Dealing with port scanners / attackers

1999-12-21 Thread Eric
I'm getting kind of tired of sending reports of port scans and attempted break-ins to people who don't really seem interested in doing something about the problem. I always ask them to keep me informed about how they deal with those responsible, but very few have the courtesy to actually

Re: Dealing with port scanners / attackers

1999-12-21 Thread Jim Littlefield
On Tue, Dec 21, 1999 at 01:47:22AM -0600, Eric wrote: I'm getting kind of tired of sending reports of port scans and attempted break-ins to people who don't really seem interested in doing something about the problem. I always ask them to keep me informed about how they deal with those

firewall identification

1999-12-21 Thread Interpaul
Hello list, In the office network we have a UNIX firewall server. At the moment it is impossible the use ICQ and RealAudio etc on our NT network. I don't know of we have a SOCKS firewall or a differt one, nor do I know ports of the firewall. Can anyone show me how I could find this out? My

RE: Dealing with port scanners / attackers

1999-12-21 Thread sethw
Sounds like a really good idea Eric. However, I doubt that it's legal. -- From: Eric[SMTP:[EMAIL PROTECTED]] Sent: Tuesday, December 21, 1999 12:47 AM To: [EMAIL PROTECTED] Subject: Dealing with port scanners / attackers I'm getting kind of tired of

Re: Dealing with port scanners / attackers

1999-12-21 Thread Jeff Bachtel
A few problems with that: 1) Sometimes portscans aren't malicious, that is I (at least) have used quick scans to determine services that a remote host provides, ie anon ftp and whatnot. 2) (big one) any ISP worth its salt will set its border routers to reject packets with obviously forged

Re: Dealing with port scanners / attackers

1999-12-21 Thread Eric
"Parker, Gary W" wrote: Retaliation is not the proper response to attacks, real or perceived. Remember that you propose to spoof the attacker's address in your response. The attack itself could well have been made using a spoofed address, and you will in effect be further victimizing someone

Re: Dealing with port scanners / attackers

1999-12-21 Thread Gary Flynn
Jim Littlefield wrote: When filing complaints, I make it very clear that we will not accept a lack of response from them and we will blackhole their network at our router, should they choose to ignore our complaint. If they are not a top-level provider, I also Cc their provider. You're

RE: Dealing with port scanners / attackers

1999-12-21 Thread Parker, Gary W
Eric Johnson [EMAIL PROTECTED] said ... I'm getting kind of tired of sending reports of port scans and attempted break-ins ... So something else is needed. Suppose we ... spoof the source address and perform a port scan against the port scanner's ISP? ... the ISP would see a port

Reverse SSL proxy

1999-12-21 Thread Dave Wreski
Hi all. I'd like to look into the security implications of proxying SSL from the Internet thru a firewall to a server on an internal network. I understand that other protocols have been tunnelled thru SSL besides just http, but what are the other issues involved? Are there any documents on

Firewall market

1999-12-21 Thread Laurent Butti
Hello, Does anyone has information (or URLs) about market penetration of firewalls by vendors by countries, in percentage of course ? Thank you in advance. Laurent Butti. - [To unsubscribe, send mail to [EMAIL PROTECTED] with "unsubscribe firewalls" in the body of the message.]

RE: Dealing with port scanners / attackers

1999-12-21 Thread Randall, Mark
Suppose we set up a firewall that, when it detects a port scan, would spoof the source address and perform a port scan against the port scanner's ISP? That way, the ISP would see a port scan coming from one of his own customers and would be more likely to take an active interest in

OT : root wrong shell

1999-12-21 Thread simon
HI all, I'm in some trouble. I have a sun os but I change the shell of the root user to a none existent shell. now, I could not su to root. root:x:0:1:Super-User:/:/sbin/csh patyi:x:106:20:Patrick Yi:/export/home/patyi:/bin/csh Is there a way I can regain root access. bach% su - Password:

Re: Dealing with port scanners / attackers

1999-12-21 Thread Marc Renner
Jim Littlefield [EMAIL PROTECTED] 12/21 5:22 AM When filing complaints, I make it very clear that we will not accept a lack of response from them and we will blackhole their network at our router, should they choose to ignore our complaint. If they are not a top-level provider, I also Cc their

Re: Dealing with port scanners / attackers

1999-12-21 Thread Marc Renner
But on the other hand, if THEY are a business (which most internet enabled networks are), they lose a lot of business if everyone starts blackholing them... Marc.. Gary Flynn [EMAIL PROTECTED] 12/21 7:10 AM Jim Littlefield wrote: When filing complaints, I make it very clear that we will

Doubleclick, Altavista cookies

1999-12-21 Thread O'Shea, Dave
Actually I think this is a very significant concern. I am surprised that Doubleclick or someone similar has not already been subpoenaed in a civil case for some cause or other. If I were a plaintiff's attorney in, say, a sexual harassment/hostile environment case, I would seek a record of any

