RE: verifying an open or closed port on an ip address

2003-08-14 Thread Jason Coombs
you can't determine conclusively whether a port is 'open' from a remote location. what actions does your CPU take when bits arrive on an exposed network interface? If you don't know, then you can't tell whether a port is open. judging a port to be 'open' because it responds to the TCP 3-way handsha

RE: Critical/Security Updates as well as other Patch Management

2003-03-13 Thread Jason Coombs
update and the client-side code that talks to windowsupdate.com are still present when SUS is used. Jason Coombs [EMAIL PROTECTED] -Original Message- From: Jed Needle [mailto:[EMAIL PROTECTED] Sent: Tuesday, March 11, 2003 12:24 PM To: [EMAIL PROTECTED] Subject: RE: Critical/Security

RE: PATRIOT Act IT Security guidelines

2002-11-16 Thread Jason Coombs
can't expect an infosec novice to do security work and get it right the first time." -Original Message----- From: Jason Coombs [mailto:[EMAIL PROTECTED]] Sent: Friday, November 15, 2002 10:11 AM To: RD D; [EMAIL PROTECTED] Subject: RE: PATRIOT Act IT Security guidelines My bank recently i

RE: PATRIOT Act IT Security guidelines

2002-11-16 Thread Jason Coombs
rate their patriotism, and the way they finance it. Sincerely, Jason Coombs [EMAIL PROTECTED] -Original Message- From: RD D [mailto:[EMAIL PROTECTED]] Sent: Tuesday, November 12, 2002 8:15 AM To: [EMAIL PROTECTED] Subject: PATRIOT Act IT Security guidelines Hello All -- I have been resea

RE: Risk of using SS#s (last 4 digits) for authentication

2002-11-12 Thread Jason Coombs
> That prohibits government agencies from requiring that a person give his/her > SSN as a condition of receiving the agency's services The U.S. Supreme Court rejected this assertion in BOWEN v. ROY, 476 U.S. 693 (1986) -Original Message- From: Griff Palmer [mailto:gpalmer@;palmermania.com

RE: Risk of using SS#s (last 4 digits) for authentication

2002-11-09 Thread Jason Coombs
serve to "rob the spirit" of his daughter and prevent her from attaining greater spiritual power.' http://caselaw.lp.findlaw.com/cgi-bin/getcase.pl?court=us&vol=476&invol=693 If you listen carefully, you can almost hear your spirit being robbed every moment of every day by the m

RE: NetBIOS Messenger spam - how did it get in?

2002-10-29 Thread Jason Coombs
For #1 you make a large assumption: that routes between you and the attacker have all implemented source address filtering of RFC 1918 local network addresses. Chances are they have not. See http://online.securityfocus.com/archive/1/287129 Also, what about this: From: Graham, Randy (RAW) [mailto:

RE: Strange traceroute output on Road Runner for an RFC 1918 address

2002-07-22 Thread Jason Coombs
ses represent a security risk. Individual nodes that don't route traffic for a LAN over the link should block all traffic to and from these addresses. Sincerely, Jason Coombs [EMAIL PROTECTED] -Original Message- From: Burton M. Strauss III [mailto:[EMAIL PROTECTED]] Sent: Monday, July

RE: Digital Signatures

2002-07-22 Thread Jason Coombs
Aloha, I suggest you start with a review of the basics. Read about RSA and DSS. Here's a link to DSS: Digital Signature Standard http://csrc.nist.gov/publications/fips/fips186-2/fips186-2.pdf Sincerely, Jason Coombs [EMAIL PROTECTED] -Original Message- From: [EMAIL PROT

RE: Cracking Servers W/O open ports: Packet Filter Firewall

2002-07-12 Thread Jason Coombs
rensically makes a big difference. What forensics tools are you using? How do you know the tool has not itself been compromised? Perhaps more importantly, how do you know, and how can you PROVE, that the tool has no open ports? Sincerely, Jason Coombs [EMAIL PROTECTED] -Original Message- F

RE: DMZ Arguments....

2002-07-05 Thread Jason Coombs
olicited packets from the outside world, connected to another network or subnet protected by a firewall configured to deny all inbound traffic except for TCP packets that pertain to stateful sessions initiated by hosts inside the protected LAN. Sincerely, Jason Coombs [EMAIL PROTECTED] -Original

RE: strong encryption - governments denying individuals the right to use

2002-04-29 Thread Jason Coombs
- argument seem more informed than the pro- argument. The debate about "strong" encryption must include a discussion of what "strong" means, for strong is relative and even subjective. Sincerely, Jason Coombs [EMAIL PROTECTED] -Original Message- From: Jay D. Dy

RE: Session Hijacking

2002-04-25 Thread Jason Coombs
bility to eavesdrop or masquerade so there is no damage done. Aloha & Mahalo, Jason Coombs [EMAIL PROTECTED] -Original Message- From: Jason Coombs [mailto:[EMAIL PROTECTED]] Sent: Wednesday, April 24, 2002 9:56 AM To: Thad Horak Cc: [EMAIL PROTECTED] Subject: RE: Session Hijacking

RE: Session Hijacking

2002-04-25 Thread Jason Coombs
lays the SSL-secured MITM. Good luck. We all need it. Jason Coombs [EMAIL PROTECTED] -Original Message- From: Thad Horak [mailto:[EMAIL PROTECTED]] Sent: Tuesday, April 23, 2002 1:08 PM To: [EMAIL PROTECTED] Subject: Session Hijacking All, A peer recently told me that the a netwo