Full Disclosure mailing list archives

Re: The worm author finally revealed!


From: futureshoks () hushmail com
Date: Fri, 31 Jan 2003 09:09:04 -0800


-----BEGIN PGP SIGNED MESSAGE-----

(Again no personal attacks: I respect what you guys have to say).


[Paul Said:]
Firewall?  DMZ?  What makes you think everybody has those?  How 'bout an
even more esoteric question?  Why do the tier 1 providers (like UUNET)
allow traffic on port 1434???
[/Paul]

Because its not their call. I could write an EncryptoWidget for my company and have is using 1434/UDP - what right does 
my ISP or any other carrier have to decide what ports I can and can't use?

With an increase of traffic moving over TCP port 80: remote desktop control[1], SSL VPNs[2], to name a few, 
conventional firewalling will surely become somewhat moot. We'll all be wrapping things up as MIME-encoded HTML (and 
wasting a whole load of bandwidth too) just to get through the firewall. I have actually seen products advertised as 
"can be used from any PC with a web browser so as avoid internet firewalls".

We're just moving sideways if people think like this; Security is a hinderance to be avoided. So yes you are right 
about education and taking the initiative. If someone could only come up with that elusive formula that showed how 
increased security was directly proportional to Management bonuses we'd be laughing :)

[Mark Said:]
It also shows how many companies could give two sh!ts about
patching and firewalling important boxes internally.
[/Mark]

Whilst contacting (read 'forcing') people to patch their SQL Servers once and for all or be thrown off the network I 
constantly met with the same response: "but it's behind the firewall isn't it". This goes to show that even when people 
do recognise the security issues abound on todays Internet they don't understand the nature and technicalities of 
exploits. They don't know that some traffic can transverse firewalls when it's not supposed to. They don't know about 
VPN connections to branch offices. They don't know about firewall interfaces, DMZs, etc, etc. As long as the port is 
blocked to the world then we're all safe.

[Mark Said:]
This goes FAR beyond forgetting to install a simple patch, I think
it shows just how many poeple out there have no port filtering
in place and probably check off "full install" on their windows
servers without a second thought.
[/Mark]

That's because they're all textbook MCSEs without an once of noodle between them (or they're developers: I swear 
without developers our network security would increase ten-fold) and are more interested in getting things to work than 
security. Afterall IT that isn't working is just a waste of money.

________
[1] http://www.webex.com
[2] http://www.nortelnetworks.com/products/01/alteon/sslvpn/

-----BEGIN PGP SIGNATURE-----
Version: Hush 2.2 (Java)
Note: This signature can be verified at https://www.hushtools.com/verify

wmAEARECACAFAj46rjIZHGZ1dHVyZXNob2tzQGh1c2htYWlsLmNvbQAKCRCz85xsvW2z
xZxgAKC2o1Wxe+EgrO0snDEtrCN7RUHfvACfbq+dEMbg+GXIHWzT5EHqoHijFL8=
=kGOH
-----END PGP SIGNATURE-----




Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2 

Big $$$ to be made with the HushMail Affiliate Program: 
https://www.hushmail.com/about.php?subloc=affiliate&l=427
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: