The problem there, as in many environments, is, that the company and the
higherups did not really buy into security. And, this is an issue folks
will have to constanly deal with for quite sometime. At least until the
company suffers a sever compromise.
Take the EPA and GAO last year. The GAO hijacked external X sessions with
root level access from inside to outside the EAP. The EPA had been
looking at firewalls for a few years. All plans were rejected becuase it
was feared work could not be done with the restrictions being recommanded.
Yet the GAO audit and resulting hijacked connections actually totally shut
down the EPA for sometime last year. Not even e-mail was allowed for
weeks. When I finally moved on, little was stuill allowed to flow from
outside in nor inside out. And although the GAO had since further audited
and stated security has been enhanced some, they are still dealing with
issues deemed to be problemactic.
Funny how some folks will pay big bucks for an audit, then reject it
pretty much outright until they face the charges and issues of a
compromise...
Thanks,
Ron DuFresne
On Fri, 19 Jan 2001, Jaime Rita wrote:
> I once did a consulting job where we recommended that (preventing X through
> the firewall) .. the admins bluntly told me if I implemented that, they
> would "fix" it when I left because they needed X to manage the applications
> on the DMZ (Netscape series products) .. there were admin things you
> couldn't console in to do .. not much more you can do but try to educate
> folks and balance their business needs vs security ..
>
>
> Jaime
>
> At 10:27 AM 01/19/2001 -0600, you wrote:
>
> >security should be the issue here, especially with X sesions as X is a
> >well known risk and has been since the old mitnick days and prior...
> >
> >Thanks,
> >
> >Ron DuFresne
> >
> >On Thu, 18 Jan 2001, Noonan, Wesley wrote:
> >
> > > Unfortunately, I am being told that Solaris does not ship with SSH and it
> > > would take making some changes to the classrooms that they aren't prepared
> > > to make right now. I think this is something that we will probably
> > pursue as
> > > a long term solution though, based on what I am hearing in this thread and
> > > from the trainers involved. In the short term though, I need to get access
> > > working. Would those conduits do the trick? Am I correct in thinking
> > that it
> > > isn't working because the server needs to send data back on different ports
> > > to the clients and those ports are closed? Would it be better to use the
> > > established command?
> > >
> > > One thing to keep in mind right now is that security isn't the high
> > priority
> > > here. We aren't sending any data across the internet.
> > >
> > > We are currently running 5.1(2). Let me see what I can dig up on 5.1(3).
> > >
> > > Thanks again.
> > >
> > > Wes Noonan, MCSE/MCT/CCNA/NNCSS
> > > Senior QA Rep.
> > > BMC Software, Inc.
> > > (713) 918-2412
> > > [EMAIL PROTECTED]
> > > http://www.bmc.com
> > >
> > > -----Original Message-----
> > > From: Rich Pitcock [mailto:[EMAIL PROTECTED]]
> > > Sent: Thursday, January 18, 2001 11:30
> > > To: 'Noonan, Wesley' '
> > > Cc: '[EMAIL PROTECTED]' '
> > > Subject: RE: Permiting X through a PIX
> > >
> > > SSH is the way to go but if it is not an option then PIX Firewall ver 5.13
> > > supports XDMCP (X Display Manager Control Protocol) XWindows TCP back
> > > connection. XDMCP uses UDP port 177. XWindows uses TCP ports 6000 through
> > > 6063.
> > >
> > > Rich
> > >
> > > -----Original Message-----
> > > From: Ron DuFresne
> > > To: Ng, Kenneth (US)
> > > Cc: 'Noonan, Wesley'; '[EMAIL PROTECTED]'
> > > Sent: 1/18/01 12:21 PM
> > > Subject: RE: Permiting X through a PIX
> > >
> > >
> > > He';s still going to need to open his 600 port though.
> > >
> > > Thanks,
> > >
> > > Ron DuFresne
> > >
> > > On Thu, 18 Jan 2001, Ng, Kenneth (US) wrote:
> > >
> > > > Allow ssh to go through instead. The user will log onto the machine
> > > via
> > > > ssh. ssh will set the DISPLAY environment variable so that when apps
> > > are
> > > > started up, they tunnel back to the user's workstation. On the whole
> > > I
> > > > think this is a better way to do it if you need X. Also works great
> > > if you
> > > > need to run through NAT.
> > > >
> > > > -----Original Message-----
> > > > From: Noonan, Wesley [mailto:[EMAIL PROTECTED]]
> > > > Sent: Thursday, January 18, 2001 11:49 AM
> > > > To: '[EMAIL PROTECTED]'
> > > > Subject: Permiting X through a PIX
> > > >
> > > >
> > > > Hello all. I need some advice from the experts around here.
