Re: Nachi/Welchia Aftermath

2004-01-20 Thread Paul Vixie

> > > lesson learned:
> > > stop using /makeshift/ layer3 switches (without naming vendor) to run
> > > L3 core

more generally... "if you want routing, buy a router."

i have a hybrid switer that i'm very happy with.  at my house, that is.
(the idea of using one in commerce or production gives me cold shivers.)
-- 
Paul Vixie


Re: Nachi/Welchia Aftermath

2004-01-20 Thread Tom (UnitedLayer)

On Tue, 20 Jan 2004, Rubens Kuhl Jr. wrote:
> Not all L3-switches are flow-based; prefix-based ones should do just fine.
> Can people add/correct this initial list ?
>
> Flow-based: Foundry with IronCore modules, Cisco Catalyst 6500 with Sup1(A)
> Prefix-based: Foundry with JetCore modules, Cisco Catalyst 6500/7600 with
> Sup2(A), Sup3(A/BXL)

The 2948G-L3 and the 4908G-L3 I believe are Prefix/ASIC based.
I believe the 3550-EMI is as well, but I'm not familiar with that
equipment.



Re: Nachi/Welchia Aftermath

2004-01-20 Thread Richard A Steenbergen

On Tue, Jan 20, 2004 at 10:16:03PM -0200, Rubens Kuhl Jr. wrote:
> 
> Not all L3-switches are flow-based; prefix-based ones should do just fine.
> Can people add/correct this initial list ?
> 
> Flow-based: Foundry with IronCore modules, Cisco Catalyst 6500 with Sup1(A)
> Prefix-based: Foundry with JetCore modules, Cisco Catalyst 6500/7600 with
> Sup2(A), Sup3(A/BXL)

Don't confuse "flow based" with "slow-path initial lookup", they aren't 
the same. 

-- 
Richard A Steenbergen <[EMAIL PROTECTED]>   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)


Re: Nachi/Welchia Aftermath

2004-01-20 Thread Stephen J. Wilcox

On Tue, 20 Jan 2004, Rubens Kuhl Jr. wrote:

> > > Flow-based: Foundry with IronCore modules, Cisco Catalyst 6500 with
> Sup1(A)
> > > Prefix-based: Foundry with JetCore modules, Cisco Catalyst 6500/7600
> with
> > > Sup2(A), Sup3(A/BXL)
> > Where do the Extreme and Juniper fit into this?
> 
> Private and public answers to my question indicate that both Summit 48i and
> Black Diamond from Extreme are flow-based; Juniper doesn't make layer 3
> switches, but their routers also do prefix-based forwarding; Cisco routers
> also do prefix-based forwarding at usual configurations.
> 
> Also of notice, flow-based forwarding is not the only thing that makes a L3
> device suffer at worm attacks. If a directly connected interface is an
> Ethernet (or any other medium that is not point to point), ARPing for a lot
> of new addresses per second can also do harm.

Nearly. Any frames needing to go to the CPU will harm your box.. this tends to 
be L2 occurances (arp storms is one ) which therefore means connected ethernets. 
DoSing (L3 IP eg smurf) a router will usually hurt and if you can manage it 
higher level applications (announce/withdraw 1000s routes in BGP, fill up NAT 
tables). Of course your architectures differ so ymmv.

Steve

 > 
> 
> Rubens
> 
> 
> >
> > >
> > > - Original Message -
> > > From: <[EMAIL PROTECTED]>
> > > To: "Brent Van Dussen" <[EMAIL PROTECTED]>
> > > Cc: "NANOG" <[EMAIL PROTECTED]>
> > > Sent: Tuesday, January 20, 2004 9:46 PM
> > > Subject: Re: Nachi/Welchia Aftermath
> > >
> > > > lesson learned:
> > > > stop using /makeshift/ layer3 switches (without naming vendor) to run
> > > > L3 core
> 
> 



Re: sniffer/promisc detector

2004-01-20 Thread Steven M. Bellovin

In message <[EMAIL PROTECTED]>, "Alexei Roudnev" writes:
>
>
>>
>> Uhm, that would be wrong.  This is simply "security through obscurity".
>Yes, it is wrong for the _smart books_. But it works in real life. Of
>course, it should not be the last line of defense; but it works as a first
>line very effectively.
>

Precisely.  Don't count on security through obscurity -- there are 
targeted attacks, if nothing else -- but *after* you've taken all due 
precautions against a knowledgeable adversary, throwing in some 
obscurity can help, too.   (Want a worked example?  Ask the NSA to 
publish the algorithm for one of their top secret encryption 
algorithms...)

