<div dir="ltr">Hi Andrew,<div><br></div><div>I think they (CERT-KE or whatever) sent you that report in your capacity as a contact person for your network. So it's possible other network 'managers' (contact persons) got the same. I don't know if they are active here.</div><div><br></div><div>That they can scan networks and report on open ports, and raise something as stupid as RDP ports being open is a strange one! Maybe there is some law we're not privy to that allows them to do port scanning on ALL networks??</div><div><br></div><div>I would have thought that their is to highlight vulnerabilities and how such can be mitigated, instead of going into network scanning. It demonstrates lack of knowledge of their mandate and idleness - they probably don't have much work in their hands and so want to justify their existence.</div><div><br></div><div><br></div><div><br></div></div><div class="gmail_extra"><br><div class="gmail_quote">On 5 June 2017 at 10:08, Andrew Alston via kictanet <span dir="ltr"><<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div lang="EN-GB" link="#0563C1" vlink="#954F72">
<div class="m_8975613856428834725WordSection1">
<p class="MsoNormal"><span lang="EN-US">Hi All,<u></u><u></u></span></p>
<p class="MsoNormal"><span lang="EN-US"><u></u> <u></u></span></p>
<p class="MsoNormal"><span lang="EN-US">This morning I got an interesting email from
<a href="mailto:cirt@ca.go.ke" target="_blank">cirt@ca.go.ke</a> as regards open RDP ports on the network.<u></u><u></u></span></p>
<p class="MsoNormal"><span lang="EN-US"><u></u> <u></u></span></p>
<p class="MsoNormal"><span lang="EN-US">Now, I’ve got a few questions about this -<u></u><u></u></span></p>
<p class="MsoNormal"><span lang="EN-US"><u></u> <u></u></span></p>
<p class="m_8975613856428834725MsoListParagraph"><u></u><span lang="EN-US"><span>a.)<span style="font:7.0pt "Times New Roman"">
</span></span></span><u></u><span lang="EN-US">Has anyone else had similar reports<u></u><u></u></span></p>
<p class="m_8975613856428834725MsoListParagraph"><u></u><span lang="EN-US"><span>b.)<span style="font:7.0pt "Times New Roman"">
</span></span></span><u></u><span lang="EN-US">Ports can be open for many reasons – and they sit on private companies machines and companies have the right to firewall or not firewall dependent on a multitude of reasons – why are these being put out as an
incident report <u></u><u></u></span></p>
<p class="m_8975613856428834725MsoListParagraph"><u></u><span lang="EN-US"><span>c.)<span style="font:7.0pt "Times New Roman"">
</span></span></span><u></u><span lang="EN-US">Under what premise does anyone – be they cert or otherwise – have the authority to run scans against private networks and systems – I was under the impression that port scanning private systems was not allowed?<u></u><u></u></span></p>
<p class="MsoNormal"><span lang="EN-US"><u></u> <u></u></span></p>
<p class="MsoNormal"><span lang="EN-US">I’m kinda concerned here when a report shows up that clearly indicates that targeted scans have been made – particularly since some of the IP addresses in that report are not even inside Kenya and sit on IP addresses
belonging to clients who have in no way authorized security scans against themselves.<u></u><u></u></span></p>
<p class="MsoNormal"><span lang="EN-US"><u></u> <u></u></span></p>
<p class="MsoNormal"><span lang="EN-US">Anyone got any thoughts or comments?<span class="HOEnZb"><font color="#888888"><u></u><u></u></font></span></span></p><span class="HOEnZb"><font color="#888888">
<p class="MsoNormal"><span lang="EN-US"><u></u> <u></u></span></p>
<p class="MsoNormal"><span lang="EN-US">Andrew<u></u><u></u></span></p>
<p class="MsoNormal"><span lang="EN-US"><u></u> <u></u></span></p>
</font></span></div>
</div>
<br>______________________________<wbr>_________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/<wbr>mailman/listinfo/kictanet</a><br>
Twitter: <a href="http://twitter.com/kictanet" rel="noreferrer" target="_blank">http://twitter.com/kictanet</a><br>
Facebook: <a href="https://www.facebook.com/KICTANet/" rel="noreferrer" target="_blank">https://www.facebook.com/<wbr>KICTANet/</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/odhiambo%40gmail.com" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/<wbr>mailman/options/kictanet/<wbr>odhiambo%40gmail.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br></blockquote></div><br><br clear="all"><div><br></div>-- <br><div class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div>Best regards,<br>Odhiambo WASHINGTON,<br>Nairobi,KE<br>+254 7 3200 0004/+254 7 2274 3223<br>"<span style="font-size:12.8px">Oh, the cruft.</span><span style="font-size:12.8px">"</span></div></div></div>
</div>