RE: This is a must read document. It will freak you out

2001-06-07 Thread Ari Weisz-Koves
Maybe he is grandstanding a tad, but I think the underlying theme of his argument is solid. The issue here isn't that you can't forge packets from Windows - he didn't explain that correctly, and that seems to be the point everyone is sticking on. The reason I see to be scared is that suddenly

Checkpoint Upgrade

2001-06-07 Thread Vijay Vora
Hi All, I'm planning to upgrade my checkpoint firewall 4.0 running on NT to checkpoint 2000 on Windows 2000 on a new hardware. I would like to know how should i backup my policies network objects and restore it on to the new system. I visited checkpoint site but didn't find any useful

RE: Problems with VPN's with CheckPoint and StoneBeat

2001-06-07 Thread LIOLIS,SPIROS \(HP-Greece,ex1\)
It seems to me that the cluster is not set up right. The VPN is dependent on Stateful connection and apparently the cluster is not configured right. Could you please tell me a bit more on the cluster configuration? Regards, Spiros -Original Message- From: [EMAIL PROTECTED]

RE: IPCHAINS not Logging correctly

2001-06-07 Thread David Ishmael
Zachary, CCNA stands for Cisco Certified Network Associate which is the first in the training series for the Cisco certification track. I would recommend taking the certification if you're planning on doing any network engineering type work as it gives you a good look at routing and the various

RE: Content Filtering

2001-06-07 Thread David Ishmael
Zachary, I wouldn't consider a filter of any kind to be a firewall. Perhaps that's a mind-set and an overbearing opinion, but I consider router ACL's or software engines that monitor content (URL's) as filters where I consider hardware or software that specifically addresses security measures

RE: Tunnels and Firewalls (WAS: RE: Encryption vs. inspection.)

2001-06-07 Thread Enno Rey
Hi, also does this. If you're doing user/password auth to actually bring up the VPN tunnel _as_well_as_ box auth (L2TP in IPSec does this, f'rinstance) then And - as L2TP is only kind of 'tunneled PPP' - you can then use any authentication scheme that PPP supports (= as soon as there is wider

Winroute not functional after AOL (un)installation

2001-06-07 Thread Stefan Guha
hi list, i recently installed AOL on my windows2000 router box, but soon realized that winroute pro won't be able to route the AOL connection... i gave up on that. so far so bad, no biggie. the real annoying thing about that is, that after i uninstalled AOL 6 Software from the computer, winroute

Remote VPN Users

2001-06-07 Thread A. Drenium
Hi All, I am assessing a Watchguard Firebox II at present for our corporate firewall for a LAN of about 350 users, and I have an issue of how to protect the LAN when users VPN in from the internet. They currently have dynamic IP's, and accordingly I have to allow access to the firewall for

AW: Problems with VPN's with CheckPoint and StoneBeat

2001-06-07 Thread Horst Moll
Just a question: Is the FW Management Station running on one of these machines? If so, than please read the documentation, that if you running a FW1 VPN Cluster all cluster members must be only FW1 Stations - no management stations !! If you have already configured your system like that, forget

Attaining information about attempted intrustions

2001-06-07 Thread fwlist
Hi all, In response, feel free to let me know if you know of better list to aim questions like this: My client has been portscanned for several weeks now. Upward of thirty scans a day, with a similar profile. They each scan the IP block owned (and concievably the scan continues past our

Netmeeting: Winroute and Linksys.

2001-06-07 Thread Artur Nurja
Hi! I have difficulties with clients that asks to have video and audio conferences using NetMeeting. The clients are generally after a Linksys router. And all clients are after Winroute Pro 4.1. The clients says that they can see the video of the client in the other side, but can't communicate

Re: Winroute not functional after AOL (un)installation

2001-06-07 Thread Bill Schoolcraft
At Thu, 7 Jun 2001 it looks like Stefan Guha composed: humbly_snipped SG--i have a linux box behind that windows firewall/route. SG--i am connected from the win2k box to the internet using plain dialup (which SG--worked w/o problems before btw). SG-- SG-- SG--can anyone please help ? SG--if not

