This is ridiculous.
I've never had anything but the utmost respect for Wired as a whole (ignoring, for a minute, some of their bloggers) I subscribe to their magazine, i read some parts of their website. But this just makes me want to hate them:
"How to Traverse Corporate Firewalls"
Do these people think we block websites just to piss them off? Do they even consider the fact that we block certain sites for a reason?
Granted, some web filters are a bit overzealous, but if a needed site gets blocked, usually all it takes is a call to IT to get that site excluded from the filter.
In other news, i started training my replacement today. This guy is a rock, and has only basic knowledge of system administration. Not sure how he even got this job, with the "skills" he's shown (i had to show him how to open AD). It's going to be an interesting place, once i'm gone. Remind me to change my cell number.
I've never had anything but the utmost respect for Wired as a whole (ignoring, for a minute, some of their bloggers) I subscribe to their magazine, i read some parts of their website. But this just makes me want to hate them:
"How to Traverse Corporate Firewalls"
Do these people think we block websites just to piss them off? Do they even consider the fact that we block certain sites for a reason?
Granted, some web filters are a bit overzealous, but if a needed site gets blocked, usually all it takes is a call to IT to get that site excluded from the filter.
In other news, i started training my replacement today. This guy is a rock, and has only basic knowledge of system administration. Not sure how he even got this job, with the "skills" he's shown (i had to show him how to open AD). It's going to be an interesting place, once i'm gone. Remind me to change my cell number.
no subject
Date: 2007-10-03 05:20 pm (UTC)no subject
Date: 2007-10-03 05:25 pm (UTC)no subject
Date: 2007-10-03 05:28 pm (UTC)no subject
Date: 2007-10-03 05:52 pm (UTC)no subject
Date: 2007-10-03 06:01 pm (UTC)no subject
Date: 2007-10-03 06:03 pm (UTC)no subject
Date: 2007-10-03 06:08 pm (UTC)Why? Because it's like a MF roadmap on how to lock down your network even tighter. HERE KIDS, WE'RE GOING TO DETAIL THE WAYS TO CIRCUMVENT YOUR IT DEPARTMENT. And if your IT Department isn't a bunch of drooling idiots, they'll use the same damn thing to lock down the network even tighter.
no subject
Date: 2007-10-03 11:33 pm (UTC)Maybe if you had no clue to begin with, but I'd like to think my 'leet skills make fluff like this pointless all 'round.
no subject
Date: 2007-10-03 06:09 pm (UTC)I work for a Fortune 500 corp in the top 100 of that classification. We have thousands of IT folks on every continent except Antarctica. We have dozens of groups of system administrators with varying needs. But through all of that, one group controls the firewalls. They make decisions that fit THEIR needs, and that meet the "lowest common denominator" needs of the company.
I can't get a shell script emailed to me from HP to troubleshoot a broken system without bypassing corporate restrictions. I often can't read a white paper on a security vulnerability in my software without going through a two-week review period to get a change made in the web filter, unless I bypass corporate restrictions. I can't go into an IRC channel for support without bypassing corporate restrictions.
And yet, the company's business is expected to get done, whatever it takes. That's what they pay me to do, not to make excuses about somebody else's firewall decisions.
Do they block certain sites for a reason? Yep; and for many thousands of them, that reason is "because the web filter software included that site without us having any idea what it is or what it's for". I had a paper on an Oracle vulnerability blocked the other day because evidently one of several blogs on the site was deemed "bad". They blocked access to "everything2.com" because "that's what the software came with". Did I wait two weeks for management review of my requested changes before reading up about a brand-new vulnerability in my software? Nope. I did my job.
You can complain that Wired is giving this information to people who won't use it responsibly, but then you posted a link to it here, which is the same thing.
no subject
Date: 2007-10-03 06:16 pm (UTC)In a previous job for [national telecommunications vendor], I frequently ran into problems because WebSense would let users in my regional office get compromised and spywared so deep in the ass they could taste bitstream; yet it would block me from accessing any ANTI-spyware tools to help fix them. Did I set up a proxy through another machine elsewhere? You bet your ass I did.
