oops only read half the thread. Sorry about that.

Daniel

>Just a few quick points...there is no clear indication of who said what so
>don't attribute any quoted material to anyone.
>
>>  -----Original Message-----
>
>>  On Mon, 13 Mar 2000, dan Harrison wrote:
>>
>>  > Once you tell an attacker what protocol and port you don't want to
>>  > talk on they know where to focus their attacks.
>[snip]
>
>This misses the point. We're talking about networks where we _don't_ have an
>ident server. The ONLY reason to send back a TCP RST is to make the remote
>mail daemon give up more quickly. It's not protecting anything so an
>attacker can't draw any conclusions - getting a RST back on port 113 when
>everything else gets silently discarded only tells you that the network
>admin is vaguely clueful.
>
>>  >
>>  > Daniel
>
>>  > >they close down their end of it.  It's considered good
>>  net-etiquette to
>>  > >rst the otherside when possible...
>
>The RFC (793) behaviour for non-screened TCP stacks is to send a RST for
>packets that head for ports where they aren't wanted. This allows the remote
>TCP stack to get out of SYN_SENT, correct. Most implementations don't hang
>around in SYN_SENT for very long though.
>
>
>>  > >>  Any disadvantages for using service reset inbound vs.
>>  standard behavior of
>>  > >>  silently dropping connections?
>
>For ident, yes. It makes mail go through much more quickly to hosts that run
>identd. I have had cases where the ident response wait was so long that the
>local mailservers decided that the connection had timed out - this caused
>all sorts of problems up to and including total failure of mail delivery to
>certain broken networks.
>
>[snip]
>>  > >>  > > > >         Don't know how to set it up in pix, but what
>>  > >>  > you have to do is to
>>  > >>  > > > >REJECT the packets instead of DENYING them. DENY simply
>>  > >>  > drops them and
>>  > >>  > > > >REJECT drops them AND sends the client an ICMP
>>  > >>  > destination-unreachable
>>  > >>  > > > >packet.
>
>Not quite. REJECT sends a TCP RST. Normal filtering routers would send an
>ICMP 3/13 (Administratively Prohibited) packet which won't always get to its
>destination. Most filtering routers will need to be explicity configured not
>to send an ICMP error message if there is traffic to a filtered port. Cisco
>for example have the "no ip unreachables" interface command to do this.
>
>On a "normal" Cisco you can get this REJECT behaviour by _permitting_ the
>traffic as long as your mail server doesn't run identd. This sucks a bit
>from a security angle. If you're using NAT then you can be more elegant by
>having a NAT mapping for port 113 on all mailserver IP addresses that points
>to a "safe" host (I tend to use the router itself) whose TCP stack you trust
>to send back a TCP RST in the face of adversity and nasty packets.
>
>Cheers,
>
>--
>Ben Nagy
>Network Consultant, CPM&S Group of Companies
>PGP Key ID: 0x1A86E304  Mobile: +61 414 411 520
>-
>[To unsubscribe, send mail to [EMAIL PROTECTED] with
>"unsubscribe firewalls" in the body of the message.]

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to