ICMP packets and Firebox II

2001-06-07 Thread Barry George
Title: Message Hi All, We have a Firebox II setup stopping most of what we don't want. Everything has been running nicely, then our city run ISP installed a new mail server. We found that mail from its domain was being slowed down or blocked. On inspection to turns out that our firewall

RE: This is a must read document. It will freak you out

2001-06-07 Thread Graham, Randy \(RAW\)
Of course, the beauty of the digital age is that skill can be transferred electronically. Not every script kiddie has to create a trojan installer capable of loading the correct network interface, just one of them. Once one good trojan comes out to do that (and probably already has), it just

Re: Remote VPN Users

2001-06-07 Thread Lance Ecklesdafer
Andy, I have not heard that many good things about this product. It seems to have some nice features but it lacks good technical support and there is no double password verification available. Additionally, there have been comments made that the implementation of IPSEC is not very good either.

Re: Problems with VPN's with CheckPoint and StoneBeat

2001-06-07 Thread Richard Warwick
[snip] It's been a while since I've done this, but as I recall you need to enable state sharing in FW1 by creating a configuration file (state.conf???) in $FWDIR/conf which contains the IP address(es) of the filter modules you want to share state with. The links below will also give you a bit

RE: This is a must read document. It will freak you out

2001-06-07 Thread Paul D. Robertson
On Thu, 7 Jun 2001, Ari Weisz-Koves wrote: The reason I see to be scared is that suddenly the mainstream operating system used by the least cautious people around, with the best application/os integration providing the easiest trojan methods will by default be able to be used for packet

Re: This is a must read document. It will freak you out

2001-06-07 Thread Jeffery . Gieser
I disagree with Steve's assertions about Win XP but the article dissecting his own DDOS attack was very entertaining. As overstated as it was he does have a small point. Basically, he is saying that most script kiddies just use whatever trojan package is available and most techologically

Re: packet snooping tools for window

2001-06-07 Thread Kim Thomas
Hi.. Does anyone know any free packeting sniffing tools run on windows machine? You might try Analyzer, a windows sniffer tool available through securityfocus. It has different kinds of filters such as packet type, source, destination, etc. On the unfortunate side, all help menus are in

RE: This is a must read document. (MS response)

2001-06-07 Thread Network Operations
Microsoft has embarked on a campaign known as the war on hostile code, with the goal of preventing any hostile code from running on users' systems. Won't this crash Office/Outlook and Win98/2k ?? (sorry I had to do it...) =) Starrdust Webmaster [EMAIL PROTECTED] 06/06 4:04 PM Not to

RE: This is a must read document. It will freak you out

2001-06-07 Thread Frank Knobbe
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 -Original Message- From: Ari Weisz-Koves [mailto:[EMAIL PROTECTED]] Sent: Thursday, June 07, 2001 12:01 AM [...] Correct me if I'm wrong with the details, but with Windows 95/98/NT/2000 wouldn't the trojan would have to figure out

RE: Problems with VPN's with CheckPoint and StoneBeat

2001-06-07 Thread william.wells
From what I recall from setting up VPNs from us to sites which used Checkpoint VPNs in a load balanced environment, the problem is that Checkpoint runs VPNs slightly differently. VPNs are between 2 IP addresses. As I recall, in a Checkpoint load-balanced cluster, the end of the VPN is on the

RE: This is a must read document. It will freak you out

2001-06-07 Thread Jürgen Nieveler
Look at the auto-updating, plug-in using, trusted signed code only trojans currently floating around, then think about the skillset needed to add a packet driver and stick around for a reboot. Why wait? Remember, this is Windows9x we're talking about... do you think a (l)user would really

RE: This is a must read document. It will freak you out

2001-06-07 Thread Zachary Uram
On Thu, 7 Jun 2001, Paul D. Robertson wrote: It really isn't that big of a deal, there are already enough trojaned Win9x clients out there that even using real addresses doesn't make it easy to stop them. Hi Paul, So is DDoS attacks biggest security threat out there? It seems to be a big

explanation of packet fragmentation etc. ?

2001-06-07 Thread Zachary Uram
In the GRC.COM article he talked about how the malicious intruder was generating bad packets which fragmented en route to their destination and this produced some cascade effect of millions of badly formed packets? How does one generate their own packets? Is it very difficult or length code wise?

