[OZAPRS] Internet facing services, was Re: VK4TTT
Kim Hawtin
kim at hawtin.net.au
Wed Jan 5 15:15:34 EST 2011
In the interests of staying calm and constructive...
Ian Bennett wrote:
>> not responding to ICMP makes debugging and testing a joy.
> Keeps out tyre kickers too.
Perhaps, but for folks who are actually interested and would like to
learn more, its an entry barrier that doesn't help. Internet facing
services should do what your users expect.
The host didn't respond on port 80 in v4 or v6, nor ping. Know ports for
these services respond with 'filtered' with the usual discovery tools.
Is it dead? Is there a routing problem? Is there a firewall problem?
So, the community suggests there might be an issue and reports a bug...
Reporting bugs is an important part of the community in free and open
source software, not to mention commercial software. In the FOSS
community, its been very effective at progressing and pushing the
boundaries. Its certainly something the Amateur Radio community can use
to push back more boundaries. AR has effectively been doing it for the
last hundred years, but within the group. The Internet offers up access
and exposure to so many more people...
> If a host doesn't respond to pings, "they" assume it is not there and so look
> elsewhere.
"they" can use a range of tools of which ping is the first part.
If someone knows about a service that is advertised and have some
destructive intent that "they" might imply, then not responding to ping
makes the challenge all the more interesting.
Hidden in plain sight, is a very effective defense model.
The more you obscure things, the more interest you create.
I've been in this game a while, on both the service-provider and
pen-testing/security business. Its not hard to do right.
> Provided you know your network (and know what you are doing), you don't need
> ping for fault finding.
So you need to do some port scanning if you don't know what the services
are offered, note that 14580 isn't in the /etc/services of many systems.
nmap show some interesting things though...
I can understand that for a small group or an individual you might not
have much time to deploy intrusion detection and the simple "deny all,
allow only service ports" looks like an easy option. However at the
expense of much more on going support ;)
Doing what your users expect saves you time and effort in the future =)
Also responding to bug reports can be easier with a FAQ.
http://www.aprs.net.au/ has some of the answers, if you know its there.
Obviously I'm missing info in the big picture about APRS, but my license
upgrade isn't that far off. Then will also have more time to tinker with
APRS with the gear I've put aside for it.
regards,
Kim VK5FNET
More information about the OZAPRS
mailing list