Re: why icmp timestamping is enabled by default ?

2013-10-21 Thread Johan Beisser
> On Oct 21, 2013, at 2:57, Henning Brauer  wrote:
> 
> * Илья Шипицин  [2013-10-11 04:52]:
>> I was just curious why that timestamping is enabled by default.
> 
> 'cause there is no reason to disable it.
> 
> why is tcp enabled by default?
> 

Everyone knows that TCP, like IP, and the Internet is just a passing fad. 



Re: why icmp timestamping is enabled by default ?

2013-10-21 Thread Claudio Jeker
On Mon, Oct 21, 2013 at 11:57:42AM +0200, Henning Brauer wrote:
> *  ??  [2013-10-11 04:52]:
> > I was just curious why that timestamping is enabled by default.
> 
> 'cause there is no reason to disable it.
> 
> why is tcp enabled by default?
> 

Because it is used to download porn and hack into other systems.

-- 
:wq Claudio



Re: why icmp timestamping is enabled by default ?

2013-10-21 Thread Henning Brauer
* Илья Шипицин  [2013-10-11 04:52]:
> I was just curious why that timestamping is enabled by default.

'cause there is no reason to disable it.

why is tcp enabled by default?

-- 
Henning Brauer, h...@bsws.de, henn...@openbsd.org
BS Web Services GmbH, http://bsws.de, Full-Service ISP
Secure Hosting, Mail and DNS Services. Dedicated Servers, Root to Fully Managed
Henning Brauer Consulting, http://henningbrauer.com/



Re: why icmp timestamping is enabled by default ?

2013-10-21 Thread Theo de Raadt
> > I am about to switch icmp timestamps off (security people are afraid
> > of that setting)
> 
> your "security people" have no clue regarding security.
> 
> they probably also block icmp, since it's so dangerous.

icmp is only dangerous if you have ip traffic.  dangerous ip traffic.
indeed, maybe dig to the root of the matter.



Re: why icmp timestamping is enabled by default ?

2013-10-21 Thread Henning Brauer
* Илья Шипицин  [2013-10-10 13:31]:
> I am about to switch icmp timestamps off (security people are afraid
> of that setting)

your "security people" have no clue regarding security.

they probably also block icmp, since it's so dangerous.

-- 
Henning Brauer, h...@bsws.de, henn...@openbsd.org
BS Web Services GmbH, http://bsws.de, Full-Service ISP
Secure Hosting, Mail and DNS Services. Dedicated Servers, Root to Fully Managed
Henning Brauer Consulting, http://henningbrauer.com/



Re: why icmp timestamping is enabled by default ?

2013-10-13 Thread Илья Шипицин
I apologise that I didn't predict such responces.
I was looking for "real life examples", i.e. "we use icmp timestamps
widely, because we use timed" or "a lot of devices like D-Link-NNN use
icmp timestamps".
I was not looking for theoretical possibilities that icmp timestamping gives.
I should mention that of course.

Sorry.

2013/10/14 Mihai Popescu :
>> it is famous "your mother if fat" openbsd community style. I was not
>> asking whether it is secret or not. I was curious about common use
>> scenarios, where icmp timestamping is involved.
>
> Hi,
>
> 1. Maybe I'm wrong but I think OpenBSD doesn't have a "community" like
> other praised OSes, so there is no "style".
>
> 2. Looking at your thread it is very hard for me to figure out what
> the hell did you ask.
>
> 3. If you try to impress some developers of OpenBSD, try to attach
> something at your email. It doesn't work with opinions and subtle
> suggestions about what might be wrong.
>
> * this message might be bad at line length (i'm sorry).



Re: why icmp timestamping is enabled by default ?

2013-10-13 Thread Mihai Popescu
> it is famous "your mother if fat" openbsd community style. I was not
> asking whether it is secret or not. I was curious about common use
> scenarios, where icmp timestamping is involved.

Hi,

1. Maybe I'm wrong but I think OpenBSD doesn't have a "community" like
other praised OSes, so there is no "style".

2. Looking at your thread it is very hard for me to figure out what
the hell did you ask.

3. If you try to impress some developers of OpenBSD, try to attach
something at your email. It doesn't work with opinions and subtle
suggestions about what might be wrong.

* this message might be bad at line length (i'm sorry).



Re: why icmp timestamping is enabled by default ?