In my current life as a consultant, one of the more common things I get called for is road warriors with home offices working for large corporations who need to get printers working. Printer won't work without administrative privileges. User is not allowed by corporate policy to have administrative privileges. I come in with a SAM reset disk, wipe the local administrator password, log in as local administrator, and add "Everyone" to the local "Administrators" group. Poof, user can print. The really hilarious thing? These are usually printers supplied by the corporate office to begin with.
Big corporate IT departments tend to not even understand the concept of daylight, much less what it looks like.
no subject
Date: 2007-10-03 07:07 pm (UTC)no subject
Date: 2007-10-03 10:22 pm (UTC)Users who actually hire consultants in the first place aren't the users making up the botnet population. The folks making up the botnets are the users who don't pay anything to anybody for any kind of support, and just buy a new $400 PC once their last $400 PC has gotten so thoroughly malwared up that it "seems too slow" even to them.
If one of my customers gets malwared, I find out about it in a hurry and it gets removed in an equal hurry. Conversely, if idiots setting corporate IT policies weren't making it impossible for users to do their jobs while following them, maybe those policies would actually do a bit of good.
no subject
Date: 2007-10-03 11:12 pm (UTC)But still, you're being called out there to install the printer, not subvert the security of the user running laptop. If you don't have an admin account, then pester corporate IT until they give you one. Enough trouble tickets in their system will make them figure it out eventually, but silently "fixing" things doesn't let them know about the problem.
User-level accounts (NOT power users or Admins) don't get nearly the malware/worms of other users because they don't have the permissions to run that software. I think it was one of the tech magazines that did a test comparing user/power/admin rights and how much spyware was installed.
no subject
Date: 2007-10-03 11:53 pm (UTC)In a shiny happy sensible world, it would be nice to restrict users to heavily neutered permission levels. In the real world, with corporations using for god's sake Windows and trying to maintain 500:1 user:support ratios, with many users very literally never setting eyes on an actual administrator, it's very very difficult to make that work.
I can't make the user's IT department do something sensible. I can (and do) contact them and try to get them to do something sensible, and if (and when) they absolutely refuse - but still expect the user to, you know, WORK anyway - then I quietly make an end-run around them on the user's behalf. It's what I'm getting paid for.
no subject
Date: 2007-10-04 03:07 pm (UTC)You should try it when the "IT policy Nazi" is actually a committee, rather than an individual, that's a lot of fun too... :-)
In all fairness, though, to my employer (which does have an "IT security policy committee"...), at least I work at a place where employees are generally treated like adults. We don't block any sites at the corporate firewalls (we rely on security tools installed on each individual machine to catch malware and such). There are rules about what you can use the company's computers and networks for, and you're expected to understand and to follow them. If we catch you breaking the rules, you're going to have problems. But if you can honestly say that you need to go on MySpace for some reason related to your job, then we trust you until proven otherwise. (Plus our rules do allow for a certain limited amount of non-work usage, realizing that people our going to be checking their Yahoo mail, or updating their blog, or whatever once in a while while they're in the office, whether you prohibit it or not.) Sometimes people complain that there are too many rules and they shouldn't have to know anything about them. But it's sort of the cost of being treated like an adult...
no subject
Date: 2007-10-04 03:11 pm (UTC)For reference, when one of my customers (an engineering firm) asked me for something like WebSense, what I did instead was block all internet access from every workstation in the company completely... except for one, labeled the "hot seat", with completely unfettered access. That's visible to EVERYBODY because it's dead in the middle of the engineering space.
Net result: nobody uses it to surf for porn or whatever (anybody could see!), nobody sits in the hot seat more than 5 minutes or so (anybody could see!), nobody has problems with shitty web filters keeping them from downloading something they actually need for work.
no subject
Date: 2007-10-05 12:32 am (UTC)no subject
Date: 2007-10-03 07:32 pm (UTC)But that's perfectly OK, because if these big companies are really as idiotic as you say, you'll never get caught. ^__^
no subject
Date: 2007-10-03 10:24 pm (UTC)no subject
Date: 2007-10-04 03:09 am (UTC)They don't need it, and while SOME spyware can bypass privs, there is enough out there that CAN'T that I'm happier with them NOT being able to delete/modify/etc things they're not supposed to touch.
