I'm getting repeated (regular intervals) ftp attempts to my firewall from an
address (208.24.82.140) that I can't seem to track down. While the attempts
are being blocked, the continuing log messages are annoying. This has been
going on for quite a while now, and I'm wondering if something got caught in
a loop and the attempts may not be malicious. (on the other hand... 8-O)
Any thoughts?

TIA,
Kelly
---
Kelly Newcomb, CISSP
Technical Risk Assessment Consultant
Texas Guaranteed Student Loan Corp.
E-Mail: [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> 


                -----Original Message-----
                From:   Chris Shenton [mailto:[EMAIL PROTECTED]]
                Sent:   Wednesday, September 01, 1999 9:47 AM
                To:     Curt Hefflin
                Cc:     [EMAIL PROTECTED]
                Subject:        Re: dailup security

                On Wed, 1 Sep 1999 09:19:52 -0400, "Curt Hefflin"
<[EMAIL PROTECTED]> said:

                Curt> We have a pretty good firewall protecting our network
from the
                Curt> Internet. However, we have well over 200 users with
dail-up
                Curt> access via an Acsend box with RADIUS authentication.
What are
                Curt> some of the risks of having this type of access into
our network
                Curt> and can these things be cracked.  

                If someone can find out or guess your phone number, then
daemon
                dialers can guess passwords and user names. This could be
aided if
                outsiders can learn about your usernames (e.g. through your
web pages,
                directories, or other public info). And most users choose
poor
                passwords so password cracking programs won't have to be too
                sophisticated. 

                At one site I worked on we separated the dialin gear from
the internet
                and internal LAN so we could apply distinct rulesets and
minimize
                attacks on the RADIUS servers, or from the dialin to the
inside.

                        Internet
                            |           |- Dial-in NASes
                        Firewall -------+ 
                            |           |- RADIUS servers
                        PrivateNet

                We then realized our greatest vulnerability was weak
passwords and
                users sharing their passwords with friends, family, etc. So
we got
                SecurID tokens and integrated that into RADIUS.

                I'd do the hardware token thing again but I'd look around at
competing
                token products; their docs and support suck, and I gather
they require
                tons of ports open if you want to leverage their ACE server
(say) from
                inside the firewall.
                -
                [To unsubscribe, send mail to [EMAIL PROTECTED] with
                "unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to