2013-10-12 Thread Theo de Raadt
> >> actually, I'm not going to block icmp at all, I was curious why
> >> net.inet.icmp.tstamprepl=1 by default.
> >
> > So you can run timed, of course.
> 
> timed was removed from OpenBSD recently
> 
> > As others have said, the time is not a secret.
> 
> it is famous "your mother if fat" openbsd community style. I was not
> asking whether it is secret or not. I was curious about common use
> scenarios, where icmp timestamping is involved.

In your first mail, you simply asked why OpenBSD made that policy
decision. In answer, a bunch of people (many developers) supplied
clear answers.  Without insulting you.  All the answers politely
articulated the reasons behind the decision.

We were not talking about your mother; you brought that up yourself.
You, sir, are the one bringing unrelated junk discussion to the table
to pick a fight.

And in doing so, you are attacking those people.  Being too clear in
answers and explanations for the policy decision is now an insult?  I
see no insults in any of the replies.  Insult is only implied in your
mails.



Re: why icmp timestamping is enabled by default ?

2013-10-12 Thread Илья Шипицин
2013/10/11 Christian Weisgerber :
>  wrote:
>
>> actually, I'm not going to block icmp at all, I was curious why
>> net.inet.icmp.tstamprepl=1 by default.
>
> So you can run timed, of course.

timed was removed from OpenBSD recently

> As others have said, the time is not a secret.

it is famous "your mother if fat" openbsd community style. I was not
asking whether it is secret or not. I was curious about common use
scenarios, where icmp timestamping is involved.

>
> --
> Christian "naddy" Weisgerber  na...@mips.inka.de



Re: why icmp timestamping is enabled by default ?

2013-10-11 Thread Christian Weisgerber
 wrote:

> actually, I'm not going to block icmp at all, I was curious why
> net.inet.icmp.tstamprepl=1 by default.

So you can run timed, of course.
As others have said, the time is not a secret.

-- 
Christian "naddy" Weisgerber  na...@mips.inka.de



Re: why icmp timestamping is enabled by default ?

2013-10-11 Thread Илья Шипицин
2013/10/11 Claudio Jeker :
> On Fri, Oct 11, 2013 at 08:44:36AM +0600,  ??? wrote:
>> 2013/10/10 Philip Guenther :
>> > On Thu, Oct 10, 2013 at 4:30 AM,  ???  wrote:
>> >> I use ntp already.
>> >
>> > So everyone can predict what your machine would have sent in response
>> > to an ICMP timestamp query, meaning that turning it off doesn't hide
>> > anything.
>> >
>> >
>> >> I am about to switch icmp timestamps off (security people are afraid
>> >> of that setting),
>> >
>> > Cargo cult security.
>>
>> it is known behavior of security people.
>>
>> >
>> >
>> >> just curious what was the purpose of it.
>> >
>> > Oddly enough, the RFC that defines it (RFC792) has a reference about that.
>>
>> by "purpose" I mean common use scenarios, like
>>
>> "we enable ssh by default, because it is used in routine
>> administration and automation tasks, not because of RFC"
>>
>> "we enable icmp destination unreachable, because it is used commonly
>> in PMTU mechanisms, not because it is mentioned in some RFC"
>>
>> or you enable everything found in RFC ? you must be odd if so. I am
>> not that odd.
>>
>
> The better question is why block it? What is the attack vector?
> You start with ICMP timestamps, next you block ICMP echo then all of ICMP
> and by that break the internet. I waste way to much time with situations
> where I can't debug network issues because people block important internet
> control messages. So if there is not a well known threat (e.g. source
> routing or the fameous IPv6 rtr-0 header) it should not be disbale just
> for a bit of a warm fuzzy feeling.


"icmp dest unreach, frag required" (3/4) is very important, I'm not
going to block it. kinda fed up with poorly configured networks as
well.
"icmp echo request/reply", i.e. ping/pong is also important, when
people do not see ping responce, they beleive host is down.
I'm also not going to block it.

actually, I'm not going to block icmp at all, I was curious why
net.inet.icmp.tstamprepl=1 by default.


>
> --
> :wq Claudio



Re: why icmp timestamping is enabled by default ?