But there's another major caveat:  this sort of obscurity doesn't scale 
very well.  It's fine to put ssh on another port if you have a 
relatively small community of reasonably sophisticated users who can 
cope, or if you can hand out canned configurations to less 
sophisticated users.  But you couldn't easily put SMTP elsewhere, or no 
one could find you.  You'd also have support problems with your user 
base if you tried doing that as an anti-relay technique.

Obscurity works in small, closed communities.  Beyond that, operational 
considerations can kill you.

--Steve Bellovin, http://www.research.att.com/~smb




Re: Nachi/Welchia Aftermath

2004-01-20 Thread Rubens Kuhl Jr.


> > Flow-based: Foundry with IronCore modules, Cisco Catalyst 6500 with
Sup1(A)
> > Prefix-based: Foundry with JetCore modules, Cisco Catalyst 6500/7600
with
> > Sup2(A), Sup3(A/BXL)
> Where do the Extreme and Juniper fit into this?

Private and public answers to my question indicate that both Summit 48i and
Black Diamond from Extreme are flow-based; Juniper doesn't make layer 3
switches, but their routers also do prefix-based forwarding; Cisco routers
also do prefix-based forwarding at usual configurations.

Also of notice, flow-based forwarding is not the only thing that makes a L3
device suffer at worm attacks. If a directly connected interface is an
Ethernet (or any other medium that is not point to point), ARPing for a lot
of new addresses per second can also do harm.


Rubens


>
> >
> > - Original Message -
> > From: <[EMAIL PROTECTED]>
> > To: "Brent Van Dussen" <[EMAIL PROTECTED]>
> > Cc: "NANOG" <[EMAIL PROTECTED]>
> > Sent: Tuesday, January 20, 2004 9:46 PM
> > Subject: Re: Nachi/Welchia Aftermath
> >
> > > lesson learned:
> > > stop using /makeshift/ layer3 switches (without naming vendor) to run
> > > L3 core



Re: Nachi/Welchia Aftermath

2004-01-20 Thread Donovan Hill

On Tuesday 20 January 2004 04:16 pm, Rubens Kuhl Jr. wrote:
> Not all L3-switches are flow-based; prefix-based ones should do just fine.
> Can people add/correct this initial list ?
>
> Flow-based: Foundry with IronCore modules, Cisco Catalyst 6500 with Sup1(A)
> Prefix-based: Foundry with JetCore modules, Cisco Catalyst 6500/7600 with
> Sup2(A), Sup3(A/BXL)
>
>
> Rubens
>

Where do the Extreme and Juniper fit into this?

>
> - Original Message -
> From: <[EMAIL PROTECTED]>
> To: "Brent Van Dussen" <[EMAIL PROTECTED]>
> Cc: "NANOG" <[EMAIL PROTECTED]>
> Sent: Tuesday, January 20, 2004 9:46 PM
> Subject: Re: Nachi/Welchia Aftermath
>
> > lesson learned:
> > stop using /makeshift/ layer3 switches (without naming vendor) to run
> > L3 core
> >
> > -J
> >
> > On Tue, Jan 20, 2004 at 02:22:52PM -0800, Brent Van Dussen wrote:
> > > Well folks, since the middle of August I've been tracking the spread
> > > and subsequent efforts by our community to stop the nachia/welchia
> > > infection that took down so many networks.
> > >
> > > Sadly, by my estimations, only about 20-30% of infected hosts were
> > > cleaned.  After Jan 1, 2004 it appears that the thousands, (millions?)
>
> of
>
> > > remaining infected hosts were rebooted and the worm removed
> > > itself.  Network traffic has finally returned to normal.
> > >
> > > What kind of effects did everyone see from this devastating worm and
>
> what
>
> > > lessons did we learn for preventing network downtime in the future?
> >
> > --
> > James Jun (formerly Haesu)
> > TowardEX Technologies, Inc.
> > 1740 Massachusetts Ave.
> > Boxborough, MA 01719
> > Consulting, IPv4 & IPv6 colocation, web hosting, network design &
>
> implementation
>
> > http://www.towardex.com  | [EMAIL PROTECTED]
> > Cell: (978)394-2867  | Office: (978)263-3399 Ext. 170
> > Fax: (978)263-0033   | AIM: GigabitEthernet0
> > NOC: http://www.twdx.net | POC: HAESU-ARIN, HDJ1-6BONE

-- 
Donovan Hill
Electronics Engineering Technologist, CCNA
www.lazyeyez.net, www.gwsn.com


