When you say ''We have now blocked 135, 136, 137, 138, 139, 445, and 593
in and out bound ports at our main router.''

Do you blocked all protocol or only a few......TCP,UDP,ICMP. ???

Which protocol should I block ???





-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Virtual North
Sent: Wednesday, November 26, 2003 1:07 PM
To: [EMAIL PROTECTED]
Subject: Re: [smartBridges] Virus attacks


I had to deal with this just recently.

Shut down there link to your AP works ;-)

Blaster, Nachi and there variants are the problem. They first rearly
there ugly heads but put out a flood of ICMP echo's on the systems.  I
can watch in on our router .... the port it spoofs are 256 and 512 but
we can't block ICMP traffic on the router so ...

The ICMP flood will bring your network to a crawl and cause other
customers connections to drop right off. These ping echoes are looking
for a new machine to infect - each ping probes an ip and the next probes
that next ip up from that. Once the virus finds a vulnerable machine it
THEN connects through ports 135 or 445 to pass the infection along.

If the virus is already on your network then as soon as someone connects
a new computer (sans service packs) it often gets infected before the
service packs can be applied.

We have now blocked 135, 136, 137, 138, 139, 445, and 593 in and out
bound ports at our main router.

Outgoing ports 135 and 445 can be blocked at the customers end too. Its
especially easy with windows 2003 server. I don't know about the cheaper
routers though.

Software firewalls can help too. eg. the free version of ZoneAlarm can
be installed on the infected machine since zone alarm, unlike many of
cheaper hardware firewalls in broadband routers will block unauthorized
outgoing traffic. ZoneAlarm for example once loaded will report the
dllhost.exe (the infected file) is trying to assess the network - it
should not be allow through.

One of my customers running an older system reports the ZoneAlarm seem
to be bogging it down.

The bottom line is that the viruses have to be cleaned off immediately,
a outbound firewall installed, or your customer should be disconnected
until they remove the virus.

Others may have some clarifications or other insights into this.

I hope this helps

Dan Good
Virtual North Inc.


----- Original Message ----- 
From: "John K. McReynolds" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, November 26, 2003 10:00 AM
Subject: Re: [smartBridges] Virus attacks


> Andrew,
> When you say it brings your network down, does it reduce it to a crawl

> or
does
> it effect the signal coming from the AP (effectively making the AP
"beacon" for
> a while, on/off/on/off, then lose signal from the AP totally)?  We are
having
> similar issues and I am having one heck of a time figuring out what is

> happening...
>
> Thanks,
>
> JOHN
>
> Quoting Andrew Goble <[EMAIL PROTECTED]>:
>
><x>

The PART-15.ORG smartBridges Discussion List
To Join: mailto:[EMAIL PROTECTED] (in the body type subscribe
smartBridges <yournickname> To Remove: mailto:[EMAIL PROTECTED] (in
the body type unsubscribe smartBridges)
Archives: http://archives.part-15.org




The PART-15.ORG smartBridges Discussion List
To Join: mailto:[EMAIL PROTECTED] (in the body type subscribe smartBridges 
<yournickname>
To Remove: mailto:[EMAIL PROTECTED] (in the body type unsubscribe smartBridges)
Archives: http://archives.part-15.org

Reply via email to