Re: [Acme] Issue: Allow ports other than 443

Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com> Tue, 24 November 2015 16:37 UTC

Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: acme@ietfa.amsl.com
Delivered-To: acme@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 452D91A902D for <acme@ietfa.amsl.com>; Tue, 24 Nov 2015 08:37:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 75tTa-p7_gje for <acme@ietfa.amsl.com>; Tue, 24 Nov 2015 08:37:38 -0800 (PST)
Received: from mail-wm0-x22c.google.com (mail-wm0-x22c.google.com [IPv6:2a00:1450:400c:c09::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D9C631A9028 for <acme@ietf.org>; Tue, 24 Nov 2015 08:37:37 -0800 (PST)
Received: by wmec201 with SMTP id c201so34742626wme.1 for <acme@ietf.org>; Tue, 24 Nov 2015 08:37:36 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=F8hGDtswKuFGxdrIPivfi3csIiE5RqXOOtvcsj1WwFw=; b=ZdAlrWqRE9r94RsL8wPkdoUmVhEXROef2dY+4qwbRk2k8vRYaTPe2njEtqVTWu95PL Hni1puHywVKIybkvKXbrjqcFLAv6ARwHA00XRZS9Md/Kdj3eyDM9+idcJYdLZR6IDmoZ iuWW6XQyrE/j3hRJgAZp3uAqAwE4SSyv3oM3RrWKwENrD+k7VJ1DtIDGstH6FXs6z5Sl ejy/94oge9JDy+YDCAPrNiY1jpjIU4CJrhHvtNbN4teVp68p9iVVplvv1LvzZI8rGRSK XL1Nqww0X6H3NfGNgJsArluuzF4Nt5HsGGVrhW0Kidk5iPnzipXkGeEcEGQpPimokGXa K8vg==
MIME-Version: 1.0
X-Received: by 10.194.179.162 with SMTP id dh2mr38137857wjc.17.1448383056465; Tue, 24 Nov 2015 08:37:36 -0800 (PST)
Received: by 10.28.52.130 with HTTP; Tue, 24 Nov 2015 08:37:36 -0800 (PST)
In-Reply-To: <m2io4ro83g.wl%randy@psg.com>
References: <5e9b22a3942d4a39981878b13e4a7752@usma1ex-dag1mb1.msg.corp.akamai.com> <0630035C-E4F6-41AA-A339-7101B448F0FA@vigilsec.com> <CABkgnnUxSwMmOR=QVE-gMvj9dHW6Tk2Z=EO7RDx6E5zVAp_SrQ@mail.gmail.com> <20151124033325.GH18430@eff.org> <56545B4C.3020406@cisco.com> <m2io4ro83g.wl%randy@psg.com>
Date: Tue, 24 Nov 2015 11:37:36 -0500
Message-ID: <CAHbuEH4Yh-UUin1F0ajsRAHrzrEZ+eDraXd9xLxcnY5kQVxPUg@mail.gmail.com>
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
To: Randy Bush <randy@psg.com>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <http://mailarchive.ietf.org/arch/msg/acme/GywDnwhafMrEUMWlm1H4CrtlGVo>
Cc: Martin Thomson <martin.thomson@gmail.com>, Peter Eckersley <pde@eff.org>, Russ Housley <housley@vigilsec.com>, Eliot Lear <lear@cisco.com>, IETF ACME <acme@ietf.org>
Subject: Re: [Acme] Issue: Allow ports other than 443
X-BeenThere: acme@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Automated Certificate Management Environment <acme.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/acme>, <mailto:acme-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/acme/>
List-Post: <mailto:acme@ietf.org>
List-Help: <mailto:acme-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/acme>, <mailto:acme-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Nov 2015 16:37:40 -0000

I agree with Eliot, I don't think a scan is needed to make a decision
here.  Having managed several networks that would not have allowed you
access from some random scanner, I don't think you'll get all the data
you are looking for.  In a well managed network, the IDS/IPS should
detect that it is a scan and block all future probes once you hit a
small number of ports/IPs.  So you may get a small sample with
everything else failing within an address block.  Granted, not all
networks are managed well and you may get a good amount of data.

If this connection was expected to a few servers, then a network
manager might just allow those only on the assigned port.

Without any hat on, I agree that a port + 443 as an alternate is a good plan.

Kathleen

On Tue, Nov 24, 2015 at 8:11 AM, Randy Bush <randy@psg.com> wrote:
>> Isn't this precisely what .well-known was meant to address?
>
> fun small research project.  what percentage of well-known ports can
> you connect to from the outside to a machine inside cisco?  hell, to
> what percentage of well-known ports outside cisco can you reach from
> inside?
>
> well-known does not correlate well with open to access by IT security
> departments.
>
> randy
>
> _______________________________________________
> Acme mailing list
> Acme@ietf.org
> https://www.ietf.org/mailman/listinfo/acme



-- 

Best regards,
Kathleen