Re: Nachi/Welchia Aftermath

2004-01-20 Thread haesu

yes in concur.. prefix based ones (like FIB) are fine.

unfortunately some models from some vendors (tisk tisk) who use
slow process path to reprogram the CAM per flow can be quite painful
during situations like random dest. dos attacks and worms..

add the E vendor to your list too.. we had summit48i that loved the
worm traffic

-J

On Tue, Jan 20, 2004 at 10:16:03PM -0200, Rubens Kuhl Jr. wrote:
> 
> 
> Not all L3-switches are flow-based; prefix-based ones should do just fine.
> Can people add/correct this initial list ?
> 
> Flow-based: Foundry with IronCore modules, Cisco Catalyst 6500 with Sup1(A)
> Prefix-based: Foundry with JetCore modules, Cisco Catalyst 6500/7600 with
> Sup2(A), Sup3(A/BXL)
> 
> 
> Rubens
> 
> 
> - Original Message - 
> From: <[EMAIL PROTECTED]>
> To: "Brent Van Dussen" <[EMAIL PROTECTED]>
> Cc: "NANOG" <[EMAIL PROTECTED]>
> Sent: Tuesday, January 20, 2004 9:46 PM
> Subject: Re: Nachi/Welchia Aftermath
> 
> 
> >
> > lesson learned:
> > stop using /makeshift/ layer3 switches (without naming vendor) to run
> > L3 core
> >
> > -J
> >
> > On Tue, Jan 20, 2004 at 02:22:52PM -0800, Brent Van Dussen wrote:
> > >
> > > Well folks, since the middle of August I've been tracking the spread and
> > > subsequent efforts by our community to stop the nachia/welchia infection
> > > that took down so many networks.
> > >
> > > Sadly, by my estimations, only about 20-30% of infected hosts were
> > > cleaned.  After Jan 1, 2004 it appears that the thousands, (millions?)
> of
> > > remaining infected hosts were rebooted and the worm removed
> > > itself.  Network traffic has finally returned to normal.
> > >
> > > What kind of effects did everyone see from this devastating worm and
> what
> > > lessons did we learn for preventing network downtime in the future?
> >
> > -- 
> > James Jun (formerly Haesu)
> > TowardEX Technologies, Inc.
> > 1740 Massachusetts Ave.
> > Boxborough, MA 01719
> > Consulting, IPv4 & IPv6 colocation, web hosting, network design &
> implementation
> > http://www.towardex.com  | [EMAIL PROTECTED]
> > Cell: (978)394-2867  | Office: (978)263-3399 Ext. 170
> > Fax: (978)263-0033   | AIM: GigabitEthernet0
> > NOC: http://www.twdx.net | POC: HAESU-ARIN, HDJ1-6BONE
> >

-- 
James Jun (formerly Haesu)
TowardEX Technologies, Inc.
1740 Massachusetts Ave.
Boxborough, MA 01719
Consulting, IPv4 & IPv6 colocation, web hosting, network design & implementation
http://www.towardex.com  | [EMAIL PROTECTED]
Cell: (978)394-2867  | Office: (978)263-3399 Ext. 170
Fax: (978)263-0033   | AIM: GigabitEthernet0
NOC: http://www.twdx.net | POC: HAESU-ARIN, HDJ1-6BONE


Re: Nachi/Welchia Aftermath

2004-01-20 Thread Rubens Kuhl Jr.


Not all L3-switches are flow-based; prefix-based ones should do just fine.
Can people add/correct this initial list ?

Flow-based: Foundry with IronCore modules, Cisco Catalyst 6500 with Sup1(A)
Prefix-based: Foundry with JetCore modules, Cisco Catalyst 6500/7600 with
Sup2(A), Sup3(A/BXL)


Rubens


- Original Message - 
From: <[EMAIL PROTECTED]>
To: "Brent Van Dussen" <[EMAIL PROTECTED]>
Cc: "NANOG" <[EMAIL PROTECTED]>
Sent: Tuesday, January 20, 2004 9:46 PM
Subject: Re: Nachi/Welchia Aftermath