Re: Dealing with port scanners / attackers

1999-12-21 Thread Eric
"Paul D. Robertson" wrote: In that case, they'd probably be more interested in putting a stop to you, and you'd perhaps run afoul of the law if you hit one of their customer's machines. I'd recommend against it. Also, if they source spoofed, you'd be scanning a bunch of other networks that

Re: Dealing with port scanners / attackers

1999-12-21 Thread Paul D. Robertson
On Tue, 21 Dec 1999, Eric wrote: I'm getting kind of tired of sending reports of port scans and attempted break-ins to people who don't really seem interested in doing something about the problem. I always ask them to keep me informed about how they deal with those responsible, but

RE: Dealing with port scanners / attackers

1999-12-21 Thread Parker, Gary W
Eric Johnson [EMAIL PROTECTED] said ... "Parker, Gary W" wrote: Retaliation is not the proper response to attacks, real or perceived. Remember that you propose to spoof the attacker's address in your response. The attack itself could well have been made using a spoofed address, and you

JuicyFruit DoubleClick Stun

1999-12-21 Thread dreamwvr
hi Chris, it has been a long while. anyways hmm.. it would be interesting to see the reaction if Doubleclick was put under the scope as intel was with the pentium III for privacy and invasion thereof.. i bet the privacy.orgs would have a hay day with this info.. it would depend thou

apache as rev-proxy and certs

1999-12-21 Thread rich
Hi, I have, what I hope is a simple question. (But why would I ask the wizards if it was *grin*) Can it be done -- use Apache as a rev-proxy in front of an MS IIS server that uses CERTS and is it's own CA. This is for a SSL site with Apache in front, but I am trying to figure out who needs to

Re: OT : root wrong shell

1999-12-21 Thread diphen
try su - -c /correct/shell -g On Tue, Dec 21, 1999 at 10:52:20PM +0800, simon wrote: HI all, I'm in some trouble. I have a sun os but I change the shell of the root user to a none existent shell. now, I could not su to root. root:x:0:1:Super-User:/:/sbin/csh

Re: Dealing with port scanners / attackers

1999-12-21 Thread Adam Shostack
On Tue, Dec 21, 1999 at 09:08:09AM -0600, Eric wrote: | I'm not clear on what a port scan accomplishes with a spoofed address | unless it is just to make you think you're being scanned from elsewhere. | If you're being scanned from a spoofed address, then whoever is trying to | find a

Re: ports 6671 6771

1999-12-21 Thread Nuno Guarda
At 12:51 21-12-1999 -0500, you wrote: What are ports 6671 6771 used for? Last night someone felt the need to check both of these ports three times each, alternating between the two. I verified that I am not running any services there, but I am curious. I found 6771 is used for DeepThroat, but

Re: OT : root wrong shell

1999-12-21 Thread Nuno Guarda
At 22:52 21-12-1999 +0800, you wrote: HI all, I'm in some trouble. I have a sun os but I change the shell of the root user to a none existent shell. now, I could not su to root. root:x:0:1:Super-User:/:/sbin/csh patyi:x:106:20:Patrick Yi:/export/home/patyi:/bin/csh Is there a way I can

RE: Dealing with port scanners / attackers

1999-12-21 Thread Mullen, Patrick
I'm not clear on what a port scan accomplishes with a spoofed address unless it is just to make you think you're being scanned from elsewhere. If you're being scanned from a spoofed address, then whoever is trying to find a vulnerability will never know the result, right? Except, of

Urgent Help with Microsoft Proxy Server

1999-12-21 Thread Arkady Yerukhimovich
Does any one know if it is possible to set up Microsoft Proxy server on a machie that only has one network adapter? Please e-mail me at [EMAIL PROTECTED] if you know how to do this. Thank you very much, Arkady Yerukhimovich __ Get Your

Re: Dealing with port scanners / attackers

1999-12-21 Thread Nuno Guarda
At 09:08 21-12-1999 -0600, you wrote: "Parker, Gary W" wrote: Retaliation is not the proper response to attacks, real or perceived. Remember that you propose to spoof the attacker's address in your response. The attack itself could well have been made using a spoofed address, and you will in

Re: firewall identification

1999-12-21 Thread Paul D. Robertson
On Tue, 21 Dec 1999, Interpaul wrote: Hello list, In the office network we have a UNIX firewall server. At the moment it is impossible the use ICQ and RealAudio etc on our NT network. I don't know of we have a SOCKS firewall or a differt one, nor do I know ports of the firewall. It

Re: Dealing with port scanners / attackers

1999-12-21 Thread Eric
Jeff Bachtel wrote: A few problems with that: 1) Sometimes portscans aren't malicious, that is I (at least) have used quick scans to determine services that a remote host provides, ie anon ftp and whatnot. But then the services you are trying to find are not BackOrifice or other

Re: 2 IP addresses in one corporate/local network?

