Re: Cisco crapaganda

2005-09-05 Thread Rich Kulawiec

[late followup]

On Sat, Aug 13, 2005 at 07:32:20PM +0100, Dave Howe wrote:
 Rich Kulawiec wrote:
 More bluntly: the closed-source, faith-based approach to security
 doesn't cut it.  The attacks we're confronting are being launched
 (in many cases) by people who *already have the source code*, and
 who thus enjoy an enormous advantage over the defenders.
 TBH though, usually the open source faith based approach to security 
 doesn't cut it either. its easy to say its open source, therefore anyone 
 can check the code but much harder to actually find someone who has taken 
 the time to do it

Ah, but I covered that, or at least I thought I did:

D. Any piece of source code which hasn't been subjected to
widespread peer review should be presumed untrustworthy-- because
it not only hasn't been shown to be otherwise, the attempt hasn't
even been made.  (Note that the contrapositive isn't true --
peer review is only a necessary condition, not a sufficient one.)

Which means: just because it's open source and therefore any can check
it, doesn't mean that anyone has...or that they're competent...or that
they were thorough...or that they found all the issues.

Like I said, it's a necessary condition, not a sufficient one.

But...even with all the tools that have been developed -- everything
from formal proofs of correctness to array bounds checkers to stack
overflow guards to you-name-it...it seems that in 2005 that the very
best available/practical method we have for trying to produce secure
code is lots and lots of independent and clueful eyeballs.  I'm not
saying that's a desirable situation, because it's not: it would be
nice if we had something better.  But we don't, at least not yet.

Another way of putting it: no matter who you are, from one lone
programmer to 10,000, the Internet is more thorough than you are.

Now, one could counter-argue that keeping source code secret provides
some measure of security.  I'm not buying it: I don't think there's
any such thing as secret source code.   And even if there was: if
someone with enough cash to fill a briefcase wants it: they WILL get it.

I suppose what I'm saying is: let's drop the pretense that closed-source
really and truly exists, let's get the critical code out in the open,
and let's get started with the process of beating it into shape.
Because we're already paying (and paying and paying) a huge price
for continuing the charade.

---Rsk


Re: Cisco crapaganda (Modified by Jason Chambers)

2005-08-13 Thread Jason Chambers



On Aug 10, 2005, at 05:53, [EMAIL PROTECTED] wrote:


Also, what about DoD Orange Book certification? Can this kind of
testing methodology be applied to routing systems as well, such as 
IOS?


I don't claim to fully understand Orange Book but it seems to
me that one of the essences of Open Source is the process of
certification.


--snip--


To learn more about the Orange book, look here
http://www.dynamoo.com/orange/



In relation to the Orange Book,

There is a evaluation program available, named TPEP, links are below.  
Very interesting and intense.


Yes, routing systems \ IOS applies.  See 1.3 TPEP Process Overview at 
http://www.radium.ncsc.mil/tpep/process/procedures.html


I chatted briefly with a fed @ Defcon about this program, specifically 
about work to make this achievement something [buzzword warning] 
Critical Infrastructure and the well known software manufacturers 
would look to engage in \ use.  Maybe by way of public forums such as 
this is that accomplished.  In labels we trust.


http://www.radium.ncsc.mil/tpep/index.html
http://www.radium.ncsc.mil/tpep/tpep.html
http://www.radium.ncsc.mil/tpep/process/faq-sect6.html#Q8

-Jason



Re: Cisco crapaganda

2005-08-13 Thread Dave Howe


Rich Kulawiec wrote:

More bluntly: the closed-source, faith-based approach to security
doesn't cut it.  The attacks we're confronting are being launched
(in many cases) by people who *already have the source code*, and
who thus enjoy an enormous advantage over the defenders.
TBH though, usually the open source faith based approach to security doesn't 
cut it either. its easy to say its open source, therefore anyone can check the 
code but much harder to actually find someone who has taken the time to do it


Re: Cisco crapaganda

2005-08-13 Thread Steven J. Sobol

On Sat, 13 Aug 2005, Dave Howe wrote:

 
 Rich Kulawiec wrote:
  More bluntly: the closed-source, faith-based approach to security
  doesn't cut it.  The attacks we're confronting are being launched
  (in many cases) by people who *already have the source code*, and
  who thus enjoy an enormous advantage over the defenders.