>
> lesson learned:
> stop using /makeshift/ layer3 switches (without naming vendor) to run
> L3 core
>
> -J
>
> On Tue, Jan 20, 2004 at 02:22:52PM -0800, Brent Van Dussen wrote:
> >
> > Well folks, since the middle of August I've been tracking the spread and
> > subsequent efforts by our community to stop the nachia/welchia infection
> > that took down so many networks.
> >
> > Sadly, by my estimations, only about 20-30% of infected hosts were
> > cleaned.  After Jan 1, 2004 it appears that the thousands, (millions?)
of
> > remaining infected hosts were rebooted and the worm removed
> > itself.  Network traffic has finally returned to normal.
> >
> > What kind of effects did everyone see from this devastating worm and
what
> > lessons did we learn for preventing network downtime in the future?
>
> -- 
> James Jun (formerly Haesu)
> TowardEX Technologies, Inc.
> 1740 Massachusetts Ave.
> Boxborough, MA 01719
> Consulting, IPv4 & IPv6 colocation, web hosting, network design &
implementation
> http://www.towardex.com  | [EMAIL PROTECTED]
> Cell: (978)394-2867  | Office: (978)263-3399 Ext. 170
> Fax: (978)263-0033   | AIM: GigabitEthernet0
> NOC: http://www.twdx.net | POC: HAESU-ARIN, HDJ1-6BONE
>



Re: sniffer/promisc detector

2004-01-20 Thread Niels Bakker

* [EMAIL PROTECTED] (Dave Israel) [Tue 20 Jan 2004, 18:48 CET]:
> On 1/20/2004 at 09:18:07 -0800, Alexei Roudnev said:
[..]
>> - unpatched sshd on port 30013 - safety is 7 (higher) because no one
>> automated script can find it, and no one manual scan find it in reality
> Actually, an automated script or manual scan can find it trivially.
> All you have to do is a quick port scan, looking for this:
[..]

Indeed.  And Alexei's point is that noone is looking for that.


> one across the enterprise, so it is only really obscure once.  Moving
> port numbers only protects you against idle vandalism; it is useless
> against people who truly wish you harm.

Alexei's point also was that you need additional measures against those
people.


> You really need a firewall, particularly one that can detect a port
> scan and shut off the scanner, for changing ports to have any real
> security.  It is kind of like a 4-digit PIN being useless for a bank
> card without the 3-try limit.

Unless you like really, really sore fingers, and don't think a long line
of people waiting behind you at the ATM will attract any attention from
the bank employees.


-- Niels.


Re: Nachi/Welchia Aftermath

2004-01-20 Thread haesu

lesson learned:
stop using /makeshift/ layer3 switches (without naming vendor) to run
L3 core

-J

On Tue, Jan 20, 2004 at 02:22:52PM -0800, Brent Van Dussen wrote:
> 
> Well folks, since the middle of August I've been tracking the spread and 
> subsequent efforts by our community to stop the nachia/welchia infection 
> that took down so many networks.
> 
> Sadly, by my estimations, only about 20-30% of infected hosts were 
> cleaned.  After Jan 1, 2004 it appears that the thousands, (millions?) of 
> remaining infected hosts were rebooted and the worm removed 
> itself.  Network traffic has finally returned to normal.
> 
> What kind of effects did everyone see from this devastating worm and what 
> lessons did we learn for preventing network downtime in the future?

-- 
James Jun (formerly Haesu)
TowardEX Technologies, Inc.
1740 Massachusetts Ave.
Boxborough, MA 01719
Consulting, IPv4 & IPv6 colocation, web hosting, network design & implementation
http://www.towardex.com  | [EMAIL PROTECTED]
Cell: (978)394-2867  | Office: (978)263-3399 Ext. 170
Fax: (978)263-0033   | AIM: GigabitEthernet0
NOC: http://www.twdx.net | POC: HAESU-ARIN, HDJ1-6BONE


Re: Nachi/Welchia Aftermath

2004-01-20 Thread Scott Weeks


: : What kind of effects did everyone see from this devastating worm and what
: : lessons did we learn for preventing network downtime in the future?
:
:
: Proper network design is a good thing...  ;-)


Before I get flamed, I should say that is for end-user networks, not the
normal BANs (Big A$$ Networks) that're the norm on this list.  I'm a
.edu-eyeball network now-a-days and I don't have to get everything to the
end-user nor do I have to send out everything from the end-user, so I can
block whatever I need, so long as my customers are happy.  99.9% of the
time, they don't know I'm blocking anything...

scott



Re: Nachi/Welchia Aftermath

2004-01-20 Thread Scott Weeks




: What kind of effects did everyone see from this devastating worm and what
: lessons did we learn for preventing network downtime in the future?


Proper network design is a good thing...  ;-)

scott




Re: Nachi/Welchia Aftermath

2004-01-20 Thread james

Flow based "attacks" can kill flow based routers.

