Hello Doug,

Actually that's not true. Any one of the aforementioned protocols can
fill the queue with ~76 packets. 


Dave Gilmore
Information Security Analyst

--
Intrusense - Securing Business As Usual


-----Original Message-----
From: DOUGLAS GULLETT [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, July 23, 2003 3:16 PM
To: Alvaro Gordon-Escobar
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: Cisco Workaround


I don't think you have to put all the access-list in.  I believe that 
the hack requires a certain combination of packets to the four ports, 
so leaving one or two of them open should still prevent the hack.  That 
might be a good question for Cisco TAC...they should be willing to help 
even if you "misplaced" your SmartNet contract information.  ;-)

Doug



----- Original Message -----
From: Alvaro Gordon-Escobar <[EMAIL PROTECTED]>
Date: Wednesday, July 23, 2003 10:15 am
Subject: Cisco Workaround

> will this access list modification prevent my internal DNS server
> from updates to it self from my telco's DNS server?
> 
> access-list 101 deny 53 any any
> access-list 101 deny 55 any any
> access-list 101 deny 77 any any
> access-list 101 deny 103 any any
> !--- insert any other previously applied ACL entries here
> !--- you must permit other protocols through to allow normal
> !--- traffic -- previously defined permit lists will work
> !--- or you may use the permit ip any any shown here access-list 101 
> permit ip any any
> 
> Thanks in advance
> 
> ~alvaro Escobar
> 
> -------------------------------------------------------------------
> --------
> -------------------------------------------------------------------
> ---------
> 
> 



---------------------------------------------------------------------------
----------------------------------------------------------------------------

Reply via email to