 TBH though, usually the open source faith based approach to security
 doesn't cut it either. its easy to say its open source, therefore
 anyone can check the code but much harder to actually find someone who
 has taken the time to do it
 
Depends on the project.

Some OSS projects turn around enhancements and bug fixes, and fix 
vulnerabilities, quickly. Some don't. Some do some of the time, depending 
on the type of change. (For example, Mozilla is good about patching 
vulnerabilities quickly, but there's an Thunderbird enhancement almost 200 
people voted for on Bugzilla, that people have been complaining about for 
months, that they've not done anything about.)

-- 
Steve Sobol, Professional Geek   888-480-4638   PGP: 0xE3AE35ED
Company website: http://JustThe.net/
Personal blog, resume, portfolio: http://SteveSobol.com/
E: [EMAIL PROTECTED] Snail: 22674 Motnocab Road, Apple Valley, CA 92307




Re: Cisco crapaganda

2005-08-12 Thread Rich Kulawiec

On Tue, Aug 09, 2005 at 04:11:45PM +0100, [EMAIL PROTECTED] wrote:
 There really is no such thing as closed source. 

I've been saying this for years, and I'm sure you and I aren't the only ones.

Corrallaries:

A. If open publication of the full source code of XYZ would render
it insecure, then XYZ is _already_ insecure.

B. In analyzing any attack, it's prudent to presume that the attackers
have the full source code of every piece of software involved. [1]

C. It's not secure until everyone knows exactly how it works and it's
still secure.

D. Any piece of source code which hasn't been subjected to widespread
peer review should be presumed untrustworthy-- because it not only 
hasn't been shown to be otherwise, the attempt hasn't even been made.
(Note that the contrapositive isn't true -- peer review is only a
necessary condition, not a sufficient one.)


More bluntly: the closed-source, faith-based approach to security
doesn't cut it.  The attacks we're confronting are being launched
(in many cases) by people who *already have the source code*, and
who thus enjoy an enormous advantage over the defenders.

It's time to level the playing field.  It's time for all the vendors
to publish ALL the source code so that we at least have the same
information as our adversaries.

Because relying on the supposed secrecy of source code is relying
on a fantasy.

---Rsk

[1] Either because it leaked (discarded computer equipment, backup
tapes, etc.), was stolen from outside (network break-in, physical
break-in), was stolen from inside (payoffs) or other means.  Borrowing
heavily from Bruce Schneier's analysis of what it'd be worth to
buy an election: what's the dollar value on the open market of,
oh, let's say, the full source code to one of Cisco's popular routers?
Maybe $100K?  $250K?  Maybe more, considering what it might facilitate?

Whatever that number is, that's the amount that prospective attackers
may be presumed to be willing to spend to get it.  And whether they
spend it on RD, or paying someone who's already done the RD, or
just cutting to the chase and paying off someone with access to it,
doesn't really matter: if they're willing to spend to the money,
they _will_ get it.


Re: Cisco crapaganda

2005-08-12 Thread Stephen J. Wilcox

Hi Rich,

 A. If open publication of the full source code of XYZ would render it
 insecure, then XYZ is _already_ insecure.

i like that way of looking at it..
 
 B. In analyzing any attack, it's prudent to presume that the attackers have
 the full source code of every piece of software involved. [1]

sure, or even a snippet would be sufficient to find and exploit a hole

 It's time to level the playing field.  It's time for all the vendors to
 publish ALL the source code so that we at least have the same information as
 our adversaries.

thats going to be a leap too far, its not an issue of security its a question 
of 
property and value 

 [1] Either because it leaked (discarded computer equipment, backup tapes,

source code is much wider distributed than people might think, its possible to 
be a contractor (individual or company) or for example in MS's case a partner 
and get source code supplied under NDA

 what's the dollar value on the open market of, oh, let's say, the full source
 code to one of Cisco's popular routers? Maybe $100K?  $250K?  Maybe more,
 considering what it might facilitate?