1999-12-21 Thread gatekeepr
SIPRNET - Original Message - From: Jimi Aleshin [EMAIL PROTECTED] To: Ken Milder [EMAIL PROTECTED] Cc: firewall-lista [EMAIL PROTECTED] Sent: Sunday, December 19, 1999 4:29 PM Subject: Re: 2 IP addresses in one corporate/local network? Well their secret network called the SIPERNET (I

Re: Dealing with port scanners / attackers

1999-12-21 Thread Paul D. Robertson
On Tue, 21 Dec 1999, Eric wrote: "Paul D. Robertson" wrote: In that case, they'd probably be more interested in putting a stop to you, and you'd perhaps run afoul of the law if you hit one of their customer's machines. I'd recommend against it. Also, if they source spoofed, you'd be

RE: firewall identification

1999-12-21 Thread Paul D. Robertson
On Tue, 21 Dec 1999, Kevin Eberman wrote: I wouldn't want to argue the business merits of ICQ, but what protocol would you use for real time one-to-one text communication? ICQ is not supported Internally I like to use IRC servers, we use two to talk between my group's two predominant

RE: Urgent Help a simple firewall question added.

1999-12-21 Thread Michael E. Cummins
I know you said *one* network adapter, but I assume you are implying that the machine has one NIC and a modem. Is this correct? If that is, then there is nothing special to do. Just install the thing, connect the proxy server to the internet and then setup the clients. That doesn't have much

Re: Dealing with port scanners / attackers

1999-12-21 Thread Paul D. Robertson
On Tue, 21 Dec 1999, Eric wrote: How about just running a port scan against whoever is portscanning you. If someone sees port scans coming from a system they are trying to break into, it would hopefully scare them off. A lot of times scans are done from an already compromised host, *if*

root wrong shell

1999-12-21 Thread simon
Hi all, I like to thank all who helped me with the afore mentioned problem. Most of the advices given were based on a sun box. However, I do not know how to boot into single user mode from cdrom as the SUn os is on an intel box. Has anybody installed or has any experience with sun os on an

Re: OT : root wrong shell

1999-12-21 Thread simon
I do not know how to boot into a single user using cdrom as the sun os is on a INTEL box. I tried the command and it doesn't work bach% su -c /bin/csh su: Unknown id: /bin/csh Please HELP !! [EMAIL PROTECTED] wrote: try su - -c /correct/shell -g On Tue, Dec 21, 1999 at 10:52:20PM +0800,

Re: Dealing with port scanners / attackers

1999-12-21 Thread John Stewart
During the past three years, I have contacted the sysadmins at five sites and provided them with a brief log extract. Four sites provided feedback that the offender had their account revoked. The 5th site was untraceable to the source as it was a computer lab at a major university and I

RE: firewall identification

1999-12-21 Thread Kevin Eberman
I wouldn't want to argue the business merits of ICQ, but what protocol would you use for real time one-to-one text communication? ICQ is not supported by our SonicWall DMZ router, but if it's possible, I'd like to get something else working. Regrards, Kevin -Original Message- From:

Re: Dealing with port scanners / attackers

1999-12-21 Thread liviu
Hi I have a problem with PPPD. On a slack 3.5 system it connects to my ISP just fine (through a leased line) and the same connect scripts an everyting moved on a RedHat 6.1 machine don't work. On the slack machine things go like this (taken from syslogd) : pppd started by... pppd using

Re: Dealing with port scanners / attackers

1999-12-21 Thread Peter Bruderer
If an attacker uses decoy mode you will be hit by 10 different source addresses and only one is from the attacker itself. If you do a reverse scan you will hit 9 addresses for which you appear to be an attacker. My recommendation: secure your box and let them scan. A port scan is f* boring

RE: Dealing with port scanners / attackers

1999-12-21 Thread Lee, Dana-Renee
Could also be that ISP's don't care about your problem's as long as their users are happy. Renee Lee -Original Message- From: Eric [mailto:[EMAIL PROTECTED]] Sent: Tuesday, December 21, 1999 1:47 AM To: [EMAIL PROTECTED] Subject: Dealing with port scanners / attackers I'm getting

Re: Oracle port 1521

1999-12-21 Thread Dave Harris
Check out http://www.rmsbus.com/gu.html for Gauntlet Oracle "william.wells" wrote: There has been talk about Oracle on CheckPoint. How about Gauntlet? Anyone have any experience with their Oracle SQL proxy? I may need to use it soon. - [To unsubscribe, send mail to [EMAIL PROTECTED]

RE: Doubleclick, Altavista cookies

1999-12-21 Thread Robert Driscoll
On the Doubleclick website there is an option to set a cookie that "OPTS-OUT". Which is under the privacy link. This is sort of the same way that the PIII signature was able to hush the privacy crowds. Now all you have to do is inform all the users, they if they do not want this behavior to

RE: 2 IP addresses in one corporate/local network?

1999-12-21 Thread Meehan Greg Contractor 21SOPS/MAOMC
Title: RE: 2 IP addresses in one corporate/local network? first posting to this list...been lurking for a while, and the conversation looked intersting ;)... SIPRNET correct, and the other side of the coin is NIPRNET, (Nonsecure, etc..) we don't use IPv6 ...NIPRNET or SIPRNET ;) and