTED]
--




Re: What do you want your ISP to block today?

2003-09-03 Thread Owen DeLong


--On Wednesday, September 3, 2003 3:11 PM -0400 Johannes Ullrich 
[EMAIL PROTECTED] wrote:




Some businesses have create an entire industry of outsourcing Exchange
service which need all their customers to be able to use those ports.
So should everyone else be required to keep their doors open so they can
offer the service? Who is wrong/right? Millions of vulnerable users that
need some basic protection now, or a few businesses?
Sorry... Millions of vulnerable users are only vulnerable because those
users chose to run vulnerable systems.  They have the responsibility to
do what is necessary to correct the vulnerabilities in the systems they
chose to run.  I am really tired of the attitude that the rest of the
world should bear the consequences of Micr0$0ft's incompetence/arrogance.
The people who are Micr0$0ft customers should have responsibility to resolve
these issues with Micr0$0ft.  It is nice of ISPs to help when they do.
This is akin to driving a pinto, knowing that it's a bomb, and expecting
your local DOT to build explosion-proof freeways.
Owen

--
--
Johannes Ullrich [EMAIL PROTECTED]
pgp key: http://johannes.homepc.org/PGPKEYS
--
   We regret to inform you that we do not enable any of the
security functions within the routers that we install.
 [EMAIL PROTECTED]
--





Re: What do you want your ISP to block today?

2003-09-03 Thread Johannes Ullrich


 That depends if you are buying the 100% internet or 99.993% internet 
 service.

Well, if '100%' includes all the garbage traffic generated by the
worm d'jeur. On my home cable modem connection, about 80% of the
packets hitting my firewall are 'junk'. Maybe I would be able
to actually share files unencrypted using MSFT file sharing. If I can
manage to inject the necessary traffic between all the Nachia Pings and
Blaster scans.


-- 
--
Johannes Ullrich [EMAIL PROTECTED]
pgp key: http://johannes.homepc.org/PGPKEYS
--
   We regret to inform you that we do not enable any of the 
security functions within the routers that we install.
 [EMAIL PROTECTED]
--




Re: Distributed sniffer products

2003-09-03 Thread Dominic J. Eidson

On Wed, 3 Sep 2003, Larry Rosenman wrote:
 --On Wednesday, September 03, 2003 15:22:55 -0400 ravi pina [EMAIL PROTECTED]
 wrote:
  On Wed, Sep 03, 2003 at 12:05:06PM -0700, Luke Starrett said at one point
  in time:
  SSH works, but it's sometimes nice to have a persistent session that I
  can pick back up later (or from a different PC).
 
  Luke
  http://www.gnu.org/software/screen/
 Does anyone have a *GOOD* screenrc example config?  I was VERY confused by
 the info file.

box:~cat .screenrc
# do not log in new windows
deflogin off

# Annoying bell ON
vbell off

# Bell message so it beeps
bell_msg Activity: %^G

# detach on hangup
autodetach on

# don't display the copyright page
startup_message off

defscrollback 1

# remove some stupid / dangerous key bindings
bind k
bind ^k
bind .
bind ^\
bind \\
bind ^h
bind h

# Re-bind them better.
bind '\\' quit
bind 'K' kill
bind 'I' login on
bind 'O' login off
bind '}' history

-- 
Dominic J. Eidson
Baruk Khazad! Khazad ai-menu! - Gimli
---
http://www.the-infinite.org/  http://www.the-infinite.org/~dominic/



Re: Distributed sniffer products

2003-09-03 Thread Owen DeLong
I haven't had any problems using it without a screenrc.

screen -- Starts new session
screen -r -- resumes old session (won't steal session if active)
screen -r -d -- resumes old session and detaches it if necessary
Beyond that, I use ^A-D (detach) and a few other ^A commands, all of which
are pretty easily documented from ^A-?.
FWIW,

Owen

--On Wednesday, September 3, 2003 2:39 PM -0500 Larry Rosenman 
[EMAIL PROTECTED] wrote:



--On Wednesday, September 03, 2003 15:22:55 -0400 ravi pina
[EMAIL PROTECTED] wrote:
On Wed, Sep 03, 2003 at 12:05:06PM -0700, Luke Starrett said at one point
in time:
SSH works, but it's sometimes nice to have a persistent session that I
can pick back up later (or from a different PC).
Luke


http://www.gnu.org/software/screen/

-r

Does anyone have a *GOOD* screenrc example config?  I was VERY confused by
the info file.
(OT, I know, but...)

