[60467] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Port blocking last resort in fight against virus

daemon@ATHENA.MIT.EDU (Sean Donelan)
Tue Aug 12 22:43:12 2003

Date: Tue, 12 Aug 2003 22:42:38 -0400 (EDT)
From: Sean Donelan <sean@donelan.com>
To: nanog@merit.edu
In-Reply-To: <E19mbG9-000Ij4-99@ran.psg.com>
Errors-To: owner-nanog-outgoing@merit.edu


On Tue, 12 Aug 2003, Randy Bush wrote:
> > Is it just me that feels that blocking a port which is known to be used
> > to perform billions of scans is only proper?
>
> the second, and important part of the, question is whether there
> are legitimate packets to that port which want to cross your border.
> for 135, i am not aware of any that should cross my site's border
> un-tunneled.

Who should determine what protocols can cross your site's border router?
You or your ISP (ignoring the fact a lot of people on this list are their
own ISP)?

80% or more of customers wouldn't notice if you blocked everything on
their connection except HTTP/HTTPS and DNS.  So why do ISPs let all
the other infection laden protocols reach their customers?

Fix spam - block port 25
Fix Slammer - block port 1434
Fix Blaster - block port 135
Fix KaZaA - block everything

I think filters/firewalls are usefull.  I believe every computer should
have one.  I have several.  I just disagree on who should control the
filters.


home help back first fref pref prev next nref lref last post