Thank you.

Although, I can be pretty daft on occasion, I am trying to ``do the
right thing.''  It is not always easy knowing what that maybe in a
variety of contexts.

For me, from my humble experience, when I do not know something, it
works best to try to summarize what it is that I know, especially when I
am asking for help.

Either this is an erroneous process on this list or I did a very poor
job of communicating, or both . . .

Whether or not I am believed, I always try to present the minimum amount
of data/information necessary to get to the next step.  For example, in
my original post, I hoped to either find somebody experienced with this
problem (highest hope) or, in lieu of that, suggestions on where to go
and what to do next.

Finally, today, I am receiving responses that address the latter.

Thank you.

Ray Olszewski wrote:
> 
> Michael -- It is unlikely that there is a lot of AOL expertise here on this
> list (others, please correct me if I am wrong), so the most valuable
> information to provide here would be a better description of what "users
> logging into AOL over our high speed internet connections" means ...
> particularly the "logging in" part.

OK -- good point.

[ snip ]

> In any case, I don't know if this is what the users at the offending
> workstations are doing, and really *you* are the only one in a position to
> find this out. So ...
> 
>         Are they running some proprietary AOL software that
>                 does secret things? (If so, what does sniffing
>                 the traffic tell you?)
> 
>         Are they just connecting to an http(s) site and
>                 authenticating themselves somehow? (Might this be
>                 launching spyware apps or the like?)
> 
>         Are they doing something else? (What?)

OK.

> I do note that you wrote ...
> 
> >We have been told that, apparently, logging into aol over a lan
> >connection results in some kind of connection to a special aol network.
> >I have never used aol and I do not understand this -- hence the first
> >two questions.
> 
> ... so please don't reply with one of your "read what I wrote more
> carefully" responses. Even if you don't know yet, only you are in a position
> to find out what the users at your client site are actually doing. We're
> troubleshooters here, not the Psychic Friends Network.
> 
> As a general matter, if what you are looking for is ONLY someone who has
> already seen the exact problem you are seeing and knows the exact answer,
> then what you've sent up to now is fine (and I'm wasting both your and my
> time by replying), since it is probably enough to find such a person. But in
> that case, you might do better on an AOL support list than here. And I am
> certainly not the person whose help you want.

To me, it is obvious that that is what I wanted; but, also obviously, it
was not so obvious to those who responded.  I am sorry for my poor
communications.

> If you want help analyzing something that is a new problem to all of us ...
> then my suggestion above is a good place to start. So are Jeff's suggestions
> (about reporting the routing table and such on an "offending" workstation
> when it is "logged in" to AOL).

Just as you say, ``We're ... not the Psychic Friends Network.''  Nor am
I!  What does it hurt to test the waters for somebody already
experienced in addressing these issues?  If there is one, I cannot know
it without asking; nor can I know that there is not one without asking. 
However, if there is, then a considerable amount of bandwidth is saved
by asking brief questions.

Also, I, for one, learn alot regarding where to go and what to do next
by probing List Services (>20!), not the least of which is this one.  I
do not and cannot know everything, so I ask questions, starting simple
and progressing in complexity as need arises.  Is this a bad process?

> This would probably be a good topic to explore further, either here or on
> the -devel list, and that is why I am bothering to reply at all. It is (or
> may be) a concrete, and potentially widespread, instance of a general
> problem with firewalling ... what is the difference between a tunnel and a
> hole? If users can run software that punches hard-to-find holes in firewalls
> (and we know they can, as a general matter), what's a sysadmin to do?

YES!  This is exactly why I posted, yesterday.

Prior to yesterday, I had only noticed the aol connections; and, being
busy managing other fires across thousands of users, hundreds of servers
and dozens of networks, I put off indepth root-cause analysis of these
issues and assumed that the martian-blocking nature of the firewalls was
adequate protection.

Then, I noticed the United Airlines log entry!

Yesterday, I questioned that assumption, took note of what I did know,
searched the archives and posted three (3) simple questions.

> But for that sort of discussion to work, you need to be interested enough in
> exploring the problem with us, not just finding a known answer quickly, to
> share the sorts of information I mention above and that others have already
> suggested. Your call.

Excusable or not, ``people who should know better fail'' set me off!

What followed in that post (NOTE: I am not picking on you, Jeff; but,
yours was the first response) was reference to dialup, which I thought
that I had precluded, and a summary:

        ``Insufficient data.''

This was inadequate to my task and offensive to me, since I did not know
where to go and what to do next.  That is why I asked the question --
why I am trying, in followups, to very carefully communicate to you and
others what I cannot know that you want to see.  Where in the
troubleshooting documents does it address this sort of situation?  I am
*NOT* saying that it is not in the docs; simply, that I do not know
where it is -- kindly, show me.

> Let me close with one specific response. You wrote:
> 
> >From the ``ll header'' entries
> >that accompany each martian, we have identified the mac address of
> >culprit workstations and determined that they are not dialing out on
> >modems; but, even if they were, I do not see any change to my
> >questioning.  What is the difference?
> 
> The difference is that holes caused by dialout workstations are old news,
> and there is really no way to address this problem at the firewall (except
> by blocking traffic routed through it with the martians rules, as you are
> already doing). So it's not really a LEAF issue.

Perhaps, this is ``old news'' to you; but, not to me -- hence, my
question.  Again, I do not find this in the troubleshooting docs, nor
did I find such in the archives.  Please, point me to the documentation
and I will rtfm . . .

[ snip ]

> >It maybe interesting to know that aol installs a special ``adapter''
> >that is purported to behave similarly to an hardware nic.  In fact, on
> >win9x, at least, it is next to the nic in network neighborhood
> >properties and is near identically configured.
> 
> This certainly suggests to me that AOL is somehow tunneling through your
> firewall, causing the behaviors you note, and creating the sort of hole that
> is at least potentially exploitable. When you have access to an offending
> workstation, perhaps you will be able to tell us if this characteristic
> applies to the sorts of logins your users are doing or just to AOL's dial-up
> service.

Thank you, for this useful suggestion.  Do you know how to quantify
this?

Also, since I do not know everything there is to know about networks and
quantifying everything quantifiable about same, regarding your sniffer
questions, can you describe a simple, open source process to accomplish
these tasks?

Thank you, for a constructive post -- I learned alot . . .

-- 

Best Regards,

mds
mds resource
888.250.3987

Dare to fix things before they break . . .

Our capacity for understanding is inversely proportional to how much we
think we know.  The more I know, the more I know I don't know . . .

_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user

Reply via email to