Re: BlackWorm infected IP's reporting

2006-01-25 Thread Martin Hannigan

 
 
 Hi.
 
 In the next day or so some of us will cooperate to bring to the 
 attention of all effected AS's information about infected users in their 
 net-space.

That would be affected. 

 This will be coordinated with several groups and organizations. Please 
 expect these emails, thanks.

In other words, NANOG is a step child of these and we'll only see
the PR? If you're going to keep the mitigations off of NANOG, it's
probably safe to keep it all off. We all read newspapers, blogs, and
slashdot. 

I'll post my pre-94 copy of the Compuserve Directory if someone can
prove this story didn't come from this list:

http://www.eweek.com/article2/0,1895,1915070,00.asp

SANS has it, but they aren't being authoritative about it, quoting
elsewhere:

http://isc.sans.org/diary.php?storyid=1067

I'd love to see the US authoritative sources jump in on these
and advise us to cough up our dimes for the dances or not.

-M



Re: cctld server traffic

2006-01-25 Thread Stephane Bortzmeyer

On Mon, Jan 23, 2006 at 01:48:19PM -0800,
 william(at)elan.net [EMAIL PROTECTED] wrote 
 a message of 18 lines which said:

 Maybe I'm ignorant, but isn't there [cc]tld operations mail list
 somewhere?

There is no worldwide TLD (or even ccTLD) operations list (I would be
on it). There are several possible lists, but all of them are partial
(purely european, for instance).



Update: BlackWorm infected IP's reporting

2006-01-25 Thread Gadi Evron


Gadi Evron wrote:


Hi.

In the next day or so some of us will cooperate to bring to the 
attention of all effected AS's information about infected users in their 
net-space.


This will be coordinated with several groups and organizations. Please 
expect these emails, thanks.


Small update:
It is possible later reports will be received as well, but if you have 
infected users, you should get the emails within a few hours.


These email messages will include a web link to the SANS ISC where you 
would be able to securely reach IP addresses relevant to you. It is 
possible (although we try and avoid it) that you will get notifications 
twice, from different email addresses.


If that happens, we can only apologize. I am sure you understand that 
despite coordination, some confusion happens when so much is done by so 
many people in so short a time.


If you get no email message for whatever reason, and wish to *make sure* 
this was not because of some fluke and your net-space really is clean, 
feel free to ping me back in a day or so (off-list).


Thanks again,

Gadi.


BlackWorm: updated snort signatures

2006-01-25 Thread Gadi Evron


Can be found:
http://www.bleedingsnort.com/cgi-bin/viewcvs.cgi/sigs/VIRUS/WORM_Nyxem?rev=1.5only_with_tag=HEADview=markup

Thanks,

Gadi.


Terminal server problem

2006-01-25 Thread Kim Onnel
Hi,

I got a CCM1650 Avocent terminal server, if i use windows to login to
their console, upon hitting enter, the password prompt is bypassed
because another enter is also hit, so i get a wrong password everytime.

But if i do the same from a linux machine, that doesnt happen and i get
to log in fine, which tells me that windows telnet is the problem, but
i dont know which knob i need to fix ?

Microsoft Telnet set ?
bsasdel Backspace will be sent as delete
crlf New line mode - Causes return key to send CR  LF
delasbs Delete will be sent as backspace
escape x x is an escape charater to enter telnet client prompt
localecho Turn on localecho.
logfile x x is current client log file
logging Turn on logging
mode x x is console or stream
ntlm Turn on NTLM authentication.
term x x is ansi, vt100, vt52, or vtnt


Avocent CCM1650 S/W Version 2.1
Username: noc
Password: 
Authentication Complete (DEC-VT100)
Connected to Port: 1 9600,8,N,2,NONE


Login: cisco
password:
login incorrect

Login: cisco
password:
login incorrect

Login:


Re: Terminal server problem

2006-01-25 Thread Larry Smith

On Wednesday 25 January 2006 08:05, Kim Onnel wrote:
 Hi,

 I got a CCM1650 Avocent terminal server, if i use windows to login to their
 console, upon hitting enter, the password prompt is bypassed because
 another enter is also hit, so i get a wrong password everytime.

 But if i do the same from a linux machine, that doesnt happen and i get to
 log in fine, which tells me that windows telnet is the problem, but i dont
 know which knob i need to fix ?

 Microsoft Telnet set ?
 bsasdel Backspace will be sent as delete
 crlfNew line mode - Causes return key to send CR  LF

cut

Believe your problem is the CRLF,  try just LF or just CR (believe my Linx 
term is set to just LF but not in office at moment).

