Home page logo

fulldisclosure logo Full Disclosure mailing list archives

RE: Re: Microsoft Security, baby steps ?
From: John.Airey () rnib org uk
Date: Thu, 18 Mar 2004 12:29:04 -0000

-----Original Message-----
From: Geo. [mailto:geoincidents () getinfo org]
Sent: Wednesday, 17 March 2004 18:26
To: John.Airey () rnib org uk; full-disclosure () lists netsys com
Subject: RE: [Full-disclosure] Re: Microsoft Security, baby steps ?

From experience, you can't just lock down to that one server. 
You need to
allow port 80 and 443 access to different servers. Each day 
the list of
servers changes because of the Akamai caching that is used. I 
spend some
time configuring locked down systems to be able to talk to 
them. So yes, it
is an unreasonable request.

Actually you can, you simply enable IP Filtering. Since it blocks only
inbound connections you can then go out and do the 
windowsupdate dance.
Works on both W2K and XP.

The problem comes in when the rules wherever you are say that 
you must be
fully patched to get access to the internet or secure network.


In some cases this isn't enough. Let's say that the machine in question is a
public web server. It doesn't need to initiate connections bar those
necessary to keep it patched. In fact, set up this way it would be unable to
spread any worm to any other machine outside your organisation. Also, anyone
who compromises it will find it a rather dull experience. Sure, you can
trash all the files you find, but that's about it.

My point was that it's extremely difficult to lock down the connections with
Windows Update in these cases.

John Airey, BSc (Jt Hons), CNA, RHCE
Internet systems support officer, ITCSD, Royal National Institute of the
Bakewell Road, Peterborough PE2 6XU,
Tel.: +44 (0) 1733 375299 Fax: +44 (0) 1733 370848 John.Airey () rnib org uk 

Shameless movie plug - go see the Passion of the Christ!


NOTICE: The information contained in this email and any attachments is 
confidential and may be privileged. If you are not the intended 
recipient you should not use, disclose, distribute or copy any of the 
content of it or of any attachment; you are requested to notify the 
sender immediately of your receipt of the email and then to delete it 
and any attachments from your system. 

RNIB endeavours to ensure that emails and any attachments generated by 
its staff are free from viruses or other contaminants. However, it 
cannot accept any responsibility for any  such which are transmitted.
We therefore recommend you scan all attachments. 

Please note that the statements and views expressed in this email and 
any attachments are those of the author and do not necessarily represent 
those of RNIB. 

RNIB Registered Charity Number: 226227 

Website: http://www.rnib.org.uk 

Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]