[e2e] What if there were no well known numbers?
Spencer Dawkins
spencer at mcsr-labs.org
Thu Aug 3 05:15:24 PDT 2006
Hi, Fergie,
I was confused when I read this the first time, so kept reading. I think I
understand where you're coming from now. Please let me try to restate...
> Not responding necessarily to Christian, but more to the fallacy
> that blocking ports (paraphrased) "...doesn't achieve anything."
>
> That's a ridiculous assumption.
>
> When threat intelligence is gleaned in (near) real-time, and
> aged appropriately (bad stuff is taken off-line), blocking it
> (or perhaps, access to it, as the case may be) achives a great
> deal. Depending on what you want to achive.
You're coming from previous experience where people closed down specific
ports, based on attacks that were exploiting the availability of specific
ports.
If this is what you are saying, I agree. Detecting 135/TCP scans was the
documented detection method for Blaster, for example.
I think the "...doesn't achieve anything" is looking a bit further down the
road, and a bit further from side to side going down the road:
- attacks are forced onto the same (usually open) ports as well-known
applications, as network administrators move to "white lists" for ports, and
- as more and more application protocols are port-agile, you have less and
less clue about what the traffic actually is, if you care about more than
"is this an attack?".
with "everything over port 80" being the terminal condition (there is only
one port that you can count on, so all application protocols and all attacks
use port 80).
Does this make sense?
Thank you,
Spencer
More information about the end2end-interest
mailing list