Full Disclosure mailing list archives

RE: SQL Slammer - lessons learned


From: Paul Schmehl <pauls () utdallas edu>
Date: 05 Feb 2003 09:38:07 -0600

On Wed, 2003-02-05 at 06:55, John.Airey () rnib org uk wrote:

How the ports are managed by the ISPs is up to them. We have a managed
router where we block everything we can without breaking legitimate access.
However, not having a practical option to block certain ports is a problem.
My point was on the allocation and use by TCP/IP stacks.

Can you think of a legitimate reason why ISPs should allow ports
135-139/TCP/UDP to be open to the Internet?  How about port 445/UDP? 
Many ISPs now block port 25/TCP (for obvious reasons.)  Why not other
service ports?  What about the ISPs whose policy it is to not allow
customers to run servers?  Why should they allow any traffic at all from
the service ports?

Sure, you can block 1434 udp inbound, but what if your DNS server (that
doesn't run SQL server) picks that port randomly for incoming data from
other DNS servers? You'll get failures when you shouldn't.

No, you wouldn't, because DNS servers talk on port 53, and they wouldn't
negotiate port 1434 because it's reserved for SQL.

-- 
Paul Schmehl (pauls () utdallas edu)
Adjunct Information Security Officer
The University of Texas at Dallas
http://www.utdallas.edu/~pauls/
AVIEN Founding Member

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: