[55280] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: management interface accessability (was Re: Worm / UDP1434)

daemon@ATHENA.MIT.EDU (Chris Lloyd)
Sun Jan 26 13:37:26 2003

Date: Sun, 26 Jan 2003 18:36:49 +0000
From: Chris Lloyd <strawberry@toth.org.uk>
To: NANOG <nanog@merit.edu>
In-Reply-To: <ROTMAILER.0301261206160.15961-100000@dragon.sauron.net>; from robt@cymru.com on Sun, Jan 26, 2003 at 12:08:07PM -0600
Errors-To: owner-nanog-outgoing@merit.edu


On Sun, Jan 26, 2003 at 12:08:07PM -0600, Rob Thomas wrote:
> Just a point here:  Many road warriors are work-at-home folks who have
> their computers on 24x7.  They may be infected, and will fire up their
> VPN tunnels Monday morning.  This may introduce the worm into the chewy
> center of many corporate networks.  Hopefully folks have put the proper
> filters in place on their VPN access points.

Personally, I think it's unlikely the situation will get worse on Monday
because of people starting work. The first reason is that you can only get
infected if you're running SQL server (or MSDE) at home and someone sends you
one of the special packets. The second reason is that you, if you're infected,
send the packets to random IP addresses, and not only do you have to randomly
choose an address on the corporate LAN, but it has to be a machine running
SQL server. To my mind the probability of all these things being the case
is microscopic!

 - Chris

--
strawberry@toth.org.uk
http://www.toth.org.uk/~strawberry

home help back first fref pref prev next nref lref last post