tcp ports

2001-05-30 Thread Madhur Nanda
Hi all, can someone give info on following ports on a NT system 1046 and 1128 TIA Madhur - [To unsubscribe, send mail to [EMAIL PROTECTED] with unsubscribe firewalls in the body of the message.]

Re: can anyone explain this...

2001-05-30 Thread Lyytinen Petteri
On Wed, 30 May 2001, Stilgherrian wrote: May 14 18:48:00 pooky ftpd[987]: FTP session closed Well, these *are* FTP logins. wu-ftpd doesn't run all the time, but is spawned from inetd when a connection comes in. Exactly, those are logins to *ftpd*, not wu-ftpd

Re: Preventing TCP Flood Attacks on PIX (Configuring EmbryoticConnection Limits)

2001-05-30 Thread Michael Batchelder
Brian; Question in-line... Brian Ford wrote: With the new TCP intercept feature, once the optional embryonic connection limit is reached, and until the embryonic connection count falls below this threshold, every SYN bound for the affected server is intercepted. For each SYN, PIX

RE: tcp ports

2001-05-30 Thread Graham, Randy \(RAW\)
http://www.iana.org/assignments/port-numbers - Those fall inside 2 unassigned ranges here http://www.sys-security.com/html/papers/trojan_list.html - They do not show up here at all http://www.robertgraham.com/pubs/firewall-seen.html - Not here either How did you find these ports? Perhaps

ipf removed from openbsd

2001-05-30 Thread Jose Nazario
FYI: deadly.org, aka openbsd journal, has a note from theo himself that ipf has been removed from openbsd-current due to licensing changes (changes committed at about 10 pm tuesday night). 2.9-release (which ships in two days) will have it, though. this affects only -current. i have not yet

Re: IPF free no more?

2001-05-30 Thread mouss
At 05:04 29/05/01 +0200, Bernd Eckenfels wrote: On Mon, May 28, 2001 at 10:21:13PM -0400, Paul D. Robertson wrote: That point is now obvious. Most licenses have a default deny policy, modification was never had a permit line. It still doesn't have a permit line, so the access list hasn't

Recommended readings

2001-05-30 Thread Graham, Randy \(RAW\)
Well, I posted this last week but have since gotten a few requests for it, so I wanted to post this again. Following is the starting list I give to people when they ask me for book suggestions. My personal library is much more than this, and I can certainly recommend more books than what I list

RE: [fw-wiz] PIX 6.0.1 - Pre-Summary

2001-05-30 Thread Settle, Sean
Well so far I haven't gotten any horror stories, so yesterday evening I upgraded our lab unit. Since we had an older PIX unit I had to replace the flash card with a new 16MB unit so my upgrade process may be a little bit different then yours. Basically you write off the current config to tftp,

RE: Recommended readings

2001-05-30 Thread Claussen, Ken
comments inline... Ken Claussen MCSE CCNA CCA [EMAIL PROTECTED] The Mind is a Terrible thing to Waste! -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Graham, Randy (RAW) Sent: Wednesday, May 30, 2001 10:38 AM To: '[EMAIL PROTECTED]' Subject:

Re: Recommended readings

2001-05-30 Thread Jose Nazario
On Wed, 30 May 2001, Graham, Randy (RAW) wrote: IDS: Network Intrusion Detection: An Analysts' Handbook - Northcutt Intrusion Signatures and Analysis - Northcutt these are good from a practical standpoint, but theory is needed to really evaluate products and interpret situations.

Re: can anyone explain this...

2001-05-30 Thread dgillett
I eventually wound up blocking all traffic from t-dialin because of the volume of anonymous FTP scans I was getting from them, and their lackadaisical response to complaints. David G On 29 May 2001, at 15:20, jeremy cassidy wrote: Hrmm okay here is my logs, and i dont have wu-ftpd

Re: [OT] RE: f**k USA government f**k poizonbox - reinstall

2001-05-30 Thread dgillett
This is a firewalls list, not a venting boo-hoo i can't find a job list. This is a firewalls list. Please think (at least) twice before feeding an off-topic thread. Goto monster.com, there are thousands of jobs in this industry. If you choose to post advice, it should be useful. I

Pix 520

2001-05-30 Thread Ivan Lopez, TRI
Hi, Does any of you know how to determine the connection load of a PIX 520? How to figure out if I need another PIX for load sharing? How to figure out if I'm using all the IP translations available from the global pool (including the last address used for PAT)? Your help would be appreciated...

Penetrating a NAT

2001-05-30 Thread Steve Riley \(MCS\)
Some security experts claim that NAT could be used as a firewall (or let's say, some means of hiding the internal network). I have a question about that. The assumption is that no packets could be sent directly from the Internet to clients behind NAT. However, imagine this scenario and tell me

Re: Penetrating a NAT

2001-05-30 Thread Michael R. Jinks
How is the scenario you describe different from session hijacking irrespective of the presence of NAT? Steve Riley (MCS) wrote: Some security experts claim that NAT could be used as a firewall (or let's say, some means of hiding the internal network). I have a question about that. The

Re: Penetrating a NAT

2001-05-30 Thread Michael Batchelder
Steve Riley (MCS) wrote: Some security experts claim that NAT could be used as a firewall (or let's say, some means of hiding the internal network). No security expert I know would assert such a thing. If they did, I'd give their title an instant expertectomy. I have a question about

Re: Penetrating a NAT

2001-05-30 Thread Michael R. Jinks
Michael Batchelder wrote: Use explicit filtering rules or proxies, whichever is applicable. I don't know that a filtration rule as such can protect against a session splice, either. Proxies may be a different matter (for example if the attack is a known exploit you can have an application

RE: Penetrating a NAT

2001-05-30 Thread Ben Nagy
-Original Message- From: Steve Riley (MCS) [mailto:[EMAIL PROTECTED]] Sent: Thursday, May 31, 2001 5:44 AM To: [EMAIL PROTECTED] Subject: Penetrating a NAT Some security experts claim that NAT could be used as a firewall (or let's say, some means of hiding the internal

Re: Penetrating a NAT

2001-05-30 Thread patrick kerry
Which security experts?? I would like names so I never make the mistake of consulting with them. --- Steve Riley (MCS) [EMAIL PROTECTED] wrote: Some security experts claim that NAT could be used as a firewall (or let's say, some means of hiding the internal network). I have a question about

Re: Penetrating a NAT

2001-05-30 Thread dgillett
This is one reason why router/gateway vendors touting NAT as a natural firewall is EVIL. [It appears that recently some vendors may have been touting static NAT (providing access through NAT to servers) as effectively a DMZ. Grrr] Some security experts claim that NAT could be used

Re: Penetrating a NAT

2001-05-30 Thread Michael Batchelder
Michael R. Jinks wrote: Michael Batchelder wrote: Use explicit filtering rules or proxies, whichever is applicable. I don't know that a filtration rule as such can protect against a session splice, either. Proxies may be a different matter (for example if the attack is a known