> > > >
> > > > I have a situation where I have a PIX with 4 interfaces. 2 are inside
> > > and
> > > > outside and 2 are considered DMZ1 and DMZ2. DMZ2 is a higher security
> > > than
> > > > DMZ1 (thus all traffic is permitted outbound from DMZ2 to DMZ1). We
> > > have
> > > > various machines on DMZ2 than need to access 2 servers on DMZ1 via X.
> > > For
> > > > some reason this is not working, and unfortunately, I am not a Unix
> > > guru and
> > > > know very little about X. My suspicion is that X requires that the
> > > target
> > > > machine (the server) be able to send data back to the clients, which
> > > of
> > > > course is being blocked by the firewall.
> > > >
> > > > Here is a little diagram
> > > > Server2
> > > > DMZ2----PIX----DMZ1---[
> > > > Server1
> > > >
> > > > So, what I am wondering is how to proceed. I am pretty sure that X
> > > uses TCP
> > > > and UDP 6000-6063. Based on that, one of my ideas is to setup a
> > > conduit as
> > > > follows:
> > > > Conduit permit tcp 172.16.0.0 255.255.255.0 range 6000 6063 host
> > > 172.16.1.2
> > > > Conduit permit udp 172.16.0.0 255.255.255.0 range 6000 6063 host
> > > 172.16.1.2
> > > > Conduit permit tcp 172.16.0.0 255.255.255.0 range 6000 6063 host
> > > 172.16.1.3
> > > > Conduit permit udp 172.16.0.0 255.255.255.0 range 6000 6063 host
> > > 172.16.1.3
> > > >
> > > > The other idea is to use the established command, but I am not very
> > > familiar
> > > > with it's use.
> > > >
> > > > Any ideas? TIA
> > > >
> > > > Wes Noonan, MCSE/MCT/CCNA/NNCSS
> > > > Senior QA Rep.
> > > > BMC Software, Inc.
> > > > (713) 918-2412
> > > > [EMAIL PROTECTED]
> > > > http://www.bmc.com
> > > >
> > > > -
> > > > [To unsubscribe, send mail to [EMAIL PROTECTED] with
> > > > "unsubscribe firewalls" in the body of the message.]
> > > >
> > > ************************************************************************
> > > *****
> > > > The information in this email is confidential and may be legally
> > > privileged.
> > > > It is intended solely for the addressee. Access to this email by
> > > anyone else
> > > > is unauthorized.
> > > >
> > > > If you are not the intended recipient, any disclosure, copying,
> > > distribution
> > > > or any action taken or omitted to be taken in reliance on it, is
> > > prohibited
> > > > and may be unlawful. When addressed to our clients any opinions or
> > > advice
> > > > contained in this email are subject to the terms and conditions
> > > expressed in
> > > > the governing KPMG client engagement letter.
> > > >
> > > ************************************************************************
> > > *****
> > > > -
> > > > [To unsubscribe, send mail to [EMAIL PROTECTED] with
> > > > "unsubscribe firewalls" in the body of the message.]
> > > >
> > >
> > > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> > > "Cutting the space budget really restores my faith in humanity. It
> > > eliminates dreams, goals, and ideals and lets us get straight to the
> > > business of hate, debauchery, and self-annihilation." -- Johnny Hart
> > > ***testing, only testing, and damn good at it too!***
> > >
> > > OK, so you're a Ph.D. Just don't touch anything.
> > >
> > > -
> > > [To unsubscribe, send mail to [EMAIL PROTECTED] with
> > > "unsubscribe firewalls" in the body of the message.]
> > > -
> > > [To unsubscribe, send mail to [EMAIL PROTECTED] with
> > > "unsubscribe firewalls" in the body of the message.]
> > >
> >
> >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> >"Cutting the space budget really restores my faith in humanity. It
> >eliminates dreams, goals, and ideals and lets us get straight to the
> >business of hate, debauchery, and self-annihilation." -- Johnny Hart
> > ***testing, only testing, and damn good at it too!***
> >
> >OK, so you're a Ph.D. Just don't touch anything.
> >
> >-
> >[To unsubscribe, send mail to [EMAIL PROTECTED] with
> >"unsubscribe firewalls" in the body of the message.]
>
>
> Jaime M. Rita, CISSP, CCNA - Manager
> Applications and IP Services Group, GCOE Solutions Design Team
> CA/SP Global Delivery & Solutions, Cisco Systems, Inc.
> Page: 800-365-4578 / Cell: 850-572-5346 / eFax: 734-423-0553
>
>
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"Cutting the space budget really restores my faith in humanity. It
eliminates dreams, goals, and ideals and lets us get straight to the
business of hate, debauchery, and self-annihilation." -- Johnny Hart
***testing, only testing, and damn good at it too!***
OK, so you're a Ph.D. Just don't touch anything.
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]