James Edwards
Routing and Security Administrator
[EMAIL PROTECTED]
At the Santa Fe Office: Internet at Cyber Mesa
Store hours: 9-6 Monday through Friday
505-988-9200 SIP:1(747)669-1965



Nachi/Welchia Aftermath

2004-01-20 Thread Brent Van Dussen
Well folks, since the middle of August I've been tracking the spread and 
subsequent efforts by our community to stop the nachia/welchia infection 
that took down so many networks.

Sadly, by my estimations, only about 20-30% of infected hosts were 
cleaned.  After Jan 1, 2004 it appears that the thousands, (millions?) of 
remaining infected hosts were rebooted and the worm removed 
itself.  Network traffic has finally returned to normal.

What kind of effects did everyone see from this devastating worm and what 
lessons did we learn for preventing network downtime in the future?



Re: What's the best way to wiretap a network?

2004-01-20 Thread Steven M. Bellovin

In message <[EMAIL PROTECTED]>, William Allen Simpson writes:
>
>Eriks Rugelis wrote:
>> 
>> On the other hand, if your environment consists of a large number (100's) of
>> potential tapping points, then you will quickly determine that in-line taps
>> have very poor scaling properties.
>> a) They are not rack-dense
>> b) They require external power warts
>> c) They are not cheap (in the range of US$500 each)
>> d) Often when you have that many potential tapping points, you are
>> likely to be processing a larger number of warrants in a year.  An in-line
>> tap arrangement will require a body to physically install the recording
>> equipment and cables to the trace-ports on the tap.  You may also need to
>> make room for more than one set of recording gear at each site.
>> 
>This is a feature, not a bug.  Law enforcement is required to pay -- 
>up front -- all costs of tapping.  No pay, no play.  

Right, at least in the U.S.  See section 4(e) of 
http://www4.law.cornell.edu/uscode/18/2518.html

--Steve Bellovin, http://www.research.att.com/~smb




Re: What's the best way to wiretap a network?

2004-01-20 Thread William Allen Simpson

Eriks Rugelis wrote:
> 
> On the other hand, if your environment consists of a large number (100's) of
> potential tapping points, then you will quickly determine that in-line taps
> have very poor scaling properties.
> a) They are not rack-dense
> b) They require external power warts
> c) They are not cheap (in the range of US$500 each)
> d) Often when you have that many potential tapping points, you are
> likely to be processing a larger number of warrants in a year.  An in-line
> tap arrangement will require a body to physically install the recording
> equipment and cables to the trace-ports on the tap.  You may also need to
> make room for more than one set of recording gear at each site.
> 
This is a feature, not a bug.  Law enforcement is required to pay -- 
up front -- all costs of tapping.  No pay, no play.  


> Large-scale providers will probably want to examine solutions based on
> support built directly into their traffic-carrying infrastructure (switches,
> routers.)
> 
> You should be watchful for law enforcement types trying dictate a 'solution'
> which is not a good fit to your own business environment.  There are usually
> several ways of getting them the data which they require to do their jobs.
> 
Whatever they are willing to pay for -- a good fit for the business 
environment is the largest effort and highest cost, as the overhead 
and administrative charges should enough to be profitable.
-- 
William Allen Simpson
Key fingerprint =  17 40 5E 67 15 6F 31 26  DD 0D B9 9B 6A 15 2C 32


Re: sniffer/promisc detector

2004-01-20 Thread haesu

> PS. Sniffer... there are not any way to detect sniffer in the non-switched
> network, and there is not much use for sniffer in switched network, if this
> network is configured properly and is watched for the unusial events.

depends on brand and model of switch

$ portinstall dsniff
$ man macof

-J (and yes, the thread topic is about ways for _watching_ "the unusual events" aka 
sniffing)

> 
> >
> > > The real smart ones - professionals - won't attack unless there's a
> chance
> > > of a serious payback.  This excludes most businesses, and makes anything
> > > but a well-known script-based attack a very remote possibility.
> >
> > that's just not so.  ask me about it in person and i might tell you
> stories.
> >
> > > For most other people a trivial packet-filtering firewall, lack of
> > > Windoze, and a switch instead of a hub will do just fine.
> >
> > this part, i agree with.
> > -- 
> > Paul Vixie

-- 
James Jun (formerly Haesu)
TowardEX Technologies, Inc.
1740 Massachusetts Ave.
Boxborough, MA 01719
Consulting, IPv4 & IPv6 colocation, web hosting, network design & implementation
http://www.towardex.com  | [EMAIL PROTECTED]
Cell: (978)394-2867  | Office: (978)263-3399 Ext. 170
Fax: (978)263-0033   | AIM: GigabitEthernet0
NOC: http://www.twdx.net | POC: HAESU-ARIN, HDJ1-6BONE


RE: sniffer/promisc detector

2004-01-20 Thread Henry Linneweh
Remote power on :P
 
-HenryMichel Py <[EMAIL PROTECTED]> wrote:
> Alexei Roudnev wrote:> - turn off power - safety is 10. Secure> system, is a dark system.I have to disagree on this one; there is WOL (Wake-up On Lan), thesystem can be lit remotely.- turn off power - safety is 9- Unplug all cords - safety is 10Michel.

Re: sniffer/promisc detector

2004-01-20 Thread Dave Israel


On 1/20/2004 at 09:18:07 -0800, Alexei Roudnev said:
> 
> 
> >
> > Uhm, that would be wrong.  This is simply "security through obscurity".
> Yes, it is wrong for the _smart books_. But it works in real life. Of
> course, it should not be the last line of defense; but it works as a first
> line very effectively.
> 
> If I rate safety as a number (10 is the best, 0 is the worst):
> - unpatched sshd on port 22 - safety is zero (will be hacked by automated
> script in a few weeks)
> - patched sshd on port 22 - safety is 5 (even patched sshd have a bugs, and
> I do not know, what happen first - I patch next bug or hacker's script find
> this sshd and hack it)
> - unpatched sshd on port 30013 - safety is 7 (higher) because no one
> automated script can find it, and no one manual scan find it in reality
> - patched sshd on port 30013 - safety is 9
> - turn off power - safety is 10. Secure system, is a dark system.
> 
> (I did not rated firewalls etc).

Actually, an automated script or manual scan can find it trivially.
All you have to do is a quick port scan, looking for this:

12:31 biohazard~>telnet [somewhere] [port]
Trying [ip_address]...
Connected to localhost.
Escape character is '^]'.
SSH-1.99-OpenSSH_3.4p1c


Plus, if you put it on a non-standard port, you tend to use the same
one across the enterprise, so it is only really obscure once.  Moving
port numbers only protects you against idle vandalism; it is useless
against people who truly wish you harm.

You really need a firewall, particularly one that can detect a port
scan and shut off the scanner, for changing ports to have any real
security.  It is kind of like a 4-digit PIN being useless for a bank
card without the 3-try limit.

-Dave


RE: sniffer/promisc detector

2004-01-20 Thread Michel Py

> Alexei Roudnev wrote:
> - turn off power - safety is 10. Secure
> system, is a dark system.

I have to disagree on this one; there is WOL (Wake-up On Lan), the
system can be lit remotely.

- turn off power - safety is 9
- Unplug all cords - safety is 10

Michel.



Re: Diversity as defense

2004-01-20 Thread Alexei Roudnev

Correct. Microsoft's problem is not security alone, but monoculture. If we
have all systems around Windows2003, we are exposed to risk of devastating
virus attack. No matter, how secure this Windows2003 is.

- Original Message - 
From: <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Tuesday, January 20, 2004 7:18 AM
Subject: Re: Diversity as defense


> Agreed, vendor lock in is a very big problem, what the economists would
call increasing returns.  Interestingly most of the research on the subjest
finds that a vendor achieves "lock in" and a dominant market position not by
being the most competitive product.  Random historical accident, policies,
market fluctuations, etc. - i.e. beta vs. vhs or CP/M vs. DOS vs. Apple.
Probably getting far off topic here, but if you decreased the ability of
vendors to lock in customers (increase competition) could you increase
diversity and security at the macro scale.
>






> On Mon, 19 Jan 2004 15:35:22 EST, [EMAIL PROTECTED]  said:
> > The diversity, monoculture and agricutlure analogy makes nice press, but
how
> > realistic is diversity as a defense.
>
> Well.. if diversity were to actually exist, it would be quite helpful.
Right now,
> if you have a Windows exploit, you might as well point and pull the
trigger because
> you have an 86% chance of nailing the target.  Add in a Linux exploit and
you're well
> over 90%.  That's Russian Roulette with a 10-shooter and one bullet.
>
> On the other hand, let's think about if there were 10 products that each
have 10%
> market share, and even a minimal attempt at deterring fingerprinting of
the target,
> you're looking at a 90% chance that the exploit you launch will fail and
leave a
> nasty mark on an IDS.  Suddenly, it's 9 bullets and one blank.  And even
worse odds
> if you haven't been picking up all the exploits in the series - or not all
the products
> are vulnerable.
>
> Unfortunately, it's not a realistic scenario, because...
>
> > Is cost the biggest hurdle or limited
> > avaiability of competitive products, or simply no bang for the buck by
> > diversifying.
>
> I can sum up *every* problem I've had in getting people to migrate in just
> 3 words: "vendor lock in".  Enough said on that topic.
>



Re: sniffer/promisc detector

2004-01-20 Thread Alexei Roudnev


>
> Uhm, that would be wrong.  This is simply "security through obscurity".
Yes, it is wrong for the _smart books_. But it works in real life. Of
course, it should not be the last line of defense; but it works as a first
line very effectively.