LER

--
Larry Rosenman http://www.lerctr.org/~ler
Phone: +1 972-414-9812 E-Mail: [EMAIL PROTECTED]
US Mail: 1905 Steamboat Springs Drive, Garland, TX 75044-6749




RE: Distributed sniffer products

2003-09-03 Thread Brennan_Murphy

The cost benefit analysis on Ethereal/etc vs Sniffer on anything
but the smallest of networks is usually very easy to make.
The fundamental issue is what questions do you have and 
should you have about your network and what tool answers
those questions efficiently and reliably. Good protocol
analyzers sell because they save time in answering important
questions. Sniffer recently released a SMB Sniffer
called Netasyst...worth a look if cost has been an issue
in the past.  So ends this biased response. :-)


-Original Message-
From: Owen DeLong [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, September 03, 2003 2:50 PM
To: Austad, Jay; '[EMAIL PROTECTED]'
Subject: Re: Distributed sniffer products



Etherial and other libpcap tools work reasonably well, can be easily 
deployed
using commodity hardware, and would cost you a lot less than NetAssoc.

Owen


--On Wednesday, September 3, 2003 1:07 PM -0500 Austad, Jay 
[EMAIL PROTECTED] wrote:


 Anyone have any experience with these?  I'm looking for something 
 similar to Network Associates Sniffer product.

 Are there any open source projects that are decent?  What are others 
 using?

 
 Jay Austad
 Senior Network Analyst
 Travelers Express / MoneyGram
 e: [EMAIL PROTECTED] p: 952.591.3779




Re: What do you want your ISP to block today?

2003-09-03 Thread Petri Helenius
Johannes Ullrich wrote:

Well, if '100%' includes all the garbage traffic generated by the
worm d'jeur. On my home cable modem connection, about 80% of the
packets hitting my firewall are 'junk'. Maybe I would be able
to actually share files unencrypted using MSFT file sharing. If I can
manage to inject the necessary traffic between all the Nachia Pings and
Blaster scans.
 

Once upon a time there was a proposal for a protocol which allowed 
clients to
push a filter configuration to the edge router to both classify traffic 
and filter
unneeded things. For reason or another, this supposedly ended in the bit 
bucket?

Pete





Re: What do you want your ISP to block today?

2003-09-03 Thread alex

  Some businesses have create an entire industry of outsourcing Exchange
  service which need all their customers to be able to use those ports.
 
 So should everyone else be required to keep their doors open so they can
 offer the service? Who is wrong/right? Millions of vulnerable users that
 need some basic protection now, or a few businesses?

If a user needs protection, it is up to user to get it. 

It is just like one wants to go and screw everyone who walks past him/her,
it is up to him/her to make sure that he/she uses condoms, not for everyone
else.


Alex



Re: What do you want your ISP to block today?

2003-09-03 Thread Johannes Ullrich


 Once upon a time there was a proposal for a protocol which allowed 
 clients to
 push a filter configuration to the edge router to both classify traffic 
 and filter
 unneeded things. 

Nice idea. I am sure clients will figure that out. As quickly as they
caught on to 'Windows Update' and 'Setting up a VCR clock'. Lets face
it: Some things are better left to the experts.



-- 
--
Johannes Ullrich [EMAIL PROTECTED]
pgp key: http://johannes.homepc.org/PGPKEYS
--
   We regret to inform you that we do not enable any of the 
security functions within the routers that we install.
 [EMAIL PROTECTED]
--




Re: What do you want your ISP to block today?

2003-09-03 Thread alex

  Even on Windows they can be used in a much safer fashion (although I would 
  never attempt it for any of my stuff). It is possible to use IPSec policies 
  on 2000 and higher to encrypt all traffic on specified ports to specified 
  hosts/networks and block all other traffic. I bet some people are using 
  this to join remote locations securely to each other for Windows networking 
  with these ports and IPSec policies.
 
 If you explain the difference between IPSec, The Web to
 an end user, and can convince them that they have enough
 Pentium for it, you win and don't have to block the ports.

That is rubbish. Users do not care about IPSec. Neither do they care about
anything else but having everything work. 

  There are 10 kinds of people in the world. Those who understand binary
  and those that don't.
 
 ISPs should either block the mentioned ports, or send out bills in
 binary.

I encourage my competitors to block as many ports as they possibly can,
breaking as many applications as they possibly can, since I would gladly
take have their users to pay me money to provide the service.

Alex



Re: Distributed sniffer products

2003-09-03 Thread -


Have a look at http://www.isr.net/
Right side, are a bunch of links.
cheers,
-Bert


Re: What do you want your ISP to block today?

2003-09-03 Thread Johannes Ullrich


 No.  ISPs should not block ports unless they are listed in the AUP as
 non-permitted traffic or it is a necessary and temporary remedial action
 for a service-affecting problem.  

I fully agree that ISPs should include the list of blocked ports in
their AUP. (somewhere in the paper it mentions the confusion caused by
uncoordinated filters).

 I still do not understand why a manufacturer is permitted to release a
 product which causes such harm, and, rather than hold that manufacturer
 liable, so many people feel that the entire rest of the world should
 change to accommodate that one manufacturer's deficiencies

But should the end user pay for the faults? They already pay
for the software and the Internet connection. How many ISPs on this list
provide support for non-MSFT operating systems? Does the free CD you
hand out run on anything but Windows?

90% + of internet users do use MSFT Windows. So I don't think you have a
choice other than to live with it.


-- 
--
Johannes Ullrich [EMAIL PROTECTED]
pgp key: http://johannes.homepc.org/PGPKEYS
--
   We regret to inform you that we do not enable any of the 
security functions within the routers that we install.
 [EMAIL PROTECTED]
--




Re: What do you want your ISP to block today? [OT]

2003-09-03 Thread Gabriel
Owen,

Owen DeLong wrote:
Sorry... Millions of vulnerable users are only vulnerable because those
users chose to run vulnerable systems.  They have the responsibility to
do what is necessary to correct the vulnerabilities in the systems they
chose to run. 
Most of them don't know any better than to run what they've got.  Computer 
users, by and in large, are not at all educated in the nature of what their 
running, or the potential issues due to running Windows.  Who tells them 
that they shouldn't run Windows?

This is akin to driving a pinto, knowing that it's a bomb, and expecting
your local DOT to build explosion-proof freeways.
Your analogy is flawed.  The problem is, most people don't realize that:
1.) Windows is as flawed as it is,
2.) That there are real alternatives.
But, I suspect, this has gone far off the topic of Operations.  Take this 
off-list; there's nothing to be gained from this discussion any further.

ObOperational:
Did anybody see some strange latency on UU.Net yesterday in the Chicago area?
Gabriel

--
Gabriel Cain   www.dialupusa.net
Systems Administrator  [EMAIL PROTECTED]
Dialup USA, Inc.888-460-2286 ext 208
PGP Key ID: 2B081C6D
PGP fingerprint:   C0B4 C6BF 13F5 69D1 3E6B CD7C D4C8 2EA4 2B08 1C6D
Beware he who would deny you access to information,
for in his heart he dreams himself your master.




RE: Distributed sniffer products

2003-09-03 Thread Braun, Mike

We've been playing with Wildpackets http://www.wildpackets.com/.  They sniff
LAN to Gig and some WAN as well.  The Distributed model is still vaporware,
but is said to be out soon.  The expert analysis is comparable if not better
than NAI.  

Mike Braun 

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Wednesday, September 03, 2003 1:02 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: RE: Distributed sniffer products



The cost benefit analysis on Ethereal/etc vs Sniffer on anything
but the smallest of networks is usually very easy to make.
The fundamental issue is what questions do you have and 
should you have about your network and what tool answers
those questions efficiently and reliably. Good protocol
analyzers sell because they save time in answering important
questions. Sniffer recently released a SMB Sniffer
called Netasyst...worth a look if cost has been an issue
in the past.  So ends this biased response. :-)


-Original Message-
From: Owen DeLong [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, September 03, 2003 2:50 PM
To: Austad, Jay; '[EMAIL PROTECTED]'
Subject: Re: Distributed sniffer products



Etherial and other libpcap tools work reasonably well, can be easily 
deployed
using commodity hardware, and would cost you a lot less than NetAssoc.

Owen


--On Wednesday, September 3, 2003 1:07 PM -0500 Austad, Jay 
[EMAIL PROTECTED] wrote:


 Anyone have any experience with these?  I'm looking for something 
 similar to Network Associates Sniffer product.

 Are there any open source projects that are decent?  What are others 
 using?

 
 Jay Austad
 Senior Network Analyst
 Travelers Express / MoneyGram
 e: [EMAIL PROTECTED] p: 952.591.3779




Re: What do you want your ISP to block today?

2003-09-03 Thread Christopher L. Morrow


On Wed, 3 Sep 2003, Johannes Ullrich wrote:



  Once upon a time there was a proposal for a protocol which allowed
  clients to
  push a filter configuration to the edge router to both classify traffic
  and filter
  unneeded things.

