Computer security - NAC
Brett Dikeman
quattro at pdikeman.ne.mediaone.net
Mon Oct 23 21:15:05 EDT 2000
At 3:05 PM -0400 10/23/00, Robert Myers wrote:
>All this is freeware. If you are concerned over potential
>vulnerability then this may be a way for you to achieve some level
>of security. If anyone would like some URLs, lemme know.
Some is the key word here.
The free firewalls, save the BSD and Linux based, dedicated-machine
systems, are for the most part worthless. Even the ones you have to
pay for are usually pretty crappy.
Even checkpoint, which is considered top of the line enterprise
solution(costing MANY thousands of dollars), failed a lot of basic
tests in the NT version because they failed to replace a lot of NT's
networking code; the joke being that the firewall itself was then
vulnerable to the attacks it was trying to protect other systems
from. The Solaris version is another story entirely.
Also, beware of the security scanning tools; they're basic at best,
and usually intended only to "scare" you and get you to buy the
associated software package which will, of course, make your computer
-more- secure(more=some.) They're not out to check your
firewall...they're just interested in the guys and gals who don't
have anything(aka the "Something on the web said my computer wasn't
secure! Oh my god!" :-)
I haven't heard anything about the tools Bob is using...good or bad,
so I'm neutral. OTOH, I've never heard of the company or the
product, which tends to put something lower on my list.
Like with anything else, use Bob's positive experience as
encouragement to check out the software, hunt down some reviews. If
you don't find this package, you might find a different one. There
ARE some freeware jems out there(and if they're true jems, there will
be plenty of user comments and reviews out there to prove it), but
even those can have some big holes; there was one particular Windows
based free router/NAT package which had a MASSIVE security hole; it
was so bad, that even the cable/DSL ISP's were scanning their
customers to detect the program, and disabling their accounts.
There -are- exceptions to both the web-based scanning tools and the
personal firewall programs, but they're rare.
The most secure solution(but also the most expensive for a SOHO
situation) is usually something like the various SOHO firewall
"appliances" running around. I would recommend a WatchGuard Firebox
SOHO for the basic user; SonicWall makes a VERY nice unit that has
some extremely advanced features; for example, I get paged if someone
tries an attack on the firewall; it also has logging to a syslog
server, or sending me logs every 7 days or when they fill...via
email. If you don't know what syslog is, the Sonicwall is probably
overkill for you; it's expensive and not worth it if you don't
want(or can't use) the additional features.
The logs show a frightening amount of attacks; it recognizes many of
them(something the watchguard was quite poor at BTW.) It's been
quiet recently, since at the moment, I don't have web or incoming
mail enabled. When I did, however, i was barraged with attacks, port
scans, the whole 9 yards. A day worth of logs would span more than a
page of single-line items. People see a few common services, and
that leads them to believe that your system is worth poking at.
Scans for windows exploits are by far the most common. Occasionally
I see something more unusual, like Sun RPC attacks, things like that.
Every once in a while, I look up the IP address in the logs and fire
off an email to the source ISP :-)
Bret
--
----
Brett Dikeman Systems Engineer
CFN(formerly iClick, Inc) 914-872-8043
120 Bloomingdale Rd. 914-872-8100(fax)
White Plains, NY 10605 http://www.iclick.com
PGP Fingerprint: 06C2 5D5B D2B4 7626 BB24 2BBC 9E4A C8B3
PGP Key location: http://pdikeman.ne.mediaone.net/pgp/brett.pgp
More information about the quattro
mailing list