If I rate safety as a number (10 is the best, 0 is the worst):
- unpatched sshd on port 22 - safety is zero (will be hacked by automated
script in a few weeks)
- patched sshd on port 22 - safety is 5 (even patched sshd have a bugs, and
I do not know, what happen first - I patch next bug or hacker's script find
this sshd and hack it)
- unpatched sshd on port 30013 - safety is 7 (higher) because no one
automated script can find it, and no one manual scan find it in reality
- patched sshd on port 30013 - safety is 9
- turn off power - safety is 10. Secure system, is a dark system.

(I did not rated firewalls etc).





>
> Go grab nessus (www.nessus.org), modify the code a bit, and I guarantee
you
Yes, correct. Do it. Measure scan time, and you will be surprised. Open old
logs, and you will found, that such things are not used, they are absolutely
not effective for any wide scanning. And they are very easy to detect by IDS
systems (it is useless to detect port 22 scan - every hacker is doing it).

Scan 65000 ports by T1 link, using 'nessus', and see the time and traffic.
It can be used by insider on 100,000 Mbit network only, and (just again)
such scan will be 100% catched by any IDS.



> that your ssh daemon running on a non-standard port can still be found,
> identified, and exploited. Trivial.


Can != WILL.

It WILL NOT. And it is FIRST line of defense. But this line decreases
attacks level at 10,000 times, And it costs 0 (zero). Do not read _smart
books_ without some thinking. (There are many cases, where it is impossible.
But if it is possible, use it).

Second line of defense is patched system, host IDS etc etc - standard
security. It shuld not be the first line. And it should not be the last
line.

Last line of defense is HoneyPot.

PS. I worked as a RU-CERT expert, make a traps, found and told with hackers,
investigated many cases, so I have some background. And, of course, I know
_smart books theory_.
>
> -b
>



Re: What's the best way to wiretap a network?

2004-01-20 Thread Scott McGrath



Scott C. McGrath

On Tue, 20 Jan 2004, Eriks Rugelis wrote:

>
> Sean Donelan wrote:
> > Assuming lawful purposes, what is the best way to tap a network
> > undetectable to the surveillance subject, not missing any
> > relevant data, and not exposing the installer to undue risk?
>
> 'Best' rarely has a straight-forward answer.  ;-)
>
> Lawful access is subject to many of the same scaling issues which we
> confront in building up our networks.  Solutions which can work well for
> 'small' access or hosting providers may not be sensible for larger scale
> environment.
>
> If you have only a low rate of warrants to process per year,
>and if your facilities are few in number and/or geographically close
> together,
>and if your 'optimum' point of tap insertion happens to be a link which
> can be reasonably traced without very expensive ASIC-based gear
>and if your operation can tolerate breaking open the link to insert the
> tap,
>and if the law enforcement types agree that the surveillance target is
> unlikely to notice the link going down to insert the tap...
>
>then in-line taps such as Finisar or NetOptics can be quite sensible.
>
> If your operation can tolerate the continuing presence of the in-line tap
> and you only ever need a small number of them then leaving the taps
> permanently installed may be entirely reasonable.
>
> On the other hand, if your environment consists of a large number (100's) of
> potential tapping points, then you will quickly determine that in-line taps
> have very poor scaling properties.
>   a) They are not rack-dense
>   b) They require external power warts
>   c) They are not cheap (in the range of US$500 each)
>   d) Often when you have that many potential tapping points, you are
> likely to be processing a larger number of warrants in a year.  An in-line
> tap arrangement will require a body to physically install the recording
> equipment and cables to the trace-ports on the tap.  You may also need to
> make room for more than one set of recording gear at each site.
>
> Large-scale providers will probably want to examine solutions based on
> support built directly into their traffic-carrying infrastructure (switches,
> routers.)