 Nice idea. I am sure clients will figure that out. As quickly as they
 caught on to 'Windows Update' and 'Setting up a VCR clock'. Lets face
 it: Some things are better left to the experts.


you mean like 'using a computer' ?


Re: What do you want your ISP to block today?

2003-09-03 Thread Petri Helenius
Johannes Ullrich wrote:

90% + of internet users do use MSFT Windows. So I don't think you have a
choice other than to live with it.
 

I wonder if there would be a market for Windows Outside ISP.

Pete






Re: What do you want your ISP to block today?

2003-09-03 Thread Johannes Ullrich


 you mean like 'using a computer' ?

hehe... yes! if you insert the word securely at the end.

Case in point: I helped my neighbor last weekend to diagnose a printer
issue. Another problem he had was that his computer always rebooted
and never shut down. He just never read/understood the shutdown dialog
and it never ocured to him that the radio buttons do anything.

Its hard these days. But I HIGHLY recommend for everyone to get out of
your server closets, enjoy the sun, and talk to non-techies once in a
while. Or: spend a couple hours answering the front end customer support
calls if you can't remember where you parked your car.
 


-- 
--
Johannes Ullrich [EMAIL PROTECTED]
pgp key: http://johannes.homepc.org/PGPKEYS
--
   We regret to inform you that we do not enable any of the 
security functions within the routers that we install.
 [EMAIL PROTECTED]
--




Re: On the back of other 'security' posts....

2003-09-03 Thread Scott Francis
On Sun, Aug 31, 2003 at 02:34:28PM -0700, [EMAIL PROTECTED] said:
[snip]
 What you are saying works only so long as none of your edge connections
 represent a significant portion of the internet.  How do you anti-spoof,
 for example, a peering link with SPRINT or UUNET?  It's not realistic
 to think that you know which addresses could or could not legitimately
 come from them.

another poster wrote that the spoofed traffic he was seeing was coming from
0.0.0.4 - 40.0.0.0 in .4 increments ... simple bogon filtering would get rid
of a good chunk of that space. Granted, it's a small subset of anti-spoof
filtering, but there are still networks out there that don't even make _that_
best effort.

If folks would simply make the best effort they could, given their situation,
the Internet as a whole would be a dramatically nicer place. That best effort
will vary greatly by situation, but even a partial attempt is better than
none at all.
-- 
Scott Francis || darkuncle (at) darkuncle (dot) net
  illum oportet crescere me autem minui


pgp0.pgp
Description: PGP signature


Re: What do you want your ISP to block today?

2003-09-03 Thread Randy Bush

 Sorry... Millions of vulnerable users are only vulnerable
 because those users chose to run vulnerable systems.

no, they chose to run popular/... systems.  they do not know
what vulnerable means, let alone how to judge it.  pinto owners
did not make a conscious choice of buying a bomb.

randy



Re: What do you want your ISP to block today?

2003-09-03 Thread Rob Thomas

Hi, Johannes.

] Its hard these days. But I HIGHLY recommend for everyone to get out of
] your server closets, enjoy the sun, and talk to non-techies once in a
] while. Or: spend a couple hours answering the front end customer support
] calls if you can't remember where you parked your car.

While non-techies can be a support challenge, I find the greatest
challenges and demands come from the very techie customers.  These
are the same customers that don't want to hear the outage happened
because we put a new filter on the peering router...to protect you
from outages caused by worms!

Although it sounds logical to say some filters are better than no
filters, this presumes that some filters have no adverse side
effects.  We all know better.  Bugs aren't restricted only to
products from Redmond, typos happen, and the performance hit can
be quite painful.  You say that putting these filters in place
will reap financial reward?  Where is the data to support that
theory?  Most contracts include credit or refund clauses if the
link goes down or if the performance doesn't meet a certain level.
Failure to meet these clauses results in credits to the customer,
refund to the customer, or the customer leaving for a competitor.
Convincing a business to take a risk - a *fiscal* risk - isn't as
easy as saying this will stop worms.  All of the cost data I've
seen related to worms is either clearly overblown or is based on
a paucity of data.  I'm not saying these things don't have a cost;
I am saying that the cost hasn't been realistically quantified.

Of course all of this is hand-waving until the market places
security above other requirements, such as increased performance
and shiny new features.

Thanks,
Rob.
-- 
Rob Thomas
http://www.cymru.com
ASSERT(coffee != empty);



Re: What do you want your ISP to block today?

