Blame it all on the firewall!

Jeremy Fowler jfowler at westrope.com
Fri Apr 4 18:01:44 CST 2003


Well, it's not an end-all solution. I know that you can configure bo2k to run on
any port you choose and it can use either TCP or UDP. So limiting those ports
only stop the lazy script kiddies. Just blanket blocking packets that *might*
come from a nefarious application might actually stop valid traffic. Most
internet applications choose an outgoing port at random from the upper range
(1024-65536). If by chance it chooses a blocked port the connection will
obviously fail. That's why Statefull firewalls are so wonderful. However, you
have to setup your rules to make sure that valid Statefull packets are
accepted - which just might be the case in Matt's situation. Also, a good IDS
like snort can dismantle the packets and look for patterns/fingerprints in the
data that match patterns from those apps no matter what port they come in on. So
there is no one solution to network security. It usually requires multiple
solutions - with back-up solutions for those solutions.

> -----Original Message-----
> From: owner-kclug at marauder.illiana.net
> [mailto:owner-kclug at marauder.illiana.net]On Behalf Of Matt Luettgen
> Sent: Friday, April 04, 2003 9:52 AM
> To: kclug at kclug.org
> Subject: Re: Blame it all on the firewall!
>
>
> I know what they are, I'm wondering why smoothwall doesnt have them
> closed instead of filtered
>
> On Fri, 04 Apr 2003 09:22:32 -0600
> Jason Clinton <jasonclinton at kcpipeband.org> wrote:
>
> > Matt Luettgen wrote:
> > > I was doing some port forwarding last night with smoothwall and when
> > > I was done I had someone nmap me from the outside world, everything
> > > looked normal but two ports which concern me because of the windows
> > > boxes on the network.
> > >
> > > 31337/tcp  filtered    Elite
> > > 54320/tcp  filtered    bo2k
> > >
> > > Any ideas of why Smoothwall wouldnt be blocking these?
> >
> > The second one is Back Orifice 2000. Back in my script kiddie days,
> > this handy little tool would allow you to completely control a remote
> > computer. It's quite dated, now.
> >
> > I don't know about the first one. I assume both of these are to block
> > standard trojan traffic.
> >
> > --
> > Jason Clinton
> > I don't believe in witty sigs.
> >
>
>




More information about the Kclug mailing list