no subject
Date: 2007-10-04 03:18 am (UTC)no subject
Date: 2007-10-04 03:40 am (UTC)no subject
Date: 2007-10-04 03:11 pm (UTC)no subject
Date: 2007-10-05 05:25 pm (UTC)I've mostly dealt with HP's and Lexmarks. Both of which i hate with a passion, but i've never because of a problem like that...
no subject
Date: 2007-10-05 06:01 pm (UTC)Brothers also frequently have that problem, but I haven't had to deal with one of those in a context of having to run under an otherwise non-privileged user account.
no subject
Date: 2007-10-03 06:55 pm (UTC)no subject
Date: 2007-10-04 03:10 am (UTC)no subject
Date: 2007-10-03 07:03 pm (UTC)Bonus points for rigging all standard corporate environments with software which tests every so often for things like sudden wide-open internet access, and rings alarm bells if it can see raw internet.
Locking down corporate machines so they can't run any nonapproved executables or change most software defaults is another favorite if the staff start getting too clever, as is running a root-level set of checks to see if they've managed it anyway (cadged or badgered an admin-level account from the CEO etc).
Of course, given that the users have access to the PC hardware, it's inherently untrustable anyway, which is why all network connections should verify the authority of any given PC to be given access to any part of the corporate network before even allowing things like logging on. A PC that doesn't respond correctly to the network security heartbeat can be isolated and flagged. PCs could be forced to accept all software updates and possibly run scans before anything else, if they haven't been connected in a while. That kind of thing.
I wonder if anyone's written 101 Ways to be a Network Nazi. Could be a best-seller.
no subject
Date: 2007-10-03 07:03 pm (UTC)no subject
Date: 2007-10-04 03:13 am (UTC)Didn't see them today...
no subject
Date: 2007-10-03 07:21 pm (UTC)Having said that, my personal preference is not to block more than the obvious (known malware sites, porn, etc), but to make everyone aware you do monitor things and pulling people up if they're spending all day on facebook etc. It's less admin overhead and doesn't annoy users when they can't get to useful sites without going through the corporate hoops. Sadly that doesn't seem to be the opinion of the policy makers in many of the places I've worked for...
no subject
Date: 2007-10-03 08:34 pm (UTC)At my place, doing it (knowingly circumventing access controls) *will* get you fired, no ifs, ands, or buts, plus possible additional action depending on just what occurred. Not our rules, but the regulators that oversee the company, sadly.
no subject
Date: 2007-10-03 07:21 pm (UTC)no subject
Date: 2007-10-03 11:15 pm (UTC)no subject
Date: 2007-10-03 11:33 pm (UTC)no subject
Date: 2007-10-03 08:12 pm (UTC)no subject
Date: 2007-10-03 11:17 pm (UTC)no subject
Date: 2007-10-03 11:42 pm (UTC)In two of the places that I worked, yes.
I'm sorry, but when you start blocking *GOOGLE*!
"We don't allow entertainment Websites, only work related and research websites." "Google is research website. It's a Search Engine Website."
no subject
Date: 2007-10-04 03:17 am (UTC)But in fairness, I shut off ALL outside access to an entire department for a few days because they wouldn't take the hint and the DIRECTOR wouldn't do jack about it. Sometime extreme measures are needed.
"First, you have to get the mules attention..."
no subject
Date: 2007-10-05 10:09 am (UTC)On the upside, I doubt many, if any, large organizations where policy changes take a long time to go through run Fortinet firewalls, or Apple hardware, much less both of them simultaneously.
no subject
Date: 2007-10-04 03:20 am (UTC)They also know the sites and the ENTIRE bank of IPs the used don't work after I find them. They also understand that I read logs and am merciless about it.
Actually had one guy try to convince me he needed MySpace for his job.
Asshat no longer works here for other reasons.
no subject
Date: 2007-10-04 01:15 am (UTC)no subject
Date: 2007-10-04 03:21 am (UTC)You are not dealing with a SysAdmin, nor a BoFH - you are dealing with a power hungery little shit.
no subject
Date: 2007-10-04 03:30 am (UTC)