2003-09-03 Thread Gerardo Gregory

But should the end user pay for the faults? 
The end user is angry because lashing out at the manufacturer gets you 
routed to a null interface  :) 

why should the ISP pay? (Now that is the question) 

They already pay
for the software and the Internet connection. 
Do you call Microsoft when your internet connection is down? (msn.net 
customers exempted) 

How many ISPs on this list
provide support for non-MSFT operating systems? Does the free CD you
hand out run on anything but Windows?
I think they only support their application (the one they want you to 
dial-in with) over this operating system, nothing else (meaning the OS 
itself and this is mostly for residential users, nothing was given to me 
when I had my last optical circuit handed over...wait let me check...nope 
nothing). 

90% + of internet users do use MSFT Windows. So I don't think you have a
choice other than to live with it.
Wow only 10% of internet connected systems are other than...!! 

I think that it is ridiculous to expect the ISP now to start filtering these 
ports.  The internet in itself is nothing more than a communications link, 
and the ISP's are providers to this link.  The purpose of which is the 
exchange of information over a public medium. 

You want an ISP to begin filtering at the 4th layer (OSI Reference...yikes), 
why  Besides alleviating the headaches of some users of a specific 
manufacturers product, it makes no sense. 

What would you filter?  Before you filter you need a policy in place.  For 
this idea to even be effective you would need a policy that is acceptable 
among all ISP's, (HA HA HA). Next you need all ISP's to implement these 
policies consistently and equally throughout their infrastructure (scary). 

Now you go back to your firewall logs and poof!  Still allot of junk 
(different junk, but nonetheless junk)  You think it will stop there 
Human nature is suitable for adaptation...now what??? More 
filters..makes no senseso there will be no more free exchange of 
information over a public medium? 

Since only 90% of internet users use MSFT Windows we should make it a 
Microsoft friendly network then.  Plug and Play your heart out!! 

G. 

Johannes Ullrich writes: 

 

No.  ISPs should not block ports unless they are listed in the AUP as
non-permitted traffic or it is a necessary and temporary remedial action
for a service-affecting problem.  
I fully agree that ISPs should include the list of blocked ports in
their AUP. (somewhere in the paper it mentions the confusion caused by
uncoordinated filters). 

I still do not understand why a manufacturer is permitted to release a
product which causes such harm, and, rather than hold that manufacturer
liable, so many people feel that the entire rest of the world should
change to accommodate that one manufacturer's deficiencies
But should the end user pay for the faults? They already pay
for the software and the Internet connection. How many ISPs on this list
provide support for non-MSFT operating systems? Does the free CD you
hand out run on anything but Windows? 

90% + of internet users do use MSFT Windows. So I don't think you have a
choice other than to live with it. 

--
--
Johannes Ullrich [EMAIL PROTECTED]
pgp key: http://johannes.homepc.org/PGPKEYS
--
   We regret to inform you that we do not enable any of the 
security functions within the routers that we install.
 [EMAIL PROTECTED]
-- 




Gerardo A. Gregory
Manager Network Administration and Security
402-970-1463 (Direct)
402-850-4008 (Cell)

Affinitas - Latin for Relationship
Helping Businesses Acquire, Retain, and Cultivate
Customers
Visit us at http://www.affinitas.net 



RE: What do you want your ISP to block today?

2003-09-03 Thread David Schwartz


  Once upon a time there was a proposal for a protocol which allowed
  clients to
  push a filter configuration to the edge router to both classify traffic
  and filter
  unneeded things.

 Nice idea. I am sure clients will figure that out. As quickly as they
 caught on to 'Windows Update' and 'Setting up a VCR clock'. Lets face
 it: Some things are better left to the experts.

If the clients don't figure it out, they get the default, which can be as
permissive or as restrictive as make sense for people who can't figure out
how to control filtering.

DS




Re: What do you want your ISP to block today?

2003-09-03 Thread Petr Swedock

Rob Thomas [EMAIL PROTECTED] writes:

   ;; Hi, Johannes.
   ;; 
   ;; ] Its hard these days. But I HIGHLY recommend for everyone to get out of
   ;; ] your server closets, enjoy the sun, and talk to non-techies once in a
   ;; ] while. Or: spend a couple hours answering the front end customer support
   ;; ] calls if you can't remember where you parked your car.
   ;; 
   ;; While non-techies can be a support challenge, I find the greatest
   ;; challenges and demands come from the very techie customers.  


YES! Often it's the case that they A) don't fully understand the
problem but B) feel they have the perfect solution anyways.  
non-techies will defer to your judgement, demi-techies will 
require bulletproof reasoning for not doing things their way. I
hate when that happens. Especially when the reasoning is indeed
suboptimal and not by (my) choice or under my control. 

Peace,

Petr


Re: What do you want your ISP to block today?