-- 
Larry Smith
SysAd ECSIS.NET
[EMAIL PROTECTED]




Re: Split flows across Domains

2006-01-25 Thread Steven M. Bellovin

In message [EMAIL PROTECTED], Matt Buford writes:



Actually, TCP handles out of order packets rather well as long as the 
reordering isn't too severe.  You see a bunch of SACKs flying around, but as 
long as it doesn't get too out of hand it doesn't affect throughput.


Actually, it isn't that great.  See draft-ietf-tcpm-tcp-dcr-06 and its 
references.

--Steven M. Bellovin, http://www.cs.columbia.edu/~smb




Re: Split flows across Domains

2006-01-25 Thread Simon Leinen

Robert E Seastrom writes:
 Yes and no.  CEF is {src, dst} hash IIRC, and per-flow usually
 means {src, srcport, dst, dstport, [proto, tos]} hash in my
 experience.

Correct.

The Catalyst 6500/7600 OSR with Sup2/Sup32/Sup720 can be configured to
hash based on L4 ports in addition to the IP addresses (for IPv4):

http://puck.nether.net/pipermail/cisco-nsp/2005-December/026952.html

This is handy when you have multiple striped TCP connections between
a single pair of hosts, and want them to be able to use multiple
equal-cost paths, but still want to avoid reordering inside each
connection (as you would inevitably get with per-packet load
sharing).
-- 
Simon.



NANOG 36 (Dallas)

2006-01-25 Thread Carol Wadsworth


If you are planning to attend NANOG 36, hosted by Yahoo! in 
Dallas, Feb. 12-15, please note the upcoming deadlines:


Friday, January 27:  the discounted group room rate at the 
Fairmont Hotel-Dallas expires.


Monday, January 30:  the meeting registration fee will increase 
$50.


For additional meeting details, please see www.nanog.org

See you there!


Re: BlackWorm infected IP's reporting

2006-01-25 Thread Martin Hannigan

 
 Hi,
 
 On Mi, 2006-01-25 at 03:20 -0500, Martin Hannigan wrote:
   
   
   Hi.
   
   In the next day or so some of us will cooperate to bring to the 
   attention of all effected AS's information about infected users in their 
   net-space.
  
  That would be affected. 
  
   This will be coordinated with several groups and organizations. Please 
   expect these emails, thanks.
  
  In other words, NANOG is a step child of these and we'll only see
  the PR? If you're going to keep the mitigations off of NANOG, it's
  probably safe to keep it all off. We all read newspapers, blogs, and
  slashdot. 
 
 sorry, but i couldn't understand your problem. I think it's just a
 usefull information, wich AS is infected by a critical worm. Also i
 relay this information to people, who think this informations are
 usefull, too.
 
 Ok, perhaps there are people to advertise themselves, but why not? When
 they invest time in this work, why aren't they allowed to get some kind
 of approval?


Nah, we already know who those people are. It's more like if you keep
predicting a blizzard and I wake up and there was a misting of rain, 
I keep getting less and less interested in the predictions. It costs
real money to get these dances going and unless you're going to give
us all the information, please don't bother. The snort SIDS were 
nice, but as far as I am concerned, IL-CERT is not a trusted 
source. 

The third story about this horrrible worm:

http://www.commentwire.com/article_news.asp?guid=20856A5C-3952-4F2C-913A-1E963F902D41

If I don't see SANS running around with their capes off, I don't
really pay too much attention. The last one wasn't a big hit like
they thought, but they do good work. I trust them more than 
I trust IL-CERT telling North Americans to drop our hotdogs, turn
off our football, and get ready for worms. I'd hope to see US-CERT
continue making progress and telling North Americans when to worry.

The work everyone is doing is fantastic, but it's pretty clear
trust is being ignored and while we're ont he subject proper delivery
of files with checksums etc. It ain't happening anymore.

-M 



Martin Hannigan

2006-01-25 Thread Gadi Evron


Serious answers: (much like your 'serious questions'):


If I don't see SANS running around with their capes off, I don't


http://isc.sans.org/blackworm
Further, our reports lead to a SANS ISC temporary URL's for each AS.


really pay too much attention. The last one wasn't a big hit like
they thought, but they do good work. I trust them more than 
I trust IL-CERT telling North Americans to drop our hotdogs, turn


I don't work for IL-CERT (which is actually the GOV cert, not IL-CERT), 
except in an advisory capacity volunteer-base now. I.e., I am a civilian 
now.



off our football, and get ready for worms. I'd hope to see US-CERT
continue making progress and telling North Americans when to worry.


US-CERT is kept in the loop every step of the way, as is the FBI, Secret 
Service and a lot of others who contribute from their time and effort. 
We can all criticize others, it's easy. How about you start pulling your 
own weight instead of causing havoc non-stop?


Is this some sort of VeriSign plot or did you come up with it all on 
your own?



The work everyone is doing is fantastic, but it's pretty clear
trust is being ignored


I am not one to keep my mouth shut. I am also not one to answer idi.. 
err, donkies. Still, I kept quiet about you for a long time, as ignoring 
trolls is usually the best way of handling them.


I am often emotional, straight-forward and tactless, i.e. == rude for 
some people, which is why I try and speak differently to non-Israelies.
Unlike you, I don't impede progress or pick personal fights as a regular 
day-to-day sport. As the mods say nothing to you for a long time now, I 
suppose your kind of behavior is fair game.


So...

Are you going to stop being a troll about everything IL-CERT does, I 
do or anyone else except for you does?


What is it you do again? Anything what-so-ever?
Or is it just: pick up on someone and act the a**-h*le so that you can 
gain respect in the quick and dirty route, because some tech is in there 
and you act like someone who is authoritative in writing?
Use flame techniques such as quote only portions of the text, reply to 
something a tad bit different than what was written or ignore some of 
what the other guy said?

Anything else?

Last time that resulted in harming a big operational forum with one of 
the mods quitting (who also just HAPPENED to be an Israeli). You should 
be ashamed. Luckily it usually ends with only flame wars.


You use your own name rather than VeriSign's in everything yet are not 
afraid to speak openly for VeriSign when it suits you. What is it you do 
on nanog?


I've had enough. I knew it was a mistake to quit ignoring you and it 
probably is a mistake to reply to you, but your personal attacks can't 
go on, even under the mask of concern. Have the GUTS to come out and 
say what you want, or is it just flaming?


Some of us work day and night on local operational issues, others work 
day and night on the survivability of the Internet itself.


And you? Google the wikipedia entry for STFU.

Gadi.


So -- what did happen to Panix?

2006-01-25 Thread Steven M. Bellovin

It's now been 2.5 business days since Panix was taken out.  Do we know 
what the root cause was?  It's hard to engineer a solution until we 
know what the problem was.

--Steven M. Bellovin, http://www.cs.columbia.edu/~smb




Re: So -- what did happen to Panix?

2006-01-25 Thread william(at)elan.net



On Wed, 25 Jan 2006, Steven M. Bellovin wrote:


It's now been 2.5 business days since Panix was taken out.  Do we know
what the root cause was?  It's hard to engineer a solution until we
know what the problem was.


Is it really that hard to engineer this solution? We do have several of 
them proposed (SBGP, soBGP, etc) and new WG is likely to be formed soon

within IETF to finally work it out.

--
William Leibzon
Elan Networks
[EMAIL PROTECTED]


Re: Martin Hannigan

2006-01-25 Thread Martin Hannigan

 
 Serious answers: (much like your 'serious questions'):
 
  If I don't see SANS running around with their capes off, I don't
 
 http://isc.sans.org/blackworm
 Further, our reports lead to a SANS ISC temporary URL's for each AS.

The last time SANS felt something was so serious they needed all
of NANOG to dance, they came out and said so. That's their handlers
diary. I read it. A lot of people read it. It's well balanced and 
usually on target. Just like that. It's not alarmist. It seems 
fairly certain that as long as Symantec et. al. do their thing, we
will be able to watch the superbowl in peace.

 I don't work for IL-CERT (which is actually the GOV cert, not IL-CERT), 
 except in an advisory capacity volunteer-base now. I.e., I am a civilian 
 now.

Congratulations.

 
  off our football, and get ready for worms. I'd hope to see US-CERT
  continue making progress and telling North Americans when to worry.
 
 US-CERT is kept in the loop every step of the way, as is the FBI, Secret 
 Service and a lot of others who contribute from their time and effort. 
 We can all criticize others, it's easy. How about you start pulling your 
 own weight instead of causing havoc non-stop?

I'm glad to hear that, as many times as you state it. Thank you.

Trust isn't havoc. Your loose cannon response is an excellent
reason why we should be skeptical. My point was around trust and who
we should and shouldn't. There are a lot of characters out there doing
things that are helpful, but that doesn't mean we should trust them.
I don't think that North American Network operators should trust you
and my reason why is that I had at one point asked you to disclose how
you were collecting information you wanted me to rely on and you 
refused. My dis-trust is not personal. There are now other reasons
that I'd prefer to not have to disclose here as it does nothing to
further the conversation.

As far as my contribution goes, I'm making it. I read, observe, discuss,
and comment. I'm sorry if you feel particularly targeted or flamed. It
is not intentional. What would you like me to do to make it better
for you? A good example of the interaction I describe is when you
were first posting the bot reports and there was discussion. They
changed and they were quite ok and I believe I commented to the same.

Perhaps my typing style is irritating? I apologize.

As far as general security goes, I do not trust DA, NSP-SEC, or
many others as the final authoritative source on anything. There
are some people I trust more than others, Thomas, Bellovin, Bush, etc., and
then there are the people I can't trust i.e. the IRC'ers, etc.

 Is this some sort of VeriSign plot or did you come up with it all on 
 your own?

I think I'll watch White Noise on the DVD now.

Admins: Clearly, a personal attack and I'd like the AUP enforced
please.

-M




Re: Martin Hannigan

2006-01-25 Thread Gadi Evron


Martin Hannigan wrote:

Admins: Clearly, a personal attack and I'd like the AUP enforced
please.


Clearly, exactly what you've been trying to get me to do for a long 
time, to get me off NANOG, well... I finally decided to comply.


Admins: I will answer any call to leave.. Also, I'd like for Martin to 
see this AUP enforced on his continual attacks on me and many others 
on-list, regardless of my reply to him.


Thanks.


VeriSign

2006-01-25 Thread Martin Hannigan



Folks,

Since my friend Gadi brought it up, I left VeriSign on January 3 after
3 years of solid employment. It was a good run. I was asked to move
to Dulles, VA and I declined for personal reasons. I live in Boston, MA.
and was a commuter to the DC area for the most part.

I've taken a position at another company working to provide global
stability in routing and enhance IP security. Some of you will be
customers and I am looking forward to being called 'vendor'.

I would like to thank all of you for your support while I worked
at VeriSign. 

Best Regards,

-M 



Re: Martin Hannigan

2006-01-25 Thread william(at)elan.net



On Wed, 25 Jan 2006, Gadi Evron wrote:


Martin Hannigan wrote:

Admins: Clearly, a personal attack and I'd like the AUP enforced
please.


Clearly, exactly what you've been trying to get me to do for a long time, to 
get me off NANOG, well... I finally decided to comply.


Admins: I will answer any call to leave.. Also, I'd like for Martin to see 
this AUP enforced on his continual attacks on me and many others on-list, 
regardless of my reply to him.


I personally do not want to see either Gadi or Martin leave - both have 
been good contributors on this list and this grudge they got against each 
other should be settled offline with both of them self-enforcing and not 
replying to the other one again on the list (so as to not provoke again).


--
William Leibzon
Elan Networks
[EMAIL PROTECTED]


Re: Martin Hannigan

2006-01-25 Thread Joe Abley



On 25-Jan-2006, at 16:12, william(at)elan.net wrote:


On Wed, 25 Jan 2006, Gadi Evron wrote:


Martin Hannigan wrote:

Admins: Clearly, a personal attack and I'd like the AUP enforced
please.


Clearly, exactly what you've been trying to get me to do for a  
long time, to get me off NANOG, well... I finally decided to comply.


Admins: I will answer any call to leave.. Also, I'd like for  
Martin to see this AUP enforced on his continual attacks on me and  
many others on-list, regardless of my reply to him.


I personally do not want to see either Gadi or Martin leave - both  
have been good contributors on this list and this grudge they got  
against each other should be settled offline with both of them self- 
enforcing and not replying to the other one again on the list (so  
as to not provoke again).


The NANOG list administrators can be reached at nanog- 
[EMAIL PROTECTED] That is almost certainly a better place to send  
comments related to the AUP than the this list.


(I would have kept this comment to private mail except that it seems  
possible that a public discussion about the merits of particular  
subscribers is about to unfold here, which would be a shame.)



Joe


Re: Martin Hannigan

2006-01-25 Thread Justin M. Streiner


On Wed, 25 Jan 2006, Joe Abley wrote:

The NANOG list administrators can be reached at [EMAIL PROTECTED] That 
is almost certainly a better place to send comments related to the AUP than 
the this list.


(I would have kept this comment to private mail except that it seems possible 
that a public discussion about the merits of particular subscribers is about 
to unfold here, which would be a shame.)


Agreed.

All:

*PLEASE* let this thread die.  Allowing it to continue serves no 
constructive purpose whatsoever.


jms


Re: BGP route flap damping

2006-01-25 Thread Kotikalapudi Sriram



On Jan 16, 2006, at 8:48 AM, Gustavo Rodrigues Ramos wrote:
 The problem takes place five or six AS far from me... Where I
can't do 
 much. I still can't reach some prefixes announced by large
ISPs.
On Jan 16, 2006, at 7:29 AM, Gustavo Rodrigues Ramos wrote:
Last week we received a DoS attack which got down my BGP connections
to
my upstream providers (for three or four times I believe). I also
belive
that event caused some routers to suppress my BGP announcement.

We have been conducting simulation studies to quantify
the impact of BGP peering session attacks and how RFD 
could severely amplify the outage periods.
I can share some insights we have developed which 
I hope are helpful although they may not directly address 
the problem you are experiencing.

Please use this link to our BGP attack simulation work
(at NIST) for additional details:

http://www.antd.nist.gov/iip_pubs/BGP_RFD_NIST_Sept05.pdf

One point to be noted with certainty is that if your BGP
router loses its BGP session with a peer
and when the session gets restored shortly thereafter, 
the peer then resets your RFD penalty to zero. 
Hence, even if the attack events happen multiple times,
RFD penalties for prefixes in your AS at your peer are 
not incrementing and your peer does not put 
your BGP router or prefixes under RFD suppression.
However, your peer's peers and other ASs upstream
(who are more than one hop away from you)
could place the prefixes in your AS under RFD suppression.
When the DOS attacks that caused the BGP session
to be lost multiple times have subsided, then the RFD penalty
will decay below the RFD reuse threshold within
a few thousands of seconds. The half-time of the exponential decay
is typically 900s and hence it takes a few thousands of seconds
for RFD penalty value to fall back below the RFD reuse threshold.

The BGP speakers that are two or more hops away from your
BGP speaker should restore all prefixes in your AS in their routing
tables within that amount of time (about 2000s to 4000s) after 
the attacks have subsided. 
 From the experimental results in paper we have written
(click on the link noted above for a pdf copy),
it can be seen that even under large scale attacks, the
unreachability between ASs and prefixes lasts for a few 
thousands of seconds (after attacks have subsided), 
and all AS-prefix routes are restored back to 
their stable paths after that amount of time.
If the unreachability in your case has lasted for hours or days
after
the attacks have happened, then it is not clear what
may have caused that. It may be something that is due to operational
procedures with some providers that are extraneous to the
normal operating principles of RFD (just a thought).

Sriram 

K. Sriram
E-Mail: [EMAIL PROTECTED]
Web:

http://www.antd.nist.gov/iipp.shtml






Blackworm hunbers [Was: Re: Martin Hannigan]

2006-01-25 Thread Fergie

Well, let's hope we can watch the Super Bowl in peace -- I'm
turning my pager  cell phone off anyways. :-)

In any event, as Alex Eckelberry writes over on the Sunbelt
Software blog, ...we’re now seeing infestations for the
Blackworm worm (aka KamaSutra) getting close to 2 million.

Yesterday it was at close to 700k. 

Of course, it’s possible that this URL has gotten out to
the public, which would increase the count (simply hitting
the website increments the count by one).  However, to my
knowledge, this URL is only known in the security community.

Remember that this worm has a very destructive payload. Even
if you discount the number here, you’re still looking at a
significant number of people who will suffer potentially
devastating data loss.

I couldn't agree more.

Cheers,

- ferg

ps. http://sunbeltblog.blogspot.com/2006/01/blackworm-worm-over-18-million.html


-- Martin Hannigan [EMAIL PROTECTED] wrote:

 
 http://isc.sans.org/blackworm
 Further, our reports lead to a SANS ISC temporary URL's for each AS.

The last time SANS felt something was so serious they needed all
of NANOG to dance, they came out and said so. That's their handlers
diary. I read it. A lot of people read it. It's well balanced and 
usually on target. Just like that. It's not alarmist. It seems 
fairly certain that as long as Symantec et. al. do their thing, we
will be able to watch the superbowl in peace.

[snip]

--
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 [EMAIL PROTECTED] or [EMAIL PROTECTED]
 ferg's tech blog: http://fergdawg.blogspot.com/



darknet people - ddos detection

2006-01-25 Thread Gadi Evron


Can we all please take a look at RCN.COM/.NET to see if they are being 
DDoS'd as retribution for the massive SP and LEO operations going to 
mitigate this risk of fast becoming millions of infected machines about 
to be destroyed?


We'd appreciate any help given, thanks.

Gadi.


Re: Blackworm hunbers

2006-01-25 Thread Martin Hannigan

 Well, let's hope we can watch the Super Bowl in peace -- I'm
 turning my pager  cell phone off anyways. :-)

I'm going for Steelers. You? I've got a couple of fresh 
Maine Lobsters and Union Oyster House chowdah to put up 
if you're interested in a wager.

[ Removed my name from the subject. I like it in lights, but
  I've had enough for today! :-) ] 

 In any event, as Alex Eckelberry writes over on the Sunbelt
 Software blog, ...we’re now seeing infestations for the
 Blackworm worm (aka KamaSutra) getting close to 2 million.
 
 Yesterday it was at close to 700k. 
 
 Of course, it’s possible that this URL has gotten out to
 the public, which would increase the count (simply hitting
 the website increments the count by one).  However, to my
 knowledge, this URL is only known in the security community.

The URL is out all over the place.

 Remember that this worm has a very destructive payload. Even
 if you discount the number here, you’re still looking at a
 significant number of people who will suffer potentially
 devastating data loss.
 
 I couldn't agree more.

People without A/V? How sad can you feel? I don't want anyone
to lose data, but I bet a bunch of people by A/V as a result.
That's good.

Check out this story where it was downplayed:

http://www.eweek.com/article2/0,1895,1915070,00.asp

  http://isc.sans.org/blackworm
  Further, our reports lead to a SANS ISC temporary URL's for each AS.

http://isc.sans.org/diary.php?storyid=1073 - but really, do you
consider this to be a huge issue that we should prepare to be on
call over? 

Sans, http://isc.sans.org/infocon.php and Symantec, 
http://www.symantec.com/index.htm  , are both at their normal threat levels.

The point I was trying to make before the thread went, East?, was 
that there is a perceived problem in the security community with 
approrpriate response. I'd tell you how I think that could have
been avoided, but then my name would go up in the subject again.
*cough full disclosure* 

Off the top of my head I think the security trust landscape
today looks like this. I base this on participation, people
I know participating, comments I hear at the NANOG water bubbler,
etc. and they are nothing but personal opinions.

SANS - Trusted, good reputation growing
NSP-SEC - nuetral since it's a collective of people+groups
skitter15 - untrusted, but trusted when info leaks. (too long to explain)
PSIRT - trusted, borderline. 
US-CERT - trusted for NA matters, w/other certs
UK-CERT - trusted for EU matters, w/other certs
IL-CERT - no comment
DA - untrusted
TISF - untrusted, new, etc.
CERTs at large - Nuetral, has to be case by case
Carrier Security Groups - Trusted for matters of their own
MSS - Neutral
AV - Trusted
Software Vendors - Neutral
Hardware Vendors - Untrusted, case by case 
Force 10 - Trusted
Juniper - Trusted
Cisco - Nuetral, case by case
Team-Cymru - Trusted case by case
SecuriTeam - Untrusted, untested

This isn't a popularity contest, so I'll leave individuals
off of my list, but you can probably guess who in most cases
including using some of the notes above.

-M


Wifi SIP WPA/PSK Support

2006-01-25 Thread Mike Leber


I'm working on finding a Wifi SIP phone that supports WPA/PSK that we can
recommended to VOIP clients.  As everybody knows, currently most Wifi SIP
phones support WEP which is demonstrably insecure.  For banking and
financial customers, or companies that are given passwords or credit cards
over the phone, this is a serious security issue.

We recently bought a Hitachi-Cable Wireless IPC-5000 WiFi SIP Phone from
voipsupply.com after finding some web pages that said that phone supported
WPA (the pages were in German), yet once we got the phone all it supported
was WEP even after updating the firmware to the latest version using the
website mentioned in the documentation that came with the phone.

I've had a few people say that there was some sort of conspiracy to keep
US citizens from using secure phones, however I found that laughable
because the potential risk of terrorist or criminal interception from
having all Wifi telephone conversations involving credit cards (let alone
social security numbers, bank account numbers, passwords, what have you)
in the clear would create an attack vector so large as to exceed all other
possible attack vectors... I mean why work on cracking anything when you
can just listen to everybody in the clear (well virtually in the clear
with WEP).

So, back in reality, could anybody in the US that bought their Wifi SIP
phone in the US share a success story at getting Wifi SIP setup with
WPA/PSK?  What model of phone did you buy?  Where did you get it?  Did you
have to upgrade it to any special version of firmware or what?

Mike.

+- H U R R I C A N E - E L E C T R I C -+
| Mike Leber   Direct Internet Connections   Voice 510 580 4100 |
| Hurricane Electric Web Hosting  Colocation   Fax 510 580 4151 |
| [EMAIL PROTECTED]   http://www.he.net |
+---+




Re: Wifi SIP WPA/PSK Support

2006-01-25 Thread Suresh Ramasubramanian
On 1/26/06, Mike Leber [EMAIL PROTECTED] wrote:
 I'm working on finding a Wifi SIP phone that supports WPA/PSK that we can
 recommended to VOIP clients.  As everybody knows, currently most Wifi SIP
 phones support WEP which is demonstrably insecure.  For banking and
 financial customers, or companies that are given passwords or credit cards
 over the phone, this is a serious security issue.

http://www.paesys.com/en/WIFI_wireless_phone_moimstone_Stonehenge_WP150.htm

   Security  Encryption
WPA-PSK AES, TKIP
64/128 bit WEP
802.1x certification (Optional)

Even seems to do v6.

-srs


Re: BlackWorm infected IP's reporting

2006-01-25 Thread Hank Nussbacher

On Wed, 25 Jan 2006, Martin Hannigan wrote:

 us all the information, please don't bother. The snort SIDS were
 nice, but as far as I am concerned, IL-CERT is not a trusted
 source.

Just so people don't get confused: IL-CERT has nothing to do with what
Gadi posted and I don't seem to remember that Gadi included any mention of
IL-CERT in his postings.  In addition, if anyone has any problems with the
trustworthiness of IL-CERT (Israeli Academic CERT) as listed on FIRST:
http://www.first.org/about/organization/teams/index.html
then they should raise that issue with the FIRST secretariat and on the
FIRST mailing lists where we can counter any claims to the otherwise.

Hank Nussbacher
ILAN-CERT representative
IUCC


Re: So -- what did happen to Panix?

2006-01-25 Thread Pekka Savola


On Wed, 25 Jan 2006, william(at)elan.net wrote:

On Wed, 25 Jan 2006, Steven M. Bellovin wrote:

It's now been 2.5 business days since Panix was taken out.  Do we know
what the root cause was?  It's hard to engineer a solution until we
know what the problem was.


Is it really that hard to engineer this solution? We do have several of them 
proposed (SBGP, soBGP, etc) and new WG is likely to be formed soon

within IETF to finally work it out.


It'd be darn difficult to engineer a solution that would end up being 
deployed in any reasonable time if we don't know the requirements 
first.  Yes, there's a draft -- draft-ietf-rpsec-bgpsecrec-03.txt -- 
but it has been woefully lacking on the operator  deployment 
requirements.  More people should participate in the effort.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings


Re: Wifi SIP WPA/PSK Support

2006-01-25 Thread Mike Leber


Thank you!  We'll order one immediately and report back.

Mike.

On Thu, 26 Jan 2006, Suresh Ramasubramanian wrote:

 On 1/26/06, Mike Leber [EMAIL PROTECTED] wrote:
 I'm working on finding a Wifi SIP phone that supports WPA/PSK that we can
 recommended to VOIP clients.  As everybody knows, currently most Wifi SIP
 phones support WEP which is demonstrably insecure.  For banking and
 financial customers, or companies that are given passwords or credit cards
 over the phone, this is a serious security issue.

http://www.paesys.com/en/WIFI_wireless_phone_moimstone_Stonehenge_WP150.htm

   Security  Encryption
WPA-PSK AES, TKIP
64/128 bit WEP
802.1x certification (Optional)

Even seems to do v6.

-srs



Re: So -- what did happen to Panix?

2006-01-25 Thread Valdis . Kletnieks
On Thu, 26 Jan 2006 07:54:30 +0200, Pekka Savola said:
 It'd be darn difficult to engineer a solution that would end up being 
 deployed in any reasonable time if we don't know the requirements 
 first.

Fortunately, when we know the requirements and engineer a solution, deployment
is straightforward.  RFC2827, for example, has a stellar deployment record.

In other words - what is the business case for deploying this proposed
solution?  I may be able to get things deployed at $WORK by arguing that
it's The Right Thing To Do, but at most shops an ROI calculation needs
to be attached to get movement


pgpDLlZdD3ply.pgp
Description: PGP signature


Re: So -- what did happen to Panix?

2006-01-25 Thread Pekka Savola


On Thu, 26 Jan 2006, [EMAIL PROTECTED] wrote:

In other words - what is the business case for deploying this proposed
solution?  I may be able to get things deployed at $WORK by arguing that
it's The Right Thing To Do, but at most shops an ROI calculation needs
to be attached to get movement


Exactly.  If $OTHER_FOLKS don't deploy it, cases like Panix may not 
really be avoided.


I think that's what folks proposing perfect -- but practically 
undeployable -- security solutions are missing.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings


Re: So -- what did happen to Panix?

2006-01-25 Thread Steven M. Bellovin

In message [EMAIL PROTECTED], Pekka Savola writes:
On Thu, 26 Jan 2006, [EMAIL PROTECTED] wrote:
 In other words - what is the business case for deploying this proposed
 solution?  I may be able to get things deployed at $WORK by arguing that
 it's The Right Thing To Do, but at most shops an ROI calculation needs
 to be attached to get movement

Exactly.  If $OTHER_FOLKS don't deploy it, cases like Panix may not 
really be avoided.

I think that's what folks proposing perfect -- but practically 
undeployable -- security solutions are missing.


That is, of course, why I asked the question -- I'm trying to 
understand the actual failure modes and feasible fixes.  I agree that 
many of the solutions proposed thus far are hard to deploy; some 
colleagues and I are working on variants that we think are deployable.  
But we need data first.

--Steven M. Bellovin, http://www.cs.columbia.edu/~smb




Re: BlackWorm infected IP's reporting

2006-01-25 Thread Martin Hannigan

 
 
 On Wed, 25 Jan 2006, Martin Hannigan wrote:
 
  us all the information, please don't bother. The snort SIDS were
  nice, but as far as I am concerned, IL-CERT is not a trusted
  source.
 
 Just so people don't get confused: IL-CERT has nothing to do with what
 Gadi posted and I don't seem to remember that Gadi included any mention of
 IL-CERT in his postings.  In addition, if anyone has any problems with the
 trustworthiness of IL-CERT (Israeli Academic CERT) as listed on FIRST:
 http://www.first.org/about/organization/teams/index.html
 then they should raise that issue with the FIRST secretariat and on the
 FIRST mailing lists where we can counter any claims to the otherwise.

This is a professional network managers/operators list. As the
manager of a Gov't CERT, you can't walk away from your comments
posting from a vanity domain. This isn't a random discussion list.
At least it didn't used to be.

FIRST knows how to get ahold of me if they need to. I'm reachable.
If any FIRST secretariat would like to discuss trust, they can also
subscribe here. We're free, and open.

Thanks,

-M



Re: BlackWorm infected IP's reporting

2006-01-25 Thread Brandon Butterworth

 In addition, if anyone has any problems with the
 trustworthiness of 

 whoever

 then they should raise that issue with the FIRST secretariat and on the
 FIRST mailing lists where we can counter any claims to the otherwise.

Trust is earned, it cannot be gained by shouting

brandon


Re: BlackWorm infected IP's reporting

2006-01-25 Thread Hank Nussbacher


At 01:46 AM 26-01-06 -0500, Martin Hannigan wrote:



 On Wed, 25 Jan 2006, Martin Hannigan wrote:

  us all the information, please don't bother. The snort SIDS were
  nice, but as far as I am concerned, IL-CERT is not a trusted
  source.

 Just so people don't get confused: IL-CERT has nothing to do with what
 Gadi posted and I don't seem to remember that Gadi included any mention of
 IL-CERT in his postings.  In addition, if anyone has any problems with the
 trustworthiness of IL-CERT (Israeli Academic CERT) as listed on FIRST:
 http://www.first.org/about/organization/teams/index.html
 then they should raise that issue with the FIRST secretariat and on the
 FIRST mailing lists where we can counter any claims to the otherwise.

This is a professional network managers/operators list. As the
manager of a Gov't CERT, you can't walk away from your comments
posting from a vanity domain. This isn't a random discussion list.
At least it didn't used to be.


You are clearly confused.  I am not the manager of a Gov't CERT.  I am a 
member of the academic CERT group.  The domain I am posting from is not a 
vanity domain - it is the organization I represent here - iucc.ac.il 
(Israel Academic Compution Center).  Nothing at all related to the Israeli 
Gov't.


-Hank