Home page logo

basics logo Security Basics mailing list archives

RE: Spyware
From: "Jeff Gercken" <JeffG () kizan com>
Date: Wed, 15 Dec 2004 15:03:19 -0500

Perhaps you should petition IANA to allocate a TCP port for spyware :)

Egress filtering is a really good idea.  If more organizations did this
we would have much fewer problems to deal with.  The problem is, without
upper layer protocol detection (application proxies, NBAR, et al), a
TCP/UDP port is just an arbitrary number.  There is nothing stopping you
from running ssh on port 80 or chargen on port 22.  Filtering may stop
some of the dumber spyware, but it shouldn't be considered as a


-----Original Message-----
From: Matt Stern [mailto:sternm () comprehensive com] 
Sent: Tuesday, December 14, 2004 5:38 PM
To: security-basics () lists securityfocus com
Subject: Spyware

Hello all:

I was just wondering if spyware sends its answers "back home" on any 
particular TCP or UDP port.  If so, then couldn't I doubly safeguard the

LAN (after trying to keep all the spyware off the workstations) by 
disallowing outbound communications via the firewall, for those ports? 
 Or conversely, instead of allowing all outbound traffic, only allow the

usual ports, such as 80, 443, 23, etc?


Matthew H. Stern, CCP/CDP, sternm () comprehensive com
Serving the IT industry since 1976
Comprehensive Computer Services Inc.
Phone: 631 755-2250, Fax 755-2254
560 Broad Hollow Road, Melville NY 11747

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]