2013-10-11 Thread Claudio Jeker
On Fri, Oct 11, 2013 at 08:44:36AM +0600,  ??? wrote:
> 2013/10/10 Philip Guenther :
> > On Thu, Oct 10, 2013 at 4:30 AM,  ???  wrote:
> >> I use ntp already.
> >
> > So everyone can predict what your machine would have sent in response
> > to an ICMP timestamp query, meaning that turning it off doesn't hide
> > anything.
> >
> >
> >> I am about to switch icmp timestamps off (security people are afraid
> >> of that setting),
> >
> > Cargo cult security.
> 
> it is known behavior of security people.
> 
> >
> >
> >> just curious what was the purpose of it.
> >
> > Oddly enough, the RFC that defines it (RFC792) has a reference about that.
> 
> by "purpose" I mean common use scenarios, like
> 
> "we enable ssh by default, because it is used in routine
> administration and automation tasks, not because of RFC"
> 
> "we enable icmp destination unreachable, because it is used commonly
> in PMTU mechanisms, not because it is mentioned in some RFC"
> 
> or you enable everything found in RFC ? you must be odd if so. I am
> not that odd.
> 

The better question is why block it? What is the attack vector?
You start with ICMP timestamps, next you block ICMP echo then all of ICMP
and by that break the internet. I waste way to much time with situations
where I can't debug network issues because people block important internet
control messages. So if there is not a well known threat (e.g. source
routing or the fameous IPv6 rtr-0 header) it should not be disbale just
for a bit of a warm fuzzy feeling.

-- 
:wq Claudio



Re: why icmp timestamping is enabled by default ?

2013-10-10 Thread Илья Шипицин
2013/10/11 Paul de Weerd :
> On Thu, Oct 10, 2013 at 05:30:39PM +0600,  ??? wrote:
> | I use ntp already.
> | I am about to switch icmp timestamps off (security people are afraid
> | of that setting), just curious what was the purpose of it.
>
> Uhm .. why?  Is your pf broken somehow?

it is not broken.

>
> block in on $interface inet proto icmp icmp-type { timereq, timerep }

does PF perform better than net.inet.icmp.tstamprepl=0 ?

>
> I can understand you don't want to send anything in reply to spoofed
> packets, but you're really better off filtering those with a firewall
> instead of a knob per type of packet.
>
>
> If you think this is going to improve the security of your host,
> you're wrong (as pointed out by others).

it is not about "improving security", you got it wrong.
I was just curious why that timestamping is enabled by default.

>
> If others tell you this improves the security of your host, tell them
> they're wrong.

I wish they could understand what other people are talking about.

>
> If they are not open to sane arguments: run.
>
>
> Then, they can disable the sysctl themselves and wallow in their
> awesome security while their site is XSS'd by 10-year-olds.

yeah, we found an XSS on their site couple of months ago :-)

>
> Paul 'WEiRD' de Weerd
>
> --
>>[<++>-]<+++.>+++[<-->-]<.>+++[<+
> +++>-]<.>++[<>-]<+.--.[-]
>  http://www.weirdnet.nl/



Re: why icmp timestamping is enabled by default ?

2013-10-10 Thread Илья Шипицин
2013/10/10 Philip Guenther :
> On Thu, Oct 10, 2013 at 4:30 AM, Илья Шипицин  wrote:
>> I use ntp already.
>
> So everyone can predict what your machine would have sent in response
> to an ICMP timestamp query, meaning that turning it off doesn't hide
> anything.
>
>
>> I am about to switch icmp timestamps off (security people are afraid
>> of that setting),
>
> Cargo cult security.

it is known behavior of security people.

>
>
>> just curious what was the purpose of it.
>
> Oddly enough, the RFC that defines it (RFC792) has a reference about that.

by "purpose" I mean common use scenarios, like

"we enable ssh by default, because it is used in routine
administration and automation tasks, not because of RFC"

"we enable icmp destination unreachable, because it is used commonly
in PMTU mechanisms, not because it is mentioned in some RFC"

or you enable everything found in RFC ? you must be odd if so. I am
not that odd.

>
> Philip Guenther



Re: why icmp timestamping is enabled by default ?

2013-10-10 Thread Paul de Weerd
On Thu, Oct 10, 2013 at 05:30:39PM +0600,  ??? wrote:
| I use ntp already.
| I am about to switch icmp timestamps off (security people are afraid
| of that setting), just curious what was the purpose of it.

Uhm .. why?  Is your pf broken somehow?

block in on $interface inet proto icmp icmp-type { timereq, timerep }

I can understand you don't want to send anything in reply to spoofed
packets, but you're really better off filtering those with a firewall
instead of a knob per type of packet.


If you think this is going to improve the security of your host,
you're wrong (as pointed out by others).

If others tell you this improves the security of your host, tell them
they're wrong.

If they are not open to sane arguments: run.


Then, they can disable the sysctl themselves and wallow in their
awesome security while their site is XSS'd by 10-year-olds.