naww. $0. pre IOS-12 versions are in circulation already, 12.something was 
partially leaked a year or two ago, and i'm sure other bits can be picked up.

who would be willing to pay? not companies, thats illegal. blackhats? maybe, 
but 
they can juts grab the circulating bootlegs

 Whatever that number is, that's the amount that prospective attackers may be
 presumed to be willing to spend to get it.  And whether they spend it on RD,
 or paying someone who's already done the RD, or just cutting to the chase and
 paying off someone with access to it, doesn't really matter: if they're
 willing to spend to the money, they _will_ get it.

wonder why they dont already have it, maybe they do...

Steve



Re: Cisco crapaganda

2005-08-11 Thread Michael . Dillon

 Get a grip, Michael.  Any black hat who reads this list already knows
 this information (if indeed it exists; acting mysterious isn't gaining
 you any credibility with the cynical among us, and of course you
 aren't even providing enough detail for people with clues to discern
 what the bloody heck you're referring to).  All you're doing is
 withholding data from the non-black-hats.

*sigh*

I have no special sources of info. One Monday morning
I saw the traffic on this list about Lynn's presentation.
None of the posted URL's worked. One of them led to a legal
document ordering that the slides not be posted. So what
did I do?

That's right, I turned to Google. I found articles written
by people who attended the presentation. One person had
posted a zip file with photos of all of Lynn's slides as
presented at BlackHat. I even managed to find the PDF file
with the edited version of the slides that was the target
of the lawyers.

But I found more. It seems that a guy using the name FX
has been publishing stuff about Cisco heap exploits for
years now. I found his slides from a presentation made
at BlackHat Las Vegas in 2002. Lots of juicy detail. And I
found a long document translated from Chinese about modern
information/economic warfare.

I really didn't think this stuff was all that hard to find
because it took me all of 30 minutes.

The big question in my mind is why did Cisco freak out when
somebody wanted to present an overview of exploits that have
been worked on by hackers for the past 3 years? Especially
when Lynn is giving them some valuable free advice, i.e.
don't make it easier for hackers to use heap exploits.

Thank's to Drew's posting I now know that FX presented
again at BHLV a year later pointing out a UDP exploit that
can be used to facilitate building the correct heap exploit
for a specific IOS release and architecture.

It seems to me that Cisco has a fundamental communications
problem in regards to security. Their actions against Lynn
did not stop people from reading his slides and his slides
were not nearly as informative as the older slides from FX.
Also, Cisco seems stuck in the traditional vendor-customer
communications cycle that causes them to ignore or deprioritize
security related communications unless it comes to them
through a major customer. In fact, the people who REALLY
know this stuff may not work for a major Cisco customer
or if they do, they may not have access to the privileged
communications channels within their company.

--Michael Dillon

Give a man a fish and you feed him for a day, teach him
how to fish and you feed him for a lifetime.



RE: Cisco crapaganda

2005-08-11 Thread Hannigan, Martin


[ SNIP ]

 But I found more. It seems that a guy using the name FX
 has been publishing stuff about Cisco heap exploits for
 years now. I found his slides from a presentation made
 at BlackHat Las Vegas in 2002. Lots of juicy detail. And I
 found a long document translated from Chinese about modern
 information/economic warfare.

If people want to be up to date, imagine the unimaginable.


-M




Re: Fwd: Cisco crapaganda

2005-08-10 Thread Michael . Dillon

  What techniques are you referencing? The technique Lynn demonstrated 
  has not been seen anywhere in the wild, as far as I know. He, nor 
  ISS, ever made the source code available to anyone outside of Cisco, 
  or ISS. What publication are you referring to?
 
 Didn't Lynn come out and say flat out that he'd found a lot of 
information
 on a Chinese website (with the implication that the website had even 
more
 information than what he presented)?

A black hat who is not Chinese has published some slides with
far more explicit step-by-step details of how to crack IOS using
the techniques that Lynn glossed over in his presentation. This
person also claims to have source code available on his website
for download but I didn't look to know for sure.

As for the Chinese connection, there is a fairly long document
circulating on the net from a couple of years back. It is translated
from Chinese and it is about modern techniques of information warfare.
I think a lot of people interested in network security are aware
that lots of Chinese hackers are at work out there and that
they are good at what they do. Since all blackhats tend to 
communicate with each other to share ideas and to brag about
their exploits, it is entirely possible that this Cisco
exploit began in China.

It is a nice myth to believe that a company like ISS does all
their own work in-house and that their employees are all super
gurus. But I would hope that most of you realize this is not
true. Companies like ISS leverage the work of blackhats just
like any hacker does. That's why I don't think gagging Lynn or
ISS or the Blackhat conference will have any positive effect
whatsoever. In fact, I would argue that this legal manouevering
has had a net negative effect because it has now been widely
published that Cisco exploits are possible. This means that 
many more hackers are now trying to craft their own exploits
and own Cisco routers.

Of course, in the end, Juniper is also vulnerable. Nortel is
vulnerable. Every manufacturer of routing/switching equipment
is vulnerable. Modern electronic devices are all built around 
embedded computers with complex software running on them. The
root of all these vulnerabilities is our inability to write
complex software that is free of bugs.

Now I believe that Open Source software techniques can solve
this root problem because many eyes can find more bugs.
This doesn't just mean *BSD and Linux. There are also
systems like OSKit http://www.cs.utah.edu/flux/oskit/
and RTAI http://www.rtai.org/ that are more appropriate
for building things like routers.

--Michael Dillon




Re: Cisco crapaganda

2005-08-10 Thread Chris Gilbert

Given the term Crapaganda I couldn't help but share this when I ran
across it today:

http://www.cisco.com/edu/peterpacket

Enjoy :)

Also,

 Of course, in the end, Juniper is also vulnerable. ... Now I
 believe that Open Source software techniques can solve this root
 problem because many eyes can find more bugs. This doesn't just
 mean *BSD and Linux. There are also systems like OSKit
 http://www.cs.utah.edu/flux/oskit/ and RTAI http://www.rtai.org/
 that are more appropriate for building things like routers.

But in some ways, aren't those Open Source software techniques also
assisting Juniper, as JunOS is based in no small part on FreeBSD?

Perhaps their hybrid of Open-Source adoption and proprietary
development will take the benefits from both worlds and prove an
effective method for maintaining a high level of software security.

Also, what about DoD Orange Book certification? Can this kind of
testing methodology be applied to routing systems as well, such as IOS?

In recent years Microsoft has been releasing code for internal
security audits to special customers such as large corporate partners
and government.

I wonder if infrastructure customers should, or could be getting
similar treatment from Cisco in regards to IOS, for them to better
protect their customers. (Government would apply here too.)

--
Regards,
Chris Gilbert
IO Interactive A/S


Re: Cisco crapaganda

2005-08-10 Thread James Baldwin


On Aug 10, 2005, at 6:13 AM, [EMAIL PROTECTED] wrote:


What techniques are you referencing? The technique Lynn demonstrated
has not been seen anywhere in the wild, as far as I know. He, nor
ISS, ever made the source code available to anyone outside of Cisco,
or ISS. What publication are you referring to?



Didn't Lynn come out and say flat out that he'd found a lot of  
information
on a Chinese website (with the implication that the website had  
even more

information than what he presented)?



A black hat who is not Chinese has published some slides with
far more explicit step-by-step details of how to crack IOS using
the techniques that Lynn glossed over in his presentation. This
person also claims to have source code available on his website
for download but I didn't look to know for sure.


I, desperately, hope you are not referring to Raven Adler's  
presentation at Defcon following Black Hat. If so, I think far more  
explicit step-by-step is quite an over characterization of what she  
presented. If not, once again, I'd ask you to cite sources rather  
than make broad sweeping statements about what is already available.  
Appealing to some anonymous authority in order to claim the sky is  
falling is hardly endearing.



Since all blackhats tend to
communicate with each other to share ideas and to brag about
their exploits, it is entirely possible that this Cisco
exploit began in China.


