Re: The Internet's Immune System

2003-11-12 Thread Johannes Ullrich
bradsby -- -- Johannes Ullrich [EMAIL PROTECTED] pgp key: http://johannes.homepc.org/PGPKEYS -- We regret to inform you that we do not enable any

Re: What do you want your ISP to block today?

2003-09-03 Thread Johannes Ullrich
lists like these are not average home users. Most of us here have seen a DOS prompt at some point and know about Service Packs and Hotfixes. -- -- Johannes Ullrich [EMAIL PROTECTED] pgp key: http://johannes.homepc.org

Re: What do you want your ISP to block today?

2003-09-03 Thread Johannes Ullrich
some basic protection now, or a few businesses? -- -- Johannes Ullrich [EMAIL PROTECTED] pgp key: http://johannes.homepc.org/PGPKEYS -- We regret

RE: What do you want your ISP to block today?

2003-09-03 Thread Johannes Ullrich
your 'abuse' team out for lunch on the change you save by blocking the ports ;-) -- -- Johannes Ullrich [EMAIL PROTECTED] pgp key: http://johannes.homepc.org/PGPKEYS

Re: What do you want your ISP to block today?

2003-09-03 Thread Johannes Ullrich
. There are 10 kinds of people in the world. Those who understand binary and those that don't. ISPs should either block the mentioned ports, or send out bills in binary. -- -- Johannes Ullrich [EMAIL PROTECTED] pgp

Re: What do you want your ISP to block today?

2003-09-03 Thread Johannes Ullrich
files unencrypted using MSFT file sharing. If I can manage to inject the necessary traffic between all the Nachia Pings and Blaster scans. -- -- Johannes Ullrich [EMAIL PROTECTED] pgp key: http://johannes.homepc.org

Re: What do you want your ISP to block today?

2003-09-03 Thread Johannes Ullrich
' and 'Setting up a VCR clock'. Lets face it: Some things are better left to the experts. -- -- Johannes Ullrich [EMAIL PROTECTED] pgp key: http://johannes.homepc.org/PGPKEYS

Re: What do you want your ISP to block today?

2003-09-03 Thread Johannes Ullrich
MSFT Windows. So I don't think you have a choice other than to live with it. -- -- Johannes Ullrich [EMAIL PROTECTED] pgp key: http://johannes.homepc.org/PGPKEYS

Re: What do you want your ISP to block today?

2003-09-03 Thread Johannes Ullrich
can't remember where you parked your car. -- -- Johannes Ullrich [EMAIL PROTECTED] pgp key: http://johannes.homepc.org/PGPKEYS -- We regret to inform

Re: What do you want your ISP to block today?

2003-09-03 Thread Johannes Ullrich
. -- -- Johannes Ullrich [EMAIL PROTECTED] pgp key: http://johannes.homepc.org/PGPKEYS -- We regret to inform you that we do not enable any of the security functions within the routers

Re: dcom worm released

2003-08-07 Thread Johannes Ullrich
to be true.. I haven't seen any code yet but-- http://lists.netsys.com/pipermail/full-disclosure/2003-August/007717.html -- -- Johannes Ullrich [EMAIL PROTECTED] pgp key: http://johannes.homepc.org/PGPKEYS

Re: Abuse.cc ???

2003-04-03 Thread Johannes Ullrich
On Thu, 3 Apr 2003 10:05:55 -0500 McBurnett, Jim [EMAIL PROTECTED] wrote: I just made a number of abuse complaints to a provider and then after contacting the abuse #. I got told that they don't use abuse@ anymore. that abuse.cc is the new email address. Correct me if I am wrong,

Re: Syn Flood

2003-03-25 Thread Johannes Ullrich
I would look for something like an IRC bot. Zonealarm may not catch it if it is on there for a while and some user 'permitted' it at some point. Usually, these bots have names to sound like system binaries. Anti virus software may not catch the agent. Do you have any full packet captures from

Re: OT: Notebooks /w a serial port?

2003-03-21 Thread Johannes Ullrich
My (1 year old) Dell Inspiron 8100 has a serial port. And I believe the later Inspiron models still have them. On Fri, 21 Mar 2003 16:36:46 -0500 Dave Israel [EMAIL PROTECTED] wrote: Seems like these are all but extinct, but does anyone know of a 'new' notebook that has a serial

Re: Port 445 issues (was: Port 80 Issues)

2003-03-09 Thread Johannes Ullrich
Are other people having problems with this right now? There doesn't seem to be very much traffic or information about this on any of the security lists (it is Sunday...). The last posted URL points to an impending storm... Other operators opinions about blocking port 445 before this

Re: Homeland Security Alert System

2003-02-22 Thread Johannes Ullrich
ISPs and other communication providers should be prepared to share information directly and quickly with each other. If you wait to hear from government officials to decide what sanitized information to share, it will be hours later. If ever. If anybody is interested here, I did put

Re: [Re: [Re: M$SQL cleanup incentives]]

2003-02-21 Thread Johannes Ullrich
On the other hand, Timeline's case is YEARS old and they are going after treble damages from companies who just took Microsoft's word that there was nothing to worry about. Some people should be VERY nervous, indeed. Thats the part that worries me greatly. This general idea may apply to a

Re: scripts to map IP to AS?

2003-02-20 Thread Johannes Ullrich
There are still 10K-20K hosts spewing M$SQL slammer/sapphire packets, and I'd like to start blocking routing to those irresponsible AS's that haven't blocked their miscreant customers. Its too early for such harsh measures. Unless you can live without most major consumer ISPs. I don't

Re: scripts to map IP to AS?

2003-02-20 Thread Johannes Ullrich
Then you'd better reach over to all of your upstream routers and just pull the plug, since you are likely to see Sapphire packets from here on in, on a regular basis. Better is to do the whois lookup and send pre-formatted e-mail about the infected server as people did after Code-Red.

Re: Tracing where it started

2003-01-26 Thread Johannes Ullrich
+-+ | 216.069.032.086 | Kentucky Community and Technical College System | 066.223.041.231 | Interland | 216.066.011.120 | Hurricane Electric | 216.098.178.081 | V-Span, Inc. +-+ HE.net seems to be a reoccuring theme. (I speak to evil of them --

Re: 1434 traffic

2003-01-25 Thread Johannes Ullrich
What I'm seeing from on my personal network connections is a lot of traffic to udp port 1434 start at 05:30:08 UTC. I did some graphing of reports we got to DShield/ISC up to 9am EST. http://isc.sans.org/port1434start.gif The part that amazes me is the speed. It saturated within 1 minute!

Re: Tracing where it started

2003-01-25 Thread Johannes Ullrich
Here are the IPs I got at 5:29:40 GMT, the time I got 10 packets / second +-+ | source | +-+ | 216.069.032.086 | Kentucky Community and Technical College System | 066.223.041.231 | Interland | 216.066.011.120 | Hurricane Electric | 216.098.178.081 |

Re: FW: Re: Is there a line of defense against Distributed Reflective attacks?

2003-01-19 Thread Johannes Ullrich
*shrug* just seems like it would make more sense to block all incoming 'syn' packets. Wouldn't that be faster than inspecting the destination port against two seperate rules? blocking all SYN's will break too much other stuff (Instant Messangers, games ...). I think we would be much better

Re: Scaled Back Cybersecuruty

2003-01-14 Thread Johannes Ullrich
i've had absolutely no luck getting the source isp's to care about the problems i've seen at my home firewall in recent weeks. (see below if you wonder whether i'm implicating anyone here.) there's no other way to view the internet than as a worm-infested zombie. hehe... I know the

Re: Arin Smack down?

2002-11-21 Thread Johannes Ullrich
Perhaps something I've mised, but is ARIN.Net no longer handling lookups? I usually use them to find offending users but got this when doing a lookup. No match for 64.124.168.60 I did have the same problem yesterday (Wednesday). Looks like it is working today. Maybe some leftover bug from

Re: Even the New York Times withholds the address

2002-11-19 Thread Johannes Ullrich
http://www.nytimes.com/2002/11/19/nyregion/19FUEL.html ... While almost everyone on this list knows which building is the subject of the article, we can discuss the issue without discussing the particular building. On-site fuel storage is one of those double-edge swords. The article is

Re: Even the New York Times withholds the address

2002-11-19 Thread Johannes Ullrich
Even if you assume 100% efficiency, the tank is still going to me, um, rather largish. That's what happens if you forget a ';-)' ... ;-) -- [EMAIL PROTECTED] Collaborative Intrusion Detection

Re: Attacker Data / Wall of Shame

2002-11-05 Thread Johannes Ullrich
On Tue, 5 Nov 2002 14:25:59 -1000 Michael Painter [EMAIL PROTECTED] wrote: - Original Message - From: Daniel Senie [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Tuesday, November 05, 2002 1:51 PM Subject: Attacker Data / Wall of Shame We have had enough regular attacks on

Re: Standalone Stratum 1 NTP Server

2002-08-28 Thread Johannes Ullrich
BTW: A rather complete list of NTP products: http://www.eecis.udel.edu/~ntp/hardware.html Some low price products from random browsing through the list $ 1,400 http://www.zyfer.com/products/prod_index.html $ 380 http://www.gpsclock.com/specs.html (looks like serial output only..) --

Re: Dave Farber comments on Re: Major Labels v. Backbones

2002-08-17 Thread Johannes Ullrich
The record labels don't want to give you that choice. If you read the complaint you'll notice the record companies never attempted to contact the immediate upstream ISP in China. ... rant opinion=mine Well, maybe the record industry doesn't want to interfere with the 'anti-copy'

Re: Dshield.org

2002-07-28 Thread Johannes Ullrich
I do not recommend adding every IP listed at DShield to your filter /understatement. I took a short while to peruse the data collected and distributed by DShield. I don't believe I need to go into the many reasons (I'm sure you know yourself) why this information is completely

Re: Requirement to store email for 90 days.

2002-07-22 Thread Johannes Ullrich
From the same URL: The bill encourages ISPs to report suspicious activity on their networks (whatever that might be), even if it poses no immediate threat, and shield them from lawsuits from anyone so just forward the spam to the authorities... after all, it is suspicous. Maybe some Al

Re: Arbor Networks DoS defense product

2002-05-17 Thread Johannes Ullrich
Unfortunately, things like TCP ECN and ICMP 'Frag Needed' are often considered funny packets. I know ECN etc have been used to evade firewalls but afaik have not been known in and of themselves to compromise or crash hosts or make them do any funny things besides dropping the packets