Re: FW: Worms versus Bots

2004-05-07 Thread Alexei Roudnev
Nothing (except a good spanking -:)) can help in such case. We are not talking about static NAT and inbound connections. I told about dynamic PNAT _only_. > > Once upon a time, Alexei Roudnev <[EMAIL PROTECTED]> said: > > Any simple NAT (PNAT, to be correct) box decrease a chance of infection by

RE: FW: Worms versus Bots

2004-05-07 Thread Michel Py
>> The problem is that Joe User (or his kid) wants to run >> some random P2P program without having to reconfigure >> NAT port mappings, so they have all inbound connections >> mapped to a static internal IP. > If Joe (L)User or his kid sets up his NAT that way... > well, quite honestly he gets

Re: FW: Worms versus Bots

2004-05-07 Thread Jeff Shultz
** Reply to message from Chris Adams <[EMAIL PROTECTED]> on Fri, 7 May 2004 09:45:36 -0500 > Once upon a time, Alexei Roudnev <[EMAIL PROTECTED]> said: > > Any simple NAT (PNAT, to be correct) box decrease a chance of infection by > > last worms to 0. Just 0.%. > > The problem is that Joe Us

Re: FW: Worms versus Bots

2004-05-07 Thread Chris Adams
Once upon a time, Alexei Roudnev <[EMAIL PROTECTED]> said: > Any simple NAT (PNAT, to be correct) box decrease a chance of infection by > last worms to 0. Just 0.%. The problem is that Joe User (or his kid) wants to run some random P2P program without having to reconfigure NAT port mappings,

Re: FW: Worms versus Bots

2004-05-06 Thread Alexei Roudnev
Any simple NAT (PNAT, to be correct) box decrease a chance of infection by last worms to 0. Just 0.%. O course, it does not protects very well from intentional attacks, and do not protect against e-mail bombs and java script exploints. In reality, having WIN2K after NAT box 100% time connecte

Re: FW: Worms versus Bots

2004-05-05 Thread Robert E. Seastrom
"william(at)elan.net" <[EMAIL PROTECTED]> writes: > > Hmmm, are you saying that the solution to many so-called > > Internet security vulnerabilities is for people to > > use an SI Firewall, aka Simple, Inexpensive Firewall, > > aka Stateful Inspection Firewall? > > Its not a real solution, its

RE: FW: Worms versus Bots

2004-05-05 Thread william(at)elan.net
On Wed, 5 May 2004 [EMAIL PROTECTED] wrote: > > (To deflect the inevitable "NAT is not a firewall" complaints, the box > is a > > stateful inspection firewall -- as all NAT boxes actually are). > > Hmmm, are you saying that the solution to many so-called > Internet security vulnerabilities i

RE: FW: Worms versus Bots

2004-05-05 Thread Michael . Dillon
> (To deflect the inevitable "NAT is not a firewall" complaints, the box is a > stateful inspection firewall -- as all NAT boxes actually are). Hmmm, are you saying that the solution to many so-called Internet security vulnerabilities is for people to use an SI Firewall, aka Simple, Inexpensiv

RE: FW: Worms versus Bots now religion host security vs firewall/nat/acl

2004-05-04 Thread Michel Py
> Smith, Donald wrote: > Feel free to read the document and make suggestions > (within scope) for improvements. I would change the title to something like "install windows xp and all updates securely". The current title misleads the reader into thinking that (s)he could actually use the computer

RE: FW: Worms versus Bots now religion host security vs firewall/nat/acl

2004-05-04 Thread Smith, Donald
CTED] > Subject: RE: FW: Worms versus Bots > > > > >The goal of this document is help new XP users survive long > enough to > >do their updates. Many of them cant/wont put up > acls/nat/firewalls ... > >but if they follow the steps listed they have a be

RE: FW: Worms versus Bots

2004-05-04 Thread Rob Nelson
The goal of this document is help new XP users survive long enough to do their updates. Many of them cant/wont put up acls/nat/firewalls ... but if they follow the steps listed they have a better chance of successfully downloading and updating their new machine then they will have with OUT these s

RE: FW: Worms versus Bots

2004-05-04 Thread Michel Py
> Smith, Donald wrote: > The goal of this document is help new XP users > survive long enough to do their updates. It is regrettable though that no mention is made of real personal firewalls such as ZoneAlarm (ICF has no egress control whatsoever). Although the intentions behind this document are

RE: FW: Worms versus Bots

2004-05-04 Thread Daniel Senie
13 111.2 > -Original Message- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On > Behalf Of Daniel Senie > Sent: Tuesday, May 04, 2004 9:39 AM > To: Sean Donelan > Cc: [EMAIL PROTECTED] > Subject: RE: FW: Worms versus Bots > > > > At 10:54 AM 5/4/2004, S

RE: FW: Worms versus Bots

2004-05-04 Thread Smith, Donald
; Behalf Of Daniel Senie > Sent: Tuesday, May 04, 2004 9:39 AM > To: Sean Donelan > Cc: [EMAIL PROTECTED] > Subject: RE: FW: Worms versus Bots > > > > At 10:54 AM 5/4/2004, Sean Donelan wrote: > > >On Tue, 4 May 2004, Smith, Donald wrote: > > > If y

RE: FW: Worms versus Bots

2004-05-04 Thread Smith, Donald
Message- > From: Sean Donelan [mailto:[EMAIL PROTECTED] > Sent: Tuesday, May 04, 2004 8:55 AM > To: Smith, Donald > Cc: [EMAIL PROTECTED] > Subject: RE: FW: Worms versus Bots > > > On Tue, 4 May 2004, Smith, Donald wrote: > > If you follow these steps outlined by SANS yo

RE: FW: Worms versus Bots

2004-05-04 Thread Daniel Senie
At 10:54 AM 5/4/2004, Sean Donelan wrote: On Tue, 4 May 2004, Smith, Donald wrote: > If you follow these steps outlined by SANS you should be able to > successfully update > and NOT get infected. This is short, easy, fully documented (with > pictures :) > http://www.sans.org/rr/papers/index.php?id=

RE: FW: Worms versus Bots

2004-05-04 Thread Sean Donelan
On Tue, 4 May 2004, Smith, Donald wrote: > If you follow these steps outlined by SANS you should be able to > successfully update > and NOT get infected. This is short, easy, fully documented (with > pictures :) > http://www.sans.org/rr/papers/index.php?id=1298 The risk is smaller, but still exis

RE: FW: Worms versus Bots

2004-05-04 Thread Smith, Donald
EDCC pgpFingerPrint:9CE4 227B B9B3 601F B500 D076 43F1 0767 AF00 EDCC kill -13 111.2 > -Original Message- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On > Behalf Of Henry Linneweh > Sent: Tuesday, May 04, 2004 2:19 AM > To: Eric Krichbaum; [EMAIL PROTECTED] >

Re: FW: Worms versus Bots

2004-05-04 Thread Henry Linneweh
It is amazingly simply to pull an ethernet cable out of the back of your box to update a box from a CD especially in a suspect environment where you have had many problems. I have had the displeasure of having had to go from box to box and clean each individually and while many problems were

FW: Worms versus Bots

2004-05-03 Thread Eric Krichbaum
I see times more typically in the 5 - 10 second range to infection. As a test, I unprotected a machine this morning on a single T1 to get a sample. 8 seconds. If you can get in 20 minutes of downloads you're luckier than most. Eric -Original Message- From: [EMAIL PROTECTED] [mailto:[