Paul 'WEiRD' de Weerd

-- 
>[<++>-]<+++.>+++[<-->-]<.>+++[<+
+++>-]<.>++[<>-]<+.--.[-]
 http://www.weirdnet.nl/ 



Re: why icmp timestamping is enabled by default ?

2013-10-10 Thread Stuart Henderson
On 2013-10-10, Philip Guenther  wrote:
> On Thu, Oct 10, 2013 at 4:30 AM, Илья Шипицин  wrote:
>> I use ntp already.
>
> So everyone can predict what your machine would have sent in response
> to an ICMP timestamp query, meaning that turning it off doesn't hide
> anything.
>
>
>> I am about to switch icmp timestamps off (security people are afraid
>> of that setting),
>
> Cargo cult security.
>
>
>> just curious what was the purpose of it.
>
> Oddly enough, the RFC that defines it (RFC792) has a reference about that.
>
> Philip Guenther
>
>

I suppose next you'll be wanting to know how to force insecure ciphers for 
HTTPS ;)



Re: why icmp timestamping is enabled by default ?

2013-10-10 Thread Theo de Raadt
> > I use ntp already.
> 
> So everyone can predict what your machine would have sent in response
> to an ICMP timestamp query, meaning that turning it off doesn't hide
> anything.

Oh my god!  It's revealing a public secret!



Re: why icmp timestamping is enabled by default ?

2013-10-10 Thread Philip Guenther
On Thu, Oct 10, 2013 at 4:30 AM, Илья Шипицин  wrote:
> I use ntp already.

So everyone can predict what your machine would have sent in response
to an ICMP timestamp query, meaning that turning it off doesn't hide
anything.


> I am about to switch icmp timestamps off (security people are afraid
> of that setting),

Cargo cult security.


> just curious what was the purpose of it.

Oddly enough, the RFC that defines it (RFC792) has a reference about that.

Philip Guenther



Re: why icmp timestamping is enabled by default ?

2013-10-10 Thread Илья Шипицин
I use ntp already.
I am about to switch icmp timestamps off (security people are afraid
of that setting), just curious what was the purpose of it.

2013/10/10 Theo de Raadt :
>> > it turned out that OpenBSD allows icmp timestamping by default:
>> >
>> > net.inet.icmp.tstamprepl=1
>> >
>> > what was that done for ?
>>
>> well, why not?
>>
>> if you have some program vulnerable to a "the attacker knows the time"
>> attack, i don't think turning off icmp timestamps will save you. the
>> attacker could reasonably guess that your system time is going to be
>> close to his system time. unless you are going to deliberately set the
>> clock wrong on all your systems. fixing the vulnerability seems like a
>> better idea.
>
> there is also this thing called ntp that is becoming rather common.
> if you're not doing time distribution to your systems, ah, i see the
> problem.



Re: why icmp timestamping is enabled by default ?

2013-10-09 Thread Theo de Raadt
> > it turned out that OpenBSD allows icmp timestamping by default:
> > 
> > net.inet.icmp.tstamprepl=1
> > 
> > what was that done for ?
> 
> well, why not?
> 
> if you have some program vulnerable to a "the attacker knows the time"
> attack, i don't think turning off icmp timestamps will save you. the
> attacker could reasonably guess that your system time is going to be
> close to his system time. unless you are going to deliberately set the
> clock wrong on all your systems. fixing the vulnerability seems like a
> better idea.

there is also this thing called ntp that is becoming rather common.
if you're not doing time distribution to your systems, ah, i see the
problem.



Re: why icmp timestamping is enabled by default ?

2013-10-09 Thread Ted Unangst
On Thu, Oct 10, 2013 at 09:21, Илья Шипицин wrote:

> it turned out that OpenBSD allows icmp timestamping by default:
> 
> net.inet.icmp.tstamprepl=1
> 
> what was that done for ?

well, why not?

if you have some program vulnerable to a "the attacker knows the time"
attack, i don't think turning off icmp timestamps will save you. the
attacker could reasonably guess that your system time is going to be
close to his system time. unless you are going to deliberately set the
clock wrong on all your systems. fixing the vulnerability seems like a
better idea.



why icmp timestamping is enabled by default ?

2013-10-09 Thread Илья Шипицин
Hello!

it turned out that OpenBSD allows icmp timestamping by default:

net.inet.icmp.tstamprepl=1

what was that done for ?

Cheers,
Ilya Shipitsin