2003-09-03 Thread Johannes Ullrich


 While non-techies can be a support challenge, I find the greatest
 challenges and demands come from the very techie customers. These
 are the same customers that don't want to hear the outage happened
 because we put a new filter on the peering router...to protect you
 from outages caused by worms!

The paper talks about consumers defined as home users or small
business without dedicated IT staff. These filters should be clearly
stated as part of the subscriber agreement. Many filter problems are
the result of inconsistent and rushed implementation.

 You say that putting these filters in place
 will reap financial reward?  Where is the data to support that
 theory?  

I admit: I do not have hard numbers. But all the calls to support
about slow connections, or dealing with all the abuse@ complaints
has to cost something.

 Most contracts include credit or refund clauses if the
 link goes down or if the performance doesn't meet a certain level.

given that (a) the customer knows ahead of time about the blocked
port, and (b) blocking the port may actually reduce the impact
of the occasional worm, your argument proofs that there may be
a financial benefit.

  All of the cost data I've
 seen related to worms is either clearly overblown or is based on
 a paucity of data.  I'm not saying these things don't have a cost;
 I am saying that the cost hasn't been realistically quantified.

yes. I am not using any of these numbers to support my issue.
But answering support calls, handing out refunds, and dealing
with abuse email does cost money.

 such as increased performance and shiny new features.

Well, performance should if anything improve. At this point, my cable
modem which I use for regular web browsoing is seeing about 80%
unsolicited traffic. Not that the bandwidth impact is huge. But I
rather use it to speed up my pr0n downloads then to waste it on
pings/port 135 probes/arp storms...

And someone is paying to move all these packets across the wire. After
all: Thats what we all agree on. We are paying ISPs to move packets.

-- 
--
Johannes Ullrich [EMAIL PROTECTED]
pgp key: http://johannes.homepc.org/PGPKEYS
--
   We regret to inform you that we do not enable any of the 
security functions within the routers that we install.
 [EMAIL PROTECTED]
--




ethernet-based temperature sensors

2003-09-03 Thread matthew zeier


I know this has been mentioned before, but other than NetBotz (too pricey),
what are people use as ethernet-based, SNMP-probable temp sensors?

I very simply need to trend temp with cricket/mrtg in various parts of the
data center.  Looking for real-world experience.

Thanks.

--
matthew zeier - Curiosity is a willing, a proud, an eager confession
of ignorance. - Leonard Rubenstein



CalPOP contact? HTTP CONNECT scanning

2003-09-03 Thread Jeroen Massar

-BEGIN PGP SIGNED MESSAGE-

As people are complaining all around about ISP's,
here is my small question. Who has a _working_ contact at
CalPOP (216.240.128.0/19 and others). It is not in puck :(

If anybody has a working one please mail it me offlist so
that the following long version of the problem can be solved.

Is there anything alive at CalPOP that doesn't try
to abuse open proxies for massively spamming hotmail ?

These are the hits from Sep 3rd:

216.240.140.204 - - [03/Sep/2003:06:27:15 +0200] CONNECT 65.54.253.99:25 HTTP/1.0 
200 2366 - -
216.240.140.204 - - [03/Sep/2003:06:27:17 +0200] CONNECT 65.54.167.5:25 HTTP/1.0 200 
2366 - -
216.240.140.204 - - [03/Sep/2003:06:27:19 +0200] CONNECT 65.54.253.230:25 HTTP/1.0 
200 2366 - -
216.240.140.204 - - [03/Sep/2003:06:27:20 +0200] CONNECT 65.54.167.230:25 HTTP/1.0 
200 2366 - -
216.240.140.204 - - [03/Sep/2003:06:27:22 +0200] CONNECT 65.54.254.151:25 HTTP/1.0 
200 2366 - -
216.240.140.204 - - [03/Sep/2003:06:27:24 +0200] CONNECT 65.54.252.99:25 HTTP/1.0 
200 2366 - -
216.240.140.204 - - [03/Sep/2003:06:27:25 +0200] CONNECT 65.54.254.145:25 HTTP/1.0 
200 2366 - -
216.240.140.204 - - [03/Sep/2003:06:27:26 +0200] CONNECT 65.54.252.230:25 HTTP/1.0 
200 2366 - -
216.240.140.204 - - [03/Sep/2003:06:27:26 +0200] CONNECT 65.54.254.140:25 HTTP/1.0 
200 2366 - -
216.240.140.204 - - [03/Sep/2003:06:27:28 +0200] CONNECT 65.54.254.145:25 HTTP/1.0 
200 2366 - -
216.240.140.204 - - [03/Sep/2003:06:27:29 +0200] CONNECT 65.54.252.230:25 HTTP/1.0 
200 2366 - -
216.240.140.204 - - [03/Sep/2003:06:27:30 +0200] CONNECT 65.54.254.140:25 HTTP/1.0 
200 2366 - -

Since 29 Sep they did that 13007 times to the same box.
Quite persistent apparently as previously at 10-15 August
they used 216.240.129.201 + .205 to hit that box for another
17502 times and that one stopped mysteriously after mailing
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED] (as shown in whois).
Unfortunatly without any reply whatsoever and apparently
they are continuing to scan for open http connect proxies.

I know the 200 response should indicate a CONNECT succes.
But unfortunatly if one loads up an apache2 with PHP suddenly
it starts passing _all_ methods to PHP which nicely responds a 200.
But it is perfect for logging some nice data from the wanna-be-spammer.
Limit CONNECTDeny from all/Limit solves that ofcourse but that
spammer needs to go, but the contacts don't work. This acts as a
perfect spamtrap honeypot btw especially as they keep trying.

Before anyone asks the IP being hit is on a DSL line so they are
quite probably scanning all the DSL networks for open proxies.

Greets,
 Jeroen

-BEGIN PGP SIGNATURE-
Version: Unfix PGP for Outlook Alpha 13 Int.
Comment: Jeroen Massar / [EMAIL PROTECTED] / http://unfix.org/~jeroen/

iQA/AwUBP1aErymqKFIzPnwjEQJy9QCfSQep7SBrrZ6xaQySWJ/LTwgqFNEAoKkB
TErNe82mRJXd5JyoLMneYEVw
=xLmY
-END PGP SIGNATURE-



Re: Anyone here from Earthlink?

2003-09-03 Thread chuck goolsbee

Please contact me offlist. Normal contact methodologies have 
failed, and a problem is now four days old.
Thanks for the swift replies from Earthlink/Mindspring staff (three!)

Problem still ongoing, but at least we are talking/working on it now.



Regards,
--
Chuck Goolsbee  V.P. Technical Operations
_
digital.forest  Phone: +1-877-720-0483, x2001
where Internet solutions grow  Int'l: +1-425-483-0483
19515 North Creek ParkwayFax: +1-425-482-6871
Suite 208   http://www.forest.net
Bothell, WA 98011email: [EMAIL PROTECTED]


What were we saying about edge filtering?

2003-09-03 Thread Matthew Sullivan
Hi All,

More whining and bitching from me ... sorry...

So who thinks allowing anyone to route to or from IANA Reserved blocks 
(Bogons) is acceptable?

A few captured packets

15:42:41.434384 1.6.145.24.1116  203.101.254.254.53: S 
2056192000:2056192000(0) win 16384
15:42:41.570812 1.6.145.161.1043  203.101.254.254.53: S 
773455872:773455872(0) win 16384
15:42:41.678862 1.6.147.198.1505  203.101.254.254.53: S 
424280064:424280064(0) win 16384
15:42:41.985075 1.6.148.115.1448  203.101.254.254.53: S 
1675624448:1675624448(0) win 16384
15:42:42.045121 1.6.148.202.1467  203.101.254.254.53: S 
2072117248:2072117248(0) win 16384
15:42:42.528080 1.6.151.121.1180  203.101.254.254.53: S 
1363410944:1363410944(0) win 16384
15:42:42.851633 1.6.153.101.1904  203.101.254.254.53: S 
786563072:786563072(0) win 16384
15:42:42.908956 1.6.153.158.1712  203.101.254.254.53: S 
1205272576:1205272576(0) win 16384
15:42:43.564536 1.6.157.75.1864  203.101.254.254.53: S 
1150615552:1150615552(0) win 16384
15:42:43.653790 1.6.157.220.1882  203.101.254.254.53: S 
209584128:209584128(0) win 16384
15:42:43.900861 1.6.159.103.1172  203.101.254.254.53: S 
1935015936:1935015936(0) win 16384
15:42:44.247869 1.6.161.53.1045  203.101.254.254.53: S 
1374552064:1374552064(0) win 16384
15:42:44.247936 1.6.161.140.1877  203.101.254.254.53: S 
1761083392:1761083392(0) win 16384
15:42:44.388279 1.6.162.58.1230  203.101.254.254.53: S 
1534263296:1534263296(0) win 16384
15:42:44.583169 1.6.163.23.1584  203.101.254.254.53: S 
467271680:467271680(0) win 16384
15:42:44.653624 1.6.163.168.1091  203.101.254.254.53: S 
1094844416:1094844416(0) win 16384
15:42:44.960670 1.6.166.33.1953  203.101.254.254.53: S 
517210112:517210112(0) win 16384
15:42:45.323007 1.6.167.182.1541  203.101.254.254.53: S 
417857536:417857536(0) win 16384
15:42:45.558600 1.6.168.235.1603  203.101.254.254.53: S 
1652490240:1652490240(0) win 16384
15:42:45.588731 1.6.169.36.1581  203.101.254.254.53: S 
1524498432:1524498432(0) win 16384
15:42:45.618207 1.6.170.39.1591  203.101.254.254.53: S 
271319040:271319040(0) win 16384
15:42:47.164426 1.6.178.177.1159  203.101.254.254.53: S 
879689728:879689728(0) win 16384
15:42:47.379603 1.6.179.231.1331  203.101.254.254.53: S 
1859256320:1859256320(0) win 16384
15:42:47.979871 1.6.183.72.1516  203.101.254.254.53: S 
1277362176:1277362176(0) win 16384
15:42:48.249871 1.6.184.215.1945  203.101.254.254.53: S 
718929920:718929920(0) win 16384
15:42:48.581342 1.6.186.166.1478  203.101.254.254.53: S 
889782272:889782272(0) win 16384
15:42:48.638018 1.6.187.54.1372  203.101.254.254.53: S 
1532952576:1532952576(0) win 16384
15:42:48.803879 1.6.188.47.1253  203.101.254.254.53: S 
1614348288:1614348288(0) win 16384
15:42:48.910837 1.6.188.191.1872  203.101.254.254.53: S 
164429824:164429824(0) win 16384
15:42:49.014086 1.6.189.22.1078  203.101.254.254.53: S 
1580924928:1580924928(0) win 16384

