[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200302101023.08008.david_laporte@harvard.edu>
From: david_laporte at harvard.edu (David LaPorte)
Subject: SQL Slammer - lessons learned
Not sure if this is dated (I'm not an AT&T customer), but AT&T was filtering
port 80 as a result of Code Red. This document leads me to believe it will
continue indefinately.
http://help.broadband.att.com/faq.jsp?content_id=792&category_id=54
(you need to choose your state and choose Broadband Internet)
David
On Monday 10 February 2003 09:48, Schmehl, Paul L wrote:
> -----Original Message-----
> From: John.Airey@...b.org.uk [mailto:John.Airey@...b.org.uk]
> Sent: Monday, February 10, 2003 4:24 AM
> To: guninski@...inski.com; Schmehl, Paul L
> Cc: full-disclosure@...ts.netsys.com
> Subject: RE: [Full-Disclosure] SQL Slammer - lessons learned
>
> >Code Red/Nimda have fizzled out (probably still some infected
> >machines out there), since it is possible to block ports below
> >1024.
>
> Huh? Our IDSes detect both Code Red I, II and III and Nimda every day,
> as does my Wormcatcher. I don't know *anyone* who is blocking port 80.
> Do you?
>
> Paul Schmehl (pauls@...allas.edu)
> Adjunct Information Security Officer
> The University of Texas at Dallas
> http://www.utdallas.edu/~pauls/
> AVIEN Founding Member
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
--
David LaPorte, CISSP
Senior Network Security Engineer
Harvard University Information Services NOC
-----------------------------------------------
Email: david_laporte@...vard.edu
PGP: 0x4DC3E508
4A1F058DB2B32FEF10A14F6BD370A6AD4DC3E508
Powered by blists - more mailing lists