Re: ICMP packets and Firebox II

2001-06-07 Thread gilles
Hi, I don't know what is firebox, but I've got '1' in /proc/sys/net/ipv4/icmp_echo_ignore_all witch is interpreted by kernel like a other port attempt. And so, no reply. It's the primary thing that I give in all my news linuxboxes on the Internet. this void `ping -s 65635 victim.com` for example

Stopping virii and DDoS attacks ( was RE: This is a must readdocument. It will freak you out)

2001-06-07 Thread Zachary Uram
Sounds bleak. So how will security industry deal with this coming deluge of expected escalatory and intensive proliferation of virus outbreaks and DDoS attacks? SDG, Zach [EMAIL PROTECTED] Blessed are those who have not seen and yet have faith. - John 20:29 - [To unsubscribe, send mail to

Re: This is a must read document. It will freak you out

2001-06-07 Thread dgillett
Note, though, that if somebody's gotten Sub7 onto a box, they can probably use it to install libpcap, making ME and NT as capable, for suitably-written malware, as 2000 and XP David Gillett On 6 Jun 2001, at 16:27, Irony wrote: - From time to time a must read document is published.

FW: FW: ICMP packets and Firebox II

2001-06-07 Thread Barry George
Thanks to all for the replies so far. Here is a note from our Firewall admin on one of the suggestions. Any comments? Thanks Barry Sorry Barry, but I disagree with that statement. We need to block multiple icmp requests. Hackers can use it as a tool to scan other services on the network.

Re: This is a must read document. (MS response)

2001-06-07 Thread Michael R. Jinks
Network Operations wrote: Microsoft has embarked on a campaign known as the war on hostile code, with the goal of preventing any hostile code from running on users' systems. Won't this crash Office/Outlook and Win98/2k ?? (sorry I had to do it...) You may make a better point than you

RE: This is a must read document. It will freak you out

2001-06-07 Thread Paul D. Robertson
On Thu, 7 Jun 2001, Zachary Uram wrote: Hi Paul, So is DDoS attacks biggest security threat out there? No, most certainly intrusions are the biggest threat out there. Stopping intrusions would naturally stop DDoS as well as other attacks. It seems to be a big problem. Especially for

RE: This is a must read document. It will freak you out

2001-06-07 Thread Cessna, Michael
Title: RE: This is a must read document. It will freak you out just my $0.02 I think the burden of preventing DDOS attacks needs to be placed on the ISPs not on an operating system or OS manufacturer. Let's face it most of the PC's on the internet are Windows PC's running with little or no

Re: RE: This is a must read document. (MS response)

2001-06-07 Thread JN732765
Don't forget that Microsoft has a vocabulary all of its own. A neutral PC means 100% microsoft applications. Innovate means their right to take over. hostile code probably means anything not written by Microsoft. Network  Operations [EMAIL PROTECTED] wrote: Microsoft has embarked on a

ipsec interop revisited

2001-06-07 Thread John Dorsey
Hello all, I searched the web without issue. Is there any more light on the subject of IPSec interoperating between PIX and FW-1 firewalls these days, either CP or Nokia? Could there be a difference in IPSec code between CP and Nokia? This has been discussed before, but time

RE: This is a must read document. It will freak you out

2001-06-07 Thread Zachary Uram
On Thu, 7 Jun 2001, Paul D. Robertson wrote: No, most certainly intrusions are the biggest threat out there. Stopping intrusions would naturally stop DDoS as well as other attacks. Oh I see. So a machine(s) will be compromised through some mechanism (trojan, virus, setuid exploit) and the

Re: This is a must read document. (MS response)

2001-06-07 Thread Zachary Uram
I wonder how this will fare against OpenBSD? Zach On Thu, 7 Jun 2001, Michael Jinks wrote: http://www.nsa.gov/selinux/ Zachary Uram wrote: On Thu, 7 Jun 2001, Michael R. Jinks wrote: More generally, a lot of people much smarter than me (the NSA's Secure Linux team for

RE: FW: ICMP packets and Firebox II

2001-06-07 Thread Ben Nagy
Title: RE: FW: ICMP packets and Firebox II OK, it might be time for a small clue-fest. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] [...] Thanks to all for the replies so far. Here is a note from our Firewall admin on one of the suggestions. Any comments?

