lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20040310233039.38531.qmail@web60906.mail.yahoo.com> From: lazzy_8 at yahoo.com (Richard Compton) Subject: Comcast using IPS to protect the Internet f rom their home user clients? They are beta testing the TippingPoint IPS. -----Original Message----- From: full-disclosure-admin@...ts.netsys.com [mailto:full-disclosure-admin@...ts.netsys.com]On Behalf Of Frank Knobbe Sent: Wednesday, March 10, 2004 12:53 PM To: Chmielarski TOM-ATC090 Cc: full-disclosure@...ts.netsys.com Subject: RE: [Full-Disclosure] Comcast using IPS to protect the Internet f rom their home user clients? On Wed, 2004-03-10 at 07:46, Chmielarski TOM-ATC090 wrote: > Yes, they say they are now doing this. > http://www.infoworld.com/article/04/03/09/HNcomcastspam_1.html But this article says they are shutting systems down once identified as a spam/hack/dos zombie. This can be done easily by reconfiguring the Cable modem or removing MAC addresses from filter/pass tables (don't know what types of access controls are in place over there). It doesn't say they are using an inline IDS/IPS. Where would those IPS's be? At the major NAPs or peering points? Or distributed in regional hubs? I'm curious how they are dealing with the performance impact. Perhaps they are using ASIC based IPS's, or very limited signature sets (which would explain why a whisker scan completes unimpeded, but a nikto scans hangs at the same "spot"). So far, a couple others reported that they noticed the same behavior. I haven't heard anyone say "my scans are not affected". To reproduce the test, fire off a nikto scan against a remote web server (remember, get permission first). See if nikto completes without getting stuck. (I used a recent nikto from the FBSD ports tree). Anyhow, finding spam sources and bandwidth hogs and turning them off manually is one thing. Having an network-based intrusion prevention system sitting in their wires is another. Perhaps they are beta testing that as an additional method to weed out bad traffic? Regards, Frank PS: I'm completely okay with them filtering as long as they allow me to tunnel my traffic to corporate servers. Whatever it takes to get rid of spam is fine with me... --------------------------------- Do you Yahoo!? Yahoo! Search - Find what you’re looking for faster. -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040310/d0c43479/attachment.html
Powered by blists - more mailing lists