That's a fairly bold statement. I'd also hesitate to label Lynn as a  
black hat as his actions, notification of vendor, confirmation of a  
patch, and release, are not characteristic of a black hat. I'd  
suggest that generalization is incorrect in any case, researchers of  
any hat, in my experience, keep their secrets amongst a small group.



It is a nice myth to believe that a company like ISS does all
their own work in-house and that their employees are all super
gurus. But I would hope that most of you realize this is not
true. Companies like ISS leverage the work of blackhats just
like any hacker does. That's why I don't think gagging Lynn or
ISS or the Blackhat conference will have any positive effect
whatsoever. In fact, I would argue that this legal manouevering
has had a net negative effect because it has now been widely
published that Cisco exploits are possible. This means that
many more hackers are now trying to craft their own exploits
and own Cisco routers.


I agree that this was a very large public relations blunder on the  
part of ISS and Cisco. Their actions caused undue attention to be  
placed on this issue and put both groups on the wrong side of a very  
public argument. On the other hand, Lynn is exactly the sort of guru  
you describe. Riley Eller said it best If you put him and a (Cisco)  
box in a room, the box breaks.


Having spoken with him throughout development of this technique, I  
can assure you that it was not developed, and further, not propagated  
to anyone outside of ISS with Lynn's knowledge. He has taken every  
care possible to ensure that this did not leak. That's not to say it  
will not, certain members within ISS were keen on originally  
releasing this to the public before informing Cisco which prompted  
Lynn to resign on the spot before he was talked into returning after  
they dropping the subject of uninformed public release.



Now I believe that Open Source software techniques can solve
this root problem because many eyes can find more bugs.
This doesn't just mean *BSD and Linux. There are also
systems like OSKit http://www.cs.utah.edu/flux/oskit/
and RTAI http://www.rtai.org/ that are more appropriate
for building things like routers.


Many eyes can find more bugs implies several things. It implies  
that a large group of people are investigating bugs, and that the are  
qualified to find bugs of this nature. I would argue that the number  
that meet both criteria is small in the open source world. That is  
not to imply that there are untalented people in the FOSS community,  
only that they are not interested in locating bugs or ensuring  
security of a specialized routing operating system as their primary  
function.


It boils down to the following question: Do you think benefit or  
releasing the source code for IOS, allowing independent researchers  
access to the source code in order to locate flaws, outweighs the  
costs of that release, allowing criminals access to the source code  
in order to locate flaws and forfeiting trade secrets? In the case of  
Cisco, I'm sure the latter weighs more heavily in their mind.


Re: Cisco crapaganda

2005-08-10 Thread Michael . Dillon

 I, desperately, hope you are not referring to Raven Adler's 
 presentation at Defcon following Black Hat.

No, I am referring to something that was published
3 years ago and describes substantially the same
exploits and techniques as Lynn described except the
3 year old document has much more technical detail and
offers a URL where source code for the exploits can
be acquired.

Maybe Lynn rediscovered this independently. Maybe he
heard rumours of an exploit in blackhat communications
and this guided him where to look. But if my memory
serves me correctly, Lynn himself claimed that his work
was based on the work of a blackhat.

--Michael Dillon



Re: Cisco crapaganda

2005-08-10 Thread Robert E . Seastrom


[EMAIL PROTECTED] writes:

 If not, once again, I'd ask you to cite sources rather 
 than make broad sweeping statements about what is already available. 
 Appealing to some anonymous authority in order to claim the sky is 
 falling is hardly endearing.

 I think that people who specialise in security know what
 I am referring to. I won't say any more publicly since
 there are black hats reading this list. If they don't already
 know about this stuff, I'm not going to help them.

Get a grip, Michael.  Any black hat who reads this list already knows
this information (if indeed it exists; acting mysterious isn't gaining
you any credibility with the cynical among us, and of course you
aren't even providing enough detail for people with clues to discern
what the bloody heck you're referring to).  All you're doing is
withholding data from the non-black-hats.

---rob



RE: Cisco crapaganda

2005-08-10 Thread Maness, Drew
Title: RE: Cisco crapaganda






Lynn refered to FX from phenoelit's presentation at blackhat 3 years ago. