Re: Win11 explorer bug?

Liste des GroupesRevenir à se design 
Sujet : Re: Win11 explorer bug?
De : invalid (at) *nospam* invalid.invalid (Edward Rawde)
Groupes : sci.electronics.design
Date : 13. Dec 2024, 00:50:50
Autres entêtes
Organisation : BWH Usenet Archive (https://usenet.blueworldhosting.com)
Message-ID : <vjfssr$2k7k$1@nnrp.usenet.blueworldhosting.com>
References : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
User-Agent : Microsoft Outlook Express 6.00.2900.5931
"Don Y" <blockedofcourse@foo.invalid> wrote in message news:vjfobk$2vgfa$1@dont-email.me...
On 12/12/2024 2:31 PM, Joe Gwinn wrote:
The device has a limited life expectancy, anyway. About 10 years. The
boiler needs replacement of rubber gasket every year or two. There is a
mandatory yearly maintenance visit. With the remote controller,
maintenance visits are every two years, because the remote server
monitors the parameters and decides when a visit is needed.
>
So, that convenience is decisive for me. Win win.
>
A dodge occurs to me:  Install a simple firewall between external
Internet and internal network that hosts such things as cameras and
furnaces.  Set the firewall to accept only one of a small set of white
listed sources, and otherwise not to reply.
>
First, not all ISPs will allow inbound connections.  E.g., many
hide their subscribers behind NAT so incoming connections can't
find specific hosts.

They tried to put me on lsn/cgnat. I was given a static IPv4 when I complained.
Previously the IP had been sufficiently static but not totally static.

>
Second, there is nothing that prevents a device THAT YOU HAVE
WILLINGLY INSTALLED from having malware in it that compromises
your internal network.  This, because most folks only implement
perimeter security mechanisms.  So, a device is free to "call out"
and open a connection that allows an external actor to get past
any such peripheral defenses.

It's true that this is a situation you want to avoid but a properly designed internal network will not allow the malware free access
to services it doesn't have access credentials for. And devices such as cameras can be on their own internal network separately
packet filtered as necesary.

>
And, because any of your protections likely deal with the
internal vs. external networks as separate, homogenous entities,
there is no way for you to easily determine where (physically)
traffic is originating or terminating.  A device can pretend (from
the standpoint of packet inspection) to be any device on "your"
network.

That still doesn't mean it has access credentials for anything it shouldn't have.

>
[There are commercial devices available with exactly this capability,
used for pen-testing.]
>
White lists have the advantage of immunity to attempts from random
places.  The lack of response if not white listed will defeat most
port IP address and scanners, even though the firewall most likely can
be hacked if known.
>
Many appliances advertise their presence -- through established
protocols.  So, in addition to knowing it is there, they know WHAT
the device is and what rev level software, etc.
>
Building a collection of scripts that target specific vulnerabilities
in specific devices is then a practical attack plan.
>
Upgrade the firewall from time to time, to sorta keep up with the
threats.
>
The only practical way to protect a device (or network) is to impose
constraints on both ends.
>
E.g., my "knock protocol" burdens folks who try to access my server.
But, it keeps the server secure -- and well hidden.
>
In my distributed system project, I use separate tunnels from each
device to the switch.  So, the credentials for the device connected to
port #5 are of no value to you if you try to access the network
via port #8.
>
Furthermore, I know WHAT is at the end of each of those wires and
dynamically control the interactions allowed over those connections.
>
E.g., an "exposed/accessible" security camera should never have a need
to issue a command to open the garage door.  And, any attempt to do so
(assuming the encryption has been compromised by reverse-engineering
THE camera that was previously attached to that wire), will cause
the system to mark that network port ("wire") as tainted.  So, even if
you tried to feed bogus video (because I *think* you are a camera)
to the system, it would ignore that input.
>
Red/Blue team exercises are incredibly educational!  Until you actually
try to break security, you don't realize just how silly most mechanisms
actually are!
>
 



