Network security practices survey

2006-12-09 Thread Sean Donelan


On Fri, 8 Dec 2006, Fergie wrote:

Sorry for the top-post, but wanted to retain context here.

Also, sorry for the specific product mention, but much of is
mentioned below is something that we are doing with ICSS/BASE:

http://www.trendmicro.com/en/products/nss/icss/evaluate/overview.htm


In addition to Trend Micro, there are several other vendors and open
source projects.  A good overview of what is being used is available at

http://resnetsymposium.org/surveys/2006securitysurvey.htm



Re: How to pick a Site-Local Scope multi cast address

2006-12-09 Thread Marshall Eubanks


Hello;

I think that pretty much everything John Kristoff said was spot on,  
especially to thank you for asking.


Unfortunately, there is no general method for doing this except to  
use your GLOP address, if you have one, and that is not really  
appropriate for site-local work. Madcap and MZAP were implemented  
into Windows, but I have never heard of them being used.


If you look at
http://www.iana.org/assignments/multicast-addresses
it says that
239.255.000.000-239.255.255.255 Site-Local Scope 
[Meyer,RFC2365]
should be used for site local scope, but I know that that is not  
really followed much either.


So, my advice is

- pick something at random from 239.255/16
- let us know what it is
- give the user a config file or some other means to change it if  
they have too.


I would be glad to collect and maintain a list of site-local  
multicast addresses, but I have no illusions that

such a list would be complete. It would be worth doing, however.

If you really feel that this is something where there will be  
millions deployed, contact me offlist and we

can discuss getting an address from IANA.

Hope this helped, and, again, thank you for asking.

Regards
Marshall Eubanks

On Dec 8, 2006, at 10:54 AM, Dave Raskin wrote:



Hello, I have been directed to this list by IANA when I asked the
following question:



I am researching ways of device/machine discovery on the
network. This
 is similar to the Discovery phase of UPnP devices, which uses the  
SSDP

 protocol.

I have researched far enough to know that my best bet for UDP
 multicast address group is the Site-Local Scope address range of

  239.255.000.000-239.255.255.255

 SSDP and UPnP protocols use the address 239.255.255.250

 My question is this:

  How do I pick a group address within this range and not have a
chance of colliding with some other application on the network already
using the group  address I just picked?


Do I just randomly pick an address in that range and hope for
the best? I am running on Windows and cannot assume that there is a
MADCAP server available.



Thanks in advance!

Dave Raskin
Rimage Corporation




Re: DNS - connection limit (without any extra hardware)

2006-12-09 Thread Hank Nussbacher


On Fri, 8 Dec 2006, Petri Helenius wrote:


Has anyone figured out a remote but lawful way to repair zombie machines?

Pete


Virtual patching.

-Hank


Re: Best Email Time

2006-12-09 Thread Alexander Harrowell

This account sees something over 10x more spam than genuine traffic, almost
all of which is autofiltered.

On 12/9/06, Rich Kulawiec <[EMAIL PROTECTED]> wrote:



On Fri, Dec 08, 2006 at 07:50:57AM -0500, David Hester wrote:
> CNN recently reported that 90% of all email on the internet is spam.
> http://www.cnn.com/2006/WORLD/europe/11/27/uk.spam.reut/index.html

CNN is behind the times.  We passed 90% junk (spam, viruses, bogus virus
warnings, worms, outscatter spam, C/R spam, etc.) a few years ago.
Locally, over the last three months, we've been rejecting > 98% of
incoming
traffic with just two reported problems from internal and external users.

And almost all of that rejected traffic TCP-fingerprints as originating
from hosts running Windows.

---Rsk



Re: Best Email Time

2006-12-09 Thread Rich Kulawiec

On Fri, Dec 08, 2006 at 07:50:57AM -0500, David Hester wrote:
> CNN recently reported that 90% of all email on the internet is spam.
> http://www.cnn.com/2006/WORLD/europe/11/27/uk.spam.reut/index.html

CNN is behind the times.  We passed 90% junk (spam, viruses, bogus virus
warnings, worms, outscatter spam, C/R spam, etc.) a few years ago.
Locally, over the last three months, we've been rejecting > 98% of incoming
traffic with just two reported problems from internal and external users.

And almost all of that rejected traffic TCP-fingerprints as originating
from hosts running Windows.

---Rsk


Re: repair zombie machines (was: DNS - connection limit)

2006-12-09 Thread william(at)elan.net



On Fri, 8 Dec 2006, Jim Popovitch wrote:


On Fri, 2006-12-08 at 19:56 +0200, Petri Helenius wrote:

Has anyone figured out a remote but lawful way to repair zombie machines?


Very interesting question.  I personally believe that OS EULAs and ISP
ToS guidelines provide for an ISP or an OS mfg (i.e. Microsoft) to force
updates and fixes via any means.  That is: if I am your customer and my
PC/router/USB-Camera/whatever is throwing crap your way, crap that
violates your ToS or indicates that I am out of compliance with an EULA,
then I believe others have the right (and IMHO the obligation) to step
in and correct things (it's what parents do for their kids everyday).
So, according to me, any corrective action is lawful when dealing with
customers and equipment that have violated an EULA or ToS guidelines.


Sending updates in automated way or forcing updates is only ok if
person previously authorized such action, i.e. enabled automated
updates. This is in fact dangerous in itself since it also presents
single point of potential failure if system providing updates is
itself compromised - that is why many choose not to do it
and enterprises setup their own updates distribution systems.

As far as your question, in my opinion it would be legal for you to
check if somebody did or did not do an update but only using tools
that check publicly available data reported from the system (i.e.
what you can gather by sending it packets to open ports). As an
ISP it would be legal for you to warn customer that if they fail
to install an update you reserve the right to disconnect their
system or limit access to certain ports or only to certain sites
(i.e. your own for them to check email but nothing else). And
obviously once issue is reported to you (i.e. their machine is
spewing and compromised), that is exactly what you should do.


Just my $.02.  ;-)


Due to inflation with US currency I'll make it a nickel $.05 :)

--
William Leibzon
Elan Networks
[EMAIL PROTECTED]