Using cisco's feature set on a uBR it would be

cable intercept interface x/y   

as an example of lawful access on infrastructure equipment
>
> You should be watchful for law enforcement types trying dictate a 'solution'
> which is not a good fit to your own business environment.  There are usually
> several ways of getting them the data which they require to do their jobs.
>
> Eriks
> ---
> Eriks Rugelis  --  Senior Consultant
> Netidea Inc.  Voice:  +1 416 876 0740
> 63 Charlton Boulevard,FAX:+1 416 250 5532
> North York, Ontario,  E-mail: [EMAIL PROTECTED]
> Canada
> M2M 1C1
>
> PGP public key is here:
> http://members.rogers.com/eriks.rugelis/certs/pgp.htm
>
>
>


Re: What's the best way to wiretap a network?

2004-01-20 Thread Eriks Rugelis

Sean Donelan wrote:
> Assuming lawful purposes, what is the best way to tap a network
> undetectable to the surveillance subject, not missing any
> relevant data, and not exposing the installer to undue risk?

'Best' rarely has a straight-forward answer.  ;-)

Lawful access is subject to many of the same scaling issues which we
confront in building up our networks.  Solutions which can work well for
'small' access or hosting providers may not be sensible for larger scale
environment.

If you have only a low rate of warrants to process per year,
   and if your facilities are few in number and/or geographically close
together,
   and if your 'optimum' point of tap insertion happens to be a link which
can be reasonably traced without very expensive ASIC-based gear
   and if your operation can tolerate breaking open the link to insert the
tap,
   and if the law enforcement types agree that the surveillance target is
unlikely to notice the link going down to insert the tap...

   then in-line taps such as Finisar or NetOptics can be quite sensible.

If your operation can tolerate the continuing presence of the in-line tap
and you only ever need a small number of them then leaving the taps
permanently installed may be entirely reasonable.

On the other hand, if your environment consists of a large number (100's) of
potential tapping points, then you will quickly determine that in-line taps
have very poor scaling properties.
a) They are not rack-dense
b) They require external power warts
c) They are not cheap (in the range of US$500 each)
d) Often when you have that many potential tapping points, you are
likely to be processing a larger number of warrants in a year.  An in-line
tap arrangement will require a body to physically install the recording
equipment and cables to the trace-ports on the tap.  You may also need to
make room for more than one set of recording gear at each site.

Large-scale providers will probably want to examine solutions based on
support built directly into their traffic-carrying infrastructure (switches,
routers.)

You should be watchful for law enforcement types trying dictate a 'solution'
which is not a good fit to your own business environment.  There are usually
several ways of getting them the data which they require to do their jobs.

Eriks
---
Eriks Rugelis  --  Senior Consultant
Netidea Inc.  Voice:  +1 416 876 0740
63 Charlton Boulevard,FAX:+1 416 250 5532
North York, Ontario,  E-mail: [EMAIL PROTECTED]
Canada
M2M 1C1

PGP public key is here:
http://members.rogers.com/eriks.rugelis/certs/pgp.htm





Re: Diversity as defense

2004-01-20 Thread sgorman1
Agreed, vendor lock in is a very big problem, what the economists would call 
increasing returns.  Interestingly most of the research on the subjest finds that a 
vendor achieves "lock in" and a dominant market position not by being the most 
competitive product.  Random historical accident, policies, market fluctuations, etc. 
- i.e. beta vs. vhs or CP/M vs. DOS vs. Apple.  Probably getting far off topic here, 
but if you decreased the ability of vendors to lock in customers (increase 
competition) could you increase diversity and security at the macro scale.
On Mon, 19 Jan 2004 15:35:22 EST, [EMAIL PROTECTED]  said:
> The diversity, monoculture and agricutlure analogy makes nice press, but how
> realistic is diversity as a defense. 

Well.. if diversity were to actually exist, it would be quite helpful.  Right now,
if you have a Windows exploit, you might as well point and pull the trigger because
you have an 86% chance of nailing the target.  Add in a Linux exploit and you're well
over 90%.  That's Russian Roulette with a 10-shooter and one bullet.

On the other hand, let's think about if there were 10 products that each have 10%
market share, and even a minimal attempt at deterring fingerprinting of the target,
you're looking at a 90% chance that the exploit you launch will fail and leave a
nasty mark on an IDS.  Suddenly, it's 9 bullets and one blank.  And even worse odds
if you haven't been picking up all the exploits in the series - or not all the products
are vulnerable.

Unfortunately, it's not a realistic scenario, because...

> Is cost the biggest hurdle or limited
> avaiability of competitive products, or simply no bang for the buck by
> diversifying.

I can sum up *every* problem I've had in getting people to migrate in just
3 words: "vendor lock in".  Enough said on that topic.