No, you're just not sending the right initalization for starting a WINS
transaction and it's dropping the conneciton, or it's timing out. M$ has
no clue about security and I severly doubt this is the case. 

They're just having it send a RST when you send crap to the port.

Go try this with netcat. 

-john

On Wed, 8 Mar 2000, Ron DuFresne wrote:

> 
> seems M$ got that partly right then, even on windows <now that they
> patched a few parts of the tcp/ip stack and the Os a tad>, for try
> telnetting to like 137, 138, or 139 on a windows box and tossing crap at
> it.  
> 
> darkstar:/etc/ppp# telnet s2.dial13.new.nac.net 139
> Trying 209.123.99.102...
> Connected to s2.dial13.new.nac.net.
> Escape character is '^]'.
> 
> ��Connection closed by foreign host.
> 
> Why would this be such a tough thing for a firewall or more specially for
> a REAL proxy rather then a mere tunnel?
> 
> Thanks,
> 
> Ron DuFresne
> 
> On Wed, 8 Mar 2000, John Adams wrote:
> 
> > On Wed, 8 Mar 2000, Ng, Kenneth (US) wrote:
> > 
> > > You want the truth?  I caught one major firewall vendor in a big lie over
> > > this one.  Their so called proxy was nothing more than a transparent
> > > connection, yet when I asked them if I put a telnet daemon on another
> > 
> > Very few firewalls actually check that the protocol travelling over a
> > particular port -really is- what the port is supposed to be used for.
> > 
> > Anyhow, I see this as an easily spoofable scenario, and building a
> > firewall to do protocol analysis would also have to support resetting the
> > connection if the protocol should ever deviate from the established norm.
> > It seems like this would be an incredible amount of work for the firewall
> > to do on each packet, as it would now have to maintain state for each
> > conversation (per protocol).
> > 
> > Consider this, an inside employee sets up an ftp server on port 80 of
> > their home machine, and you don't want anyone using ftp because they might
> > ftp out your super seekrit widget plans. You say that outbound port 80
> > should only be web, but I blast a bunch of packets before my ftp
> > connection setup to fool the firewall (even better, I just forget the
> > whole FTP thing and perform an HTTP PUT...) 
> > 
> > IMHO, It's just too complex and not a real solution to security.
> > 
> > -john
> > 
> > -
> > [To unsubscribe, send mail to [EMAIL PROTECTED] with
> > "unsubscribe firewalls" in the body of the message.]
> > 
> 
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> "Cutting the space budget really restores my faith in humanity.  It
> eliminates dreams, goals, and ideals and lets us get straight to the
> business of hate, debauchery, and self-annihilation." -- Johnny Hart
>       ***testing, only testing, and damn good at it too!***
> 
> OK, so you're a Ph.D.  Just don't touch anything.
> 


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to