RE: Winroute not functional after AOL (un)installation

2001-06-07 Thread Phillip Askey
I use the winroute product also. I have been happy with the overall package except for the poor logging. I was in the process of building a linux box and going with ipchains, because I was uncertain about how secure this product is. Have you seen any successful attacks on your inside network?

RE: This is a must read document. It will freak you out

2001-06-07 Thread Hague, Alex
Hey Zach This is still a long way off and would need to be adopted by companies like Cisco etc. Somehow I don't see that happening anytime soon. Would Cisco, Bay Networks etc. adopt it when it has matured and is ready for market? While I'm at it, here's my bit on the XP side of

RE: This is a must read document. It will freak you out

2001-06-07 Thread Zachary Uram
good point. emphasis is on getting product to market not ensuring the most rigorous testing metholodgies. one gets the impresson security is an afterthough, at best, in many companies. On Thu, 7 Jun 2001 [EMAIL PROTECTED] wrote: Ahem, actually lack of quality assurance testing in software

RE: Netmeeting: Winroute and Linksys.

2001-06-07 Thread Phillip Askey
I have been able to get netmeeting to work behind winroute pro 4.1. I don't have a linksys, so that must be your problem. Make sure you have port 1720 mapped to inside IP address. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Artur Nurja Sent:

Re: Winroute not functional after AOL (un)installation

2001-06-07 Thread Stefan Guha
there is no special reason, but before that AOL install i was as satisfied with the winroute tool as with the usual ipchains firewall under linux... so, i guess, AOL is the bitch :) thanks anyway -stefan - Original Message - From: Bill Schoolcraft [EMAIL PROTECTED] To: Stefan Guha

Re: ICMP packets and Firebox II

2001-06-07 Thread patrick kerry
There is no mechanism to stop a DOS attack on the fire box. Actually on most firewalls a true DOS attack is impossible to stop. Have your Firewall admin allow the ICMP packets inbound from only that mail server (host). I doubt if your ISP will launch a DOS attack against you, even if they did

RE: ipsec interop revisited

2001-06-07 Thread Ben Nagy
I've done IPSec FW-1 (on Nokia) to PIX pre-v6 with no problems apart from the fact that I'd never touched a FW-1 before. It all worked as advertised, I think. I had to mess about a little but I think that was just me not knowing the Tao of Firewall-1. I've put in a v6 PIX, but didn't do IPSec on

RE: This is a must read document. It will freak you out

2001-06-07 Thread mht
Quality assurance should be folded into Product Certification testing offered by some of the vendors that lurk this list. But Product Certification or BITS Testing can be very costly depending on the type of testing that is conducted. At 07:56 PM 6/7/2001 -0400, Zachary Uram wrote: good

Re: This is a must read document. (MS response)

2001-06-07 Thread Dave Wreski
I wonder how this will fare against OpenBSD? Or EnGarde Secure Linux, for that matter. ESL also implements Mandatory Access Control, using LIDS, but is a complete distribution, not a series of patches and packages. It also includes several other kernel security changes, host and network

RE: This is a must read document. It will freak you out

2001-06-07 Thread Paul D. Robertson
On Fri, 8 Jun 2001, Ari Weisz-Koves wrote: that only one person needs to write a really good trojan before thousands can be using it the next week. And only one person needs to write a good library before thousands can be using it next week. I propose just one more argmuent to this

RE: This is a must read document. It will freak you out

2001-06-07 Thread Paul D. Robertson
On Thu, 7 Jun 2001 [EMAIL PROTECTED] wrote: Ahem, actually lack of quality assurance testing in software and hardware is the biggest threat out on the Internet today. According to some there hasn't been a new intrusion introduced into the wild except some type of exploit in code that

RE: Tunnels and Firewalls (WAS: RE: Encryption vs. inspection.)

2001-06-07 Thread dgillett
On 7 Jun 2001, at 19:23, Carl E. Mankinen wrote: And this is different from an on-site user, visiting the web through the corporate firewall, exactly HOW? i.e. I do not see how this risk is exacerbated if the client connection comes across a VPN tunnel rather than just a length