Date Sujet#  Auteur
9 Dec 24 * Win11 explorer bug?58john larkin
9 Dec 24 +* Re: Win11 explorer bug?50Martin Brown
9 Dec 24 i`* Re: Win11 explorer bug?49john larkin
10 Dec 24 i `* Re: Win11 explorer bug?48Martin Brown
10 Dec 24 i  `* Re: Win11 explorer bug?47john larkin
10 Dec 24 i   `* Re: Win11 explorer bug?46Martin Brown
10 Dec 24 i    `* Re: Win11 explorer bug?45john larkin
10 Dec 24 i     `* Re: Win11 explorer bug?44Martin Brown
10 Dec 24 i      `* Re: Win11 explorer bug?43john larkin
10 Dec 24 i       `* Re: Win11 explorer bug?42Martin Brown
11 Dec 24 i        `* Re: Win11 explorer bug?41john larkin
11 Dec 24 i         `* Re: Win11 explorer bug?40Martin Brown
11 Dec 24 i          +- Re: Win11 explorer bug?1Don Y
11 Dec 24 i          `* Re: Win11 explorer bug?38john larkin
12 Dec 24 i           `* Re: Win11 explorer bug?37Martin Brown
12 Dec 24 i            +* Re: Win11 explorer bug?35Don Y
12 Dec 24 i            i+* Re: Win11 explorer bug?26Carlos E.R.
12 Dec 24 i            ii`* Re: Win11 explorer bug?25Don Y
12 Dec 24 i            ii +* Re: Win11 explorer bug?2Carlos E.R.
12 Dec 24 i            ii i`- Re: Win11 explorer bug?1Don Y
12 Dec 24 i            ii +* Re: Win11 explorer bug?10Edward Rawde
12 Dec 24 i            ii i`* Re: Win11 explorer bug?9Don Y
12 Dec 24 i            ii i `* Re: Win11 explorer bug?8Edward Rawde
12 Dec 24 i            ii i  `* Re: Win11 explorer bug?7Don Y
12 Dec 24 i            ii i   `* Re: Win11 explorer bug?6Edward Rawde
12 Dec 24 i            ii i    `* Re: Win11 explorer bug?5Don Y
13 Dec 24 i            ii i     `* Re: Win11 explorer bug?4Edward Rawde
13 Dec 24 i            ii i      `* Re: Win11 explorer bug?3Don Y
13 Dec 24 i            ii i       `* Re: Win11 explorer bug?2Edward Rawde
13 Dec 24 i            ii i        `- Re: Win11 explorer bug?1Don Y
12 Dec 24 i            ii `* Re: Win11 explorer bug?12Jeroen Belleman
12 Dec 24 i            ii  `* Re: Win11 explorer bug?11Carlos E.R.
12 Dec 24 i            ii   `* Re: Win11 explorer bug?10Joe Gwinn
12 Dec 24 i            ii    +- Re: Win11 explorer bug?1Carlos E.R.
12 Dec 24 i            ii    `* Re: Win11 explorer bug?8Don Y
12 Dec 24 i            ii     +- Re: Win11 explorer bug?1Don Y
13 Dec 24 i            ii     `* Re: Win11 explorer bug?6Edward Rawde
13 Dec 24 i            ii      `* Re: Win11 explorer bug?5Don Y
13 Dec 24 i            ii       `* Re: Win11 explorer bug?4Edward Rawde
13 Dec 24 i            ii        `* Re: Win11 explorer bug?3Don Y
13 Dec 24 i            ii         +- Re: Win11 explorer bug?1Edward Rawde
13 Dec 24 i            ii         `- Re: Win11 explorer bug?1Edward Rawde
12 Dec 24 i            i`* Re: Win11 explorer bug?8john larkin
12 Dec 24 i            i +* Re: Win11 explorer bug?3Carlos E.R.
12 Dec 24 i            i i+- Re: Win11 explorer bug?1Don Y
13 Dec 24 i            i i`- Re: Win11 explorer bug?1Joe Gwinn
13 Dec 24 i            i `* Re: Win11 explorer bug?4Martin Brown
13 Dec 24 i            i  `* Re: Win11 explorer bug?3Don Y
13 Dec 24 i            i   `* Re: Win11 explorer bug?2john larkin
13 Dec 24 i            i    `- Re: Win11 explorer bug?1john larkin
12 Dec 24 i            `- Re: Win11 explorer bug?1john larkin
9 Dec 24 +* Re: Win11 explorer bug?3Joe Gwinn
9 Dec 24 i`* Re: Win11 explorer bug?2john larkin
9 Dec 24 i `- Re: Win11 explorer bug?1Joe Gwinn
9 Dec 24 +- Re: Win11 explorer bug?1Edward Rawde
9 Dec 24 `* Re: Win11 explorer bug?3Martin Rid
9 Dec 24  `* Re: Win11 explorer bug?2Jeroen Belleman
11 Dec 24   `- Re: Win11 explorer bug?1Carlos E.R.

Haut de la page

Les messages affichés proviennent d'usenet.

NewsPortal