Dynamic IP log retention = 0?

A quick scan of the reverse mapping for your address space in DNS reveals
that you have basically your entire network on public addresses. No wonder
you're worried about portscans when the printer down the hall and the
receptionists machine are sitting on public addresses. I think you are
trying to secure your network from the wrong end here.

Your idea of "security" is strange and unrealistic.

Putting all of your network behind NAT is not a guarantee of security.

IPv4 is slowly grinding to a close. NAT has been an aid to reduce the
requirement for routable IP space at many sites, but it has never been
required to stick your entire network behind NAT. Anyone capable of
justifying the IP space and acquiring it from an upstream ISP is able
to put all their IP-enabled gizmos, no matter even if it's just a bunch
of printers, scanners, UPS's, and other random IP-capable gear, on the
public Internet. It should not be the operator community's job to be
the arbiter of what devices are worthy of public IP space.

And take that and think about it, because IPv6 is coming. This will
encourage the deployment of networks that connect every IP-capable
device in reach. This implies many things.

It is clear that we've not done a real good job of designing IPv4
devices with sufficient layers of security to be able to stick random
devices on the Internet without a firewall and some contemplation of
rules, something I hope changes between now and IPv6 widespread
deployment.

The question shouldn't be about whether this gentleman is securing his
network from the wrong end.

In our neighbourhood, we don't have a high crime rate. Despite that,
if we saw someone walking from house to house, trying doorknobs, we'd
call the cops. The fact that everyone has locks on their doors does
not make it all right for someone to go around from house to house to
see if they're all locked.

In that same fashion, there's no particular reason to expect that the
gentleman who started this thread hasn't already provided some layers
of protection for his network. Trying to address the attacker is a
sane and reasonable next step.

We have some real and difficult questions to address in terms of how
much do we want to do in response to such complaints. There are a lot
of potential impacts on operators for dealing with abuse complaints,
but we should be aware that this issue isn't going to go away, that
blaming the target site's security rather than the attacker is simply
wrong, that we're going to see even more devices attached under IPv6,
and that if we don't want legislative solutions handed to us to
implement, I would expect that it's a better idea to stop people from
doing things from your network that causes others to squawk (and
obviously I'm talking about Covad and the Covad-emitted traffic here).

... JG

Joe Greco wrote:

A quick scan of the reverse mapping for your address space in DNS reveals
that you have basically your entire network on public addresses. No wonder
you're worried about portscans when the printer down the hall and the
receptionists machine are sitting on public addresses. I think you are
trying to secure your network from the wrong end here.

Your idea of "security" is strange and unrealistic.

Putting all of your network behind NAT is not a guarantee of security.

Amen. Our NOCS workstations all use public IP addresses that are routed through a firewall. The firewall applies appropriate policies that would be functionally no different from applying the same policies to NAT'd hosts. In our environment, we'd gain absolutely nothing from a security perspective by enabling NAT.

But it does help ensure that poorly designed applications don't require proxies to support them through NAT (SIP, FTP etc). And we'll never have problems with a partner VPN conflicting with our internal IP space.

Mike

However, it's not illegal, AFAIK. It's only illegal if you enter. Either
  that, or I'm gonna go prosecute some Girl Scouts.

  More relatedly, is there some sort of obligation with IPv6 to move all of
  your NAT'ed hosts away from NAT? Just because you can doesn't make it a
  good idea. I agree, NAT != security, but it does give one a single point
  to manage those hosts behind it.

Beckman

Actually, in most jurisdictions trying strangers' doorknobs is
probably misdemeanor disorderly conduct, typically punishable by fines
of a few hundred dollars and jail for a few months. More often than
not used as a threat: "Sir, you need to leave the neighborhood or
you'll be arrested and charged with disorderly conduct."

That's what "disorderly conduct" is for: folks who are obviously doing
something they ought not be doing but for which an explicit law has
not been written.

Regards,
Bill Herrin