-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

This is not really a response to Jay's post this is just my own 2
cents for whatever that is worth (in today's economy I venture not
much).

I think a person SHOULD obfuscate their ips.  Let's say they are
running a vulnerable service and they are trying to shut it off.  Say
they cut n paste the netstat showing there ip and listening port;
they are basically saying, here I am, come get me.  Sure the point
that someone is going to find them anyway is both valid and strong
but let's face it: some people on this list don't always have the
best intentions.  Case n point going back about 6 months (maybe
more????) when the t0rn r00tkit was trendy; David D made some points
about it on the incident list and what do you know..... sure enough
in the next version of t0rn there was a note in the read me quoting
what David said on the incidents list (I believe it an even provided
a link back to his post). 

I don't believe security through obscurity works as a means to an end
but I say the more hurdles the better.  Further I think obfuscating
the ips is not really so much security through obscurity as it is
more like common sense.  It is like saying this "yeah I just bought
this new lock and it appears to be broken here is my address"; sure
are other people are going to try to break into the house anyway but
no need to provide a street address and exact directions on how to
get there.

Again 2 cents falling quickly

Leon

(I have recently become certified in ghi for all those following my
saga.  Currently working on jkl ;)



- -----Original Message-----
From: Jay D. Dyson [mailto:[EMAIL PROTECTED]] 
Sent: Monday, December 03, 2001 1:12 PM
To: Security-Basics List
Subject: Re: obfuscating ip's

- -----BEGIN PGP SIGNED MESSAGE-----

On Sun, 2 Dec 2001, dewt wrote:

> i see many times on this list that people post ip's of their
> machines, and of suspect machines. occasionally with lines like
> "i'm running version (insert any vulnerable version number) of this
> service!" or a much less serious but still iffy "we only allow port
> 53 through the fireall to the machine 192.168.14.3"  i think a risk
> exists by posting ip addresses.

        I disagree for several reasons:

        1.      Any system that's reachable on the 'net is getting
                aggressively scanned anyway.  Yes, discussing a problem
                may yield a temporary jump in scanning, but the threat of
                attack is not appreciably raised.

        2.      Discussing RFC-1918 addresses is pretty moot.  Unless
                someone leaves some useful clues as to the external IP
                of their NAT, any planned attack on that LAN is an
                exercise in futility.

> first of all you expose your own machines to risk by announcing to
> some unneeded information. sometimes a lot of information is needed
> to deduce problems, but the actual ips involved are usually not.

        This is true, but only nominally so.  There's a wealth of public
information that one can use apart from any messages here by which
they
can mount an attack.

        The point I'm trying to make here is that obfuscating IP addresses
in the course of discussions here won't buy the author any real
security.
Anyone with access to these public repositories of information can
divine
most everything they want to know if they truly have malevolent
purposes.
Obfuscating IP's isn't an obstacle...hell, it's barely a speedbump in
any
case.

> i have also heard in an email message that some people do indeed
> scan these machines for innocent purposes, but that can still cause
> alarm at the other end.

        Now *this* is a valid concern.  It's not a good idea to discuss
IPs of systems you don't personally own and/or manage.  As a rule, I
*never* disclose information on an employer's or contractor's
systems.
The only IPs I spill are those I personally maintain.

> as for suspect machines (scans from this ip, or attempted worms
> whatever)  also raises some issues, first of all if many people
> start scanning a compromised box the person who compromised it may
> get scared and delete everything on the system before someone
> responsible for the machine can take any appropriate action,
> alternatively you could invite scans to dialup accounts which by
> then wouldnt' be the same machine anyway, slowing down someone's
> internet connection, or if the suspect traffic turned out to be a
> false alarm, you may have caused headaches for whoever deals with
> the innocent suspect machine(i know i have
> strange traffic forwarded to my pager, not sure about all of you). 

        I'm ambivalent on this issue.  I see scans from different sites
all over the world.  Most scans I simply ignore if they're just
vanilla
scans for known vulnerable services (BIND, SunRPC, some SSHd
iterations,
et cetera).  If it's a scan via a worm, I notify the netblock owner.

        But if it's repeated spews from a specific netblock and notices to
the upstream go unheeded over several days, then I don't believe it's
bad
form to announce the problem to the world.  By that time, it's pretty
obvious that the connectivity provider is either oblivious or just
doesn't
give a fig and thus could use a bit of a rude awakening.

> horror stories aside, i just reccommend that we all obfuscate ip
> addresses we post here unless the situation definitely calls for it

        Eh...it's six of one, half a dozen of the other in my book.  I
don't see any harm in posting the IPs, and I don't see any benefit in
obfuscating them.  If someone wants your system bad enough, they'll
find a
way to get it...no matter how many smokescreens you toss up.

- - -Jay

   (    (                                                       
_______
   ))   ))   .-"There's always time for a good cup of coffee"-.  
>====<--.
 C|~~|C|~~| (>----- Jay D. Dyson -- [EMAIL PROTECTED] -----<) |   
= |-'
  `--' `--'  `---------- Si vis pacem, para bellum. ----------' 
`------'

- -----BEGIN PGP SIGNATURE-----
Version: 2.6.2
Comment: See http://www.treachery.net/~jdyson/ for current keys.

iQCVAwUBPAuyULlDRyqRQ2a9AQF2HgP/XpNawopwMoy1VCqXwjlOs4GtTdSpxhVY
M+aup8Acglb37/EPA+J4ryJ1ygoEL28rYFN8tXep1mSyRLe4YsvVUrC8/I807xq7
6xi0WS48jtKhbxKSxB5BYAPuMQxZJlGhbUKpd3bWUqF2IglwzoXbAZ9nHCUWwwOc
xvDjZyuHJc0=
=RxSd
- -----END PGP SIGNATURE-----


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com>

iQA/AwUBPA+9Y9qAgf0xoaEuEQIEQACglD1MOuH+1k9A9t4iepNy9PiGuUUAn0Fi
X86zkSAlbnOqbVzysX77sPtd
=jlNO
-----END PGP SIGNATURE-----

Reply via email to