And a few more
13:31:16.215267 255.205.43.12.1146  203.101.254.254.53: S 
1909522432:1909522432(0) win 16384
13:31:16.225790 254.255.110.156.1934  203.101.254.254.53: S 
843513856:843513856(0) win 16384
13:31:16.255373 255.205.9.178.1040  203.101.254.254.53: S 
1741881344:1741881344(0) win 16384
13:31:16.297785 255.64.58.64.1759  203.101.254.254.53: S 
832634880:832634880(0) win 16384
13:31:16.365988 255.64.58.47.1057  203.101.254.254.53: S 
1301217280:1301217280(0) win 16384
13:31:16.375685 254.255.111.56.1351  203.101.254.254.53: S 
2103771136:2103771136(0) win 16384
13:31:16.397829 254.255.110.157.1513  203.101.254.254.53: S 
1743912960:1743912960(0) win 16384
13:31:16.562945 254.255.111.57.1137  203.101.254.254.53: S 
1048379392:1048379392(0) win 16384
13:31:16.586507 255.64.58.106.1017  203.101.254.254.53: S 
1919811584:1919811584(0) win 16384
13:31:16.607479 254.255.110.158.1400  203.101.254.254.53: S 
1749942272:1749942272(0) win 16384
13:31:16.633489 255.64.58.118.1783  203.101.254.254.53: S 
1790640128:1790640128(0) win 16384
13:31:16.669888 255.64.58.130.1871  203.101.254.254.53: S 
223608832:223608832(0) win 16384
13:31:16.727705 255.205.44.169.1309  203.101.254.254.53: S 
1294270464:1294270464(0) win 16384
13:31:16.769538 255.205.11.113.1578  203.101.254.254.53: S 
386662400:386662400(0) win 16384
13:31:16.804433 254.255.111.58.1724  203.101.254.254.53: S 
1657602048:1657602048(0) win 16384
13:31:16.804552 255.64.58.195.1374  203.101.254.254.53: S 
1183514624:1183514624(0) win 16384
13:31:16.838304 254.255.110.159.1749  203.101.254.254.53: S 
2041905152:2041905152(0) win 16384
13:31:16.854785 255.205.45.24.1962  203.101.254.254.53: S 
980942848:980942848(0) win 16384
13:31:16.891851 255.64.58.189.1145  203.101.254.254.53: S 
1588723712:1588723712(0) win 16384
13:31:16.907291 255.205.45.101.1850  203.101.254.254.53: S 
281804800:281804800(0) win 16384
13:31:16.926608 255.64.58.199.1491  203.101.254.254.53: S 
396623872:396623872(0) win 16384
13:31:16.960441 255.64.58.240.1647  203.101.254.254.53: S 
1321926656:1321926656(0) win 16384