LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Closed Thread
  Search this Thread
Old 12-15-2010, 04:49 PM   #1
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Rep: Reputation: 57
Firewall that shows "whois" info for ALL new connections?


Does a firewall exist, that shows "whois" info for ALL new connections that are attempted? Or even better, "smartwhois" info?

New connections meaning, connections to IP blocks never connected to before.

So you go to a site that belongs to owner A, and if an attempt is covertly made to connect to another site that belongs to owner B, an alert is shown and you choose if you trust this owner. So you build a white list of trusted ip owners.

I'd even pay for such a product.

Last edited by Ulysses_; 12-15-2010 at 04:54 PM.
 
Old 12-15-2010, 05:16 PM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599
Quote:
Originally Posted by Ulysses_ View Post
Does a firewall exist, that shows "whois" info for ALL new connections that are attempted?
It might on the other "OS"? It'll be deity-awful slow having to stall the connection while pulling up the information.


Quote:
Originally Posted by Ulysses_ View Post
if an attempt is covertly made to connect to another site that belongs to owner B
OK, so what about connections made to other sites from behind say their proxy?
And what does WHOIS information convey in terms of security in these days of proxy registrations?


Quote:
Originally Posted by Ulysses_ View Post
So you build a white list of trusted ip owners.
Trust based on what? Whose expert knowledge?
 
Old 12-15-2010, 05:43 PM   #3
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
Quote:
Originally Posted by unSpawn View Post
It might on the other "OS"? It'll be deity-awful slow having to stall the connection while pulling up the information.
It's only done the first time.

Much like training comodo firewall, but instead of per-application allows you define per-ip-owner allows as you go along.

Quote:
OK, so what about connections made to other sites from behind say their proxy?
If you mean that a web page can load scripts from other sites through a proxy of their own, you can't do much about it. If it's a proxy of someone else, then that can be detected and blocked.

My concern is more about an infected pc connecting covertly to places that are not expected. I would have the firewall on another pc, I do this already with a vyatta VM but their firewall is just iptables, no GUI interaction or training.

Quote:
And what does WHOIS information convey in terms of security in these days of proxy registrations?
So can someone register as Amazon Inc and no one would check?

Quote:
Trust based on what? Whose expert knowledge?
One rule of thumb, a site should work without help from other sites.

Second, if the previous rule is broken, the other sites should be registered to the same owner.

Third, if the previous rule is broken, it's probably stuff like googlesyndication and adware that I have disabled already with the NoScript addon of firefox, most sites that use them work without them also.

So the final rule of thumb is, if in doubt, disallow. And watch if the site you want works, it probably will.

Last edited by Ulysses_; 12-15-2010 at 06:14 PM.
 
Old 12-15-2010, 06:14 PM   #4
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599
Quote:
Originally Posted by Ulysses_ View Post
My concern is more about an infected pc connecting covertly to places that are not expected.
If a machine is (perceived) infected then the last thing it needs is a working network connection: address on the cause, not the symptoms.


Quote:
Originally Posted by Ulysses_ View Post
So can someone register as Amazon Inc and no one would check?
I'm sure you can register a typosquat like Amaazon Inc or Amazonn Inc but even without DNS hijacking or whatever else tricks some people wouldn't be able to distinguish between amazon.secure.cat/books, amazon.org/buynow or paypal.amazon.com.gq/secure/online/payment anyway. Of course I meant the other way around: there's a lot of official-sounding domain names that have no meaningful WHOIS record, so "trusting" WHOIS seems like a flawed idea to begin with.


Quote:
Originally Posted by Ulysses_ View Post
One rule of thumb, a site should work without help from other sites.
With all due respect but these and the next sound like we're back in the NCSA Mosaic era ;-p
 
Old 12-16-2010, 11:26 AM   #5
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
Quote:
Originally Posted by unSpawn View Post
If a machine is (perceived) infected then the last thing it needs is a working network connection: address on the cause, not the symptoms.
Long gone are the days when it was enough to only think about prevention.

Quote:
I'm sure you can register a typosquat like Amaazon Inc or Amazonn Inc
Cool. Then we'll keep our eyes open, innit. You do that already when you're typing url's. Or reading url's in the address bar before filling in private data in a form.

Quote:
but even without DNS hijacking
That's easy to counter, you set the adsl router to use google's 8.8.8.8 instead of the default automatic dns server discovery which ends up with the isp's possibly poisoned dns server.

Quote:
or whatever else tricks some people wouldn't be able to distinguish between amazon.secure.cat/books, amazon.org/buynow or paypal.amazon.com.gq/secure/online/payment anyway.
That's the issue we already are supposed to be careful with when typing url's or filling in forms. A firewall returning whois info before going to amazon.secure.cat/books does not need any more carefulness but the same or less.

Quote:
With all due respect but these and the next sound like we're back in the NCSA Mosaic era ;-p
Haha. Maybe you've just had a psychic moment, I was writing yesterday about my use of Mosaic in 1993 and 1994, which I never have mentioned before. The Wave is approaching, psychic phenomena are getting more common. Returning to technical issues, why don't you open 10 random sites from google and see how many thought it was wise to rely on scripts from other sites. And then find 10 sites using other sites and see how many work with the other sites disabled with NoScript.

I have found that almost all sites work alone by design or with the scripts from elsewhere disabled with NoScript. The real issue is not helper sites that NoScript can block, but backdoors attempting to connect to malicious places independently of any browsing you do.

Last edited by Ulysses_; 12-16-2010 at 11:41 AM.
 
Old 12-16-2010, 11:47 AM   #6
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599
No matter what you will not be able to discern from WHOIS information alone that something indeed is "safe" or "trustworthy". Holding such a view of the 'net as you do and trying to impose your own "rules" can only lead to white-listing.
 
Old 12-16-2010, 04:13 PM   #7
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
I bet you didn't read to the end. Anyway, the NoScript author clearly does not agree with your opinion, and neither do I, so the question for us remains:

What's a comodo-like firewall that integrates smartwhois lookups during its GUI-based training?
 
Old 12-17-2010, 05:24 AM   #8
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599
Quote:
Originally Posted by Ulysses_ View Post
the NoScript author clearly does not agree with your opinion
I'm going to ask you to back that up by posting links to specific and relevant documents.
 
Old 12-17-2010, 09:32 AM   #9
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
You can conduct analysis on firewall logs without needing to resolve IPs to names. If your investigations depend on that, you're doing it wrong.

Seeing as to how argumentive you are with unSpawn, I really don't see why you're even asking questions...it seems you know it all already. Are you asking for help or just looking to debate?
 
Old 12-17-2010, 10:37 AM   #10
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
Quote:
Originally Posted by unixfool View Post
I really don't see why you're even asking questions...it seems you know it all already.
I'm not asking "what do you recommend should or shouldn't be done", even though any input in this area is welcome too. I'm asking "do you know any software that can do this?". Any opinion against such software, eg against NoScript, is welcome. Just allow people to disagree, maybe they have a lot of specific experience with NoScript that you do not have.

NoScript is firefox-specific, I am asking for system-wide implementation of the same thing.

NoScript does NOT ask you "connect to this?", "connect to this?", "connect to this?". It just blocks everything be default, you only see the content at the url in the address bar, minus the scripts from that url. If the site doesn't work, you right-click an icon at the bottom and it shows a list of blocked domains to choose which one to unblock first, if any. Judgement is asked for here from the user, should they trust "googlesyndication" say, in order to read some blog? That's where the author of NoScript disagrees with you, unspawn. He asks for judgement to be exercised from the user. Here's the list his addon shows at ebay.com:

http://img814.imageshack.us/img814/3750/noscript.gif

EDIT: I've visited ebay before and enabled both entries, but by default they were all in the blocked state.

NoScript comes with TOR-preconfigured firefox'es like xbBrowser or xbMachine, and considered essential for TOR. It also comes with the firefox in the hacker-favorite backtrack CD. I've been using NoScript for some two or three years.

The next logical step would be to make this system-wide, instead of getting a comodo firewall popup like this:

http://www.labnol.org/assets/images/...dofirewall.gif

I'd prefer a popup that shows the best whois info for this IP. Inverse dns might be something too, but ideally I'd like to see smartwhois info at such popups.

Last edited by Ulysses_; 12-17-2010 at 10:57 AM.
 
Old 12-17-2010, 12:11 PM   #11
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
Quote:
Originally Posted by Ulysses_ View Post
I'm not asking "what do you recommend should or shouldn't be done", even though any input in this area is welcome too. I'm asking "do you know any software that can do this?". Any opinion against such software, eg against NoScript, is welcome. Just allow people to disagree, maybe they have a lot of specific experience with NoScript that you do not have.
1. Install a HIDS or a host-based FW/IPS.
2. Leverage a proxy...there are several out there.
3. Have you contacted NoScript's developer? If not, maybe you should. If you have and are still stuck, you might want to look at #1 & #2 again.

Basically, layer your security so that your security risks are mitigated/lessened. A LOT of current OSS security software can perform DNS resolution, but again, just knowing who it is that your host/software is blocking doesn't really result in much. So, you know who attacked you...do you know why? Do you know how? Do you know what he/she is doing, in detail? NoScript certainly won't provide that level of detail.

I could care less if you agree or disagree...you just need to be clear on what you want. Also, disagreeing with someone who's trying to help you ends up with you not getting help and it tends to waste people's time. Experience with NoScript? You act like NoScript is some highly placed, best-of-breed, enterprise tool or something. While NoScript works well, it's not doing something that can't be manually done (or not done).

Can you address what unSpawn last asked of you?
 
Old 12-17-2010, 12:23 PM   #12
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
The proof for unspawn is in the pictures. Haven't you looked at them? How on earth would the author of NoScript list "ebay.com" and "ebaystatic.com" in that popup, if they didn't expect the user to exercise judgement on domain names? Which is just like exercising judgment on ip owner names like "Ebay Inc".
 
Old 12-17-2010, 01:32 PM   #13
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
From the NoScript site:

Quote:
NoScript for Firefox pre-emptively blocks malicious scripts and allows JavaScript, Java and other potentially dangerous content only from sites you trust.
The key words are "only from sites you trust." How does it do that? You have to tell it to trust!

The user isn't expected to make judgement calls on domain names alone... You can still view a page that NoScript flags...it just won't execute scripts and such. I just viewed my own pages with NoScript, ensuring that NoScript had the website flagged. I was able to view ALL the content fine (my pages have minimal script), even when I saw that NoScript had it flagged.

So, it blocks ALL scripts and allows only what you tell it...sorta like a firewall, right? Are firewalls infallible? No! If you only use firewalls to secure your network, you're in trouble or will be, eventually.

I don't think you understand NoScript as well as you think you do...

Last edited by unixfool; 12-18-2010 at 05:54 PM. Reason: minor edit
 
Old 12-18-2010, 01:19 PM   #14
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
Quote:
The key words are "only from sites you trust." How does it do that? You have to tell it!
What a shock it must have been, when you found this one out. As if you've just discovered what the hell NoScript does, despite all this repetition from myself. Maybe language was somewhat abstract and you missed much of what was said: I am expecting to see abstract ideas from NoScript like "block everything except what the user trusts and white-lists" transfered to another context, the one of the GUI-trainable firewall (not just any GUI firewall, but one like the one in the 2nd picture that trains as you go along), plus one new feature: whois info. So it doesn't matter if NoScript blocks scripts or images or bad words or frames, and I thought it was obvious NoScript only blocks scripts. The name is NoScript, not NoBaddies.

Quote:
The user isn't expected to make judgement calls on domain names alone... You can still view a page that NoScript flags...it just won't execute scripts and such.
I'm here to tell you almost ALL scripts from helper sites are just scripts, not entire pages that say "check out this porn but it may damage your computer". To confirm helper sites offer just scripts and very minimal other content if any, you have to use NoScript in the real world for 2-3 years. Either that, or take a seasoned user's word for it.

Quote:
Are firewalls infallible? No! If you only use firewalls to secure your network, you're in trouble or will be, eventually.
We agree on this. I'm just adding that a GUI-trainable firewall that shows whois info is less fallible than a primitive wrapper for iptables.

Last edited by Ulysses_; 12-18-2010 at 01:28 PM.
 
Old 12-18-2010, 04:45 PM   #15
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
I was using NoScript before it became popular. I elaborated on its purpose because you didn't appear to understand how it worked (which unSpawn hinted at).

You're just wasting this board's resources by not listening and being argumentive.
 
  


Closed Thread


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
"info ls" shows man page instead of info page lorenz Slackware 8 09-21-2007 08:47 PM
Windows equivalents for "tcpdump" or "whois"? zahadumy General 12 06-23-2006 03:48 PM
"rm -rf /tmp", now Evolution shows "(no folder displayed" Ed-MtnBiker Linux - Software 7 04-10-2006 04:05 PM
LE2005: MCC "monitor NW connections" only shows eth0 not ppp0?? registering Mandriva 7 09-16-2005 12:58 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 02:30 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration