RE: [fw-wiz] Log checking?
From: Desai, Ashish (Ashish.Desai_at_fmr.com)
To: "Paul D. Robertson" <email@example.com>, <firstname.lastname@example.org> Date: Tue, 28 Sep 2004 18:27:24 -0400
I would recommend you also look at your web proxy logs.
Especially for 'CONNECT' method (which is an SSL connection).
There are too many people who have figured out how to
ab(use) it. We are now also starting to see VPN software
that is going to start using that method and at that point
its pretty much game over.
We have found very interesting things when CS interns start
working at our company and they start using this channel to
get to the outside. Besides its a lot of fun looking at
what people are querying at google ;-)
> -----Original Message-----
> From: Paul D. Robertson [mailto:email@example.com]
> Sent: Tuesday, September 28, 2004 4:05 PM
> To: firstname.lastname@example.org
> Subject: [fw-wiz] Log checking?
> Back when I had real production firewalls, I'd log all the permitted
> traffic for a while, then do some analysis of the data to get a
> feel for things like tunnels, misbehaving users, etc.
> I've always felt that worrying about denied traffic was
> mostly for sport-
> if the firewall's policy blocked it, I wasn't all that
> worried about much
> more than overall trends- what got *through* the firewall
> seemed to be the
> more interesting set of things.
> I'm just wondering if the subset of folks who actually look at their
> firewalls mostly looks at denied traffic only, or if it's a common
> practice to look at the permitted stuff too? If so, what
> sorts of things
> are you using, and are you finding anything interesting?
> Paul D. Robertson "My statements in this message are
> personal opinions
> email@example.com which may have no basis whatsoever in fact."
> firstname.lastname@example.org Director of Risk Assessment
> TruSecure Corporation
> firewall-wizards mailing list
firewall-wizards mailing list