Re: [fw-wiz] DNS Names for external services
- From: david@xxxxxxx
- Date: Sun, 9 May 2010 12:54:10 -0700 (PDT)
On Mon, 26 Apr 2010, Morty Abzug wrote:
On Fri, Apr 23, 2010 at 12:20:17PM -0700, david@xxxxxxx wrote:
Likewise, if you don't run an FTP server (or CVS, or POP3, or...),
setup DNS records for those pointing to your honeypot. Use it to
respond in anyway you see fit for defense of your network (blocking
the IP, etc).
What happens when one of your legit users says "I wonder if we have an
FTP server?" and tries ftp.$YOURCOMPANY.com just to see if it answers?
if your server is locked down, nothing (other than an additional
Re-read above. GP advocated setting up a honeypot on well-known names
that *blocks* the source IP. The problem with this is that if
$legit_user of your company/organization says 'hey, I see
"ftp.$mycompany.com" resolves' and tries it, you will block
$legit_user's source IP.
so an attacker scan you from many different IP addresses, in different orders, and then uses different addresses to attack you.
your approach helps, but will not keep you safe.
firewall-wizards mailing list
- Prev by Date: Re: [fw-wiz] Firewall best practices
- Next by Date: Re: [fw-wiz] Firewall best practices
- Previous by thread: [fw-wiz] a cutting-edge open-source network security project
- Next by thread: [fw-wiz] Call for papers: ISP-10, USA, July 2010