nanog mailing list archives

Re: Extreme spam testing


From: Chris Brenton <cbrenton () chrisbrenton org>
Date: Mon, 22 Dec 2003 20:00:32 -0500


On Mon, 2003-12-22 at 16:55, Andy Dills wrote:

This is going to sound really snippy, but who died and made then
god/goddess of the Internet? Where is the document trail empowering them
to be spam cops of the Internet with absolute authority to probe who
ever they see fit?

This is a can of worms with no answer. Who gives authority to IANA for
that matter?

That was my point. I was responding to someone that was implying that
njabl was doing this for the benefit of everyone and thus had some
authority to do so. Obviously that's not the case.

Humm. This is something I have not run into before. Can you supply a URL
that explains how to relay mail though a Telnet or RADIUS server?

No, but I can supply a URL that explains how to change the port that proxy
servers bind to. I don't think you actually need that, though.

You really think people who professionally hack servers and setup spam
relay proxies put them on the standard ports?

Again, this was my point. Finding out if I have an exposed RADIUS server
is not really evidence that I'm running an open SMTP proxy. So where
does it stop? Scanning all 65K ports? Full OS fingerprinting to shun the
most compromised OS's? Maybe we insist on being provided with root
access to verify the box as being clean before we accept their e-mail?
This slope can get pretty scary.

LOL! I see, this is my fault because I actually take steps to secure my
environment. ;-)

No, but it is your fault for overreacting to your IDS.

I honestly don't think I over reacted. My original post labeled the
traffic as simply "interesting" and I stated I was posting it in case
others were interested and had not noticed it in their logs. No call to
arms, flames, or rants for wide spread blacklisting, just an FYI in case
others found the info useful.

Security doesn't require an IDS. An IDS merely tells you who's checking
your doorknobs to see if they're locked. If you do a good enough job
keeping your doors locked, an IDS is little more than a touchy doorbell at
3 AM, being tripped by the wind.

An IDS is more like an empty box. One person may look at it and see a
simple storage device. Show it to a 5 year old however and it becomes a
boat, a plane, a car, a castle, etc. etc. etc. I mentioned in another
thread that I've caught plenty of 0-day stuff with my IDS. In other
words, stuff that had no known signatures or patches. Its also helped me
out in a fair amount of troubleshooting. Its all a matter of being
inventive and knowing what to look for. If you perceive your IDS to be
"little more than a touchy doorbell", I would highly recommend attending
SANS IDS training. It'll open your mind and show you a wealth of other
possibilities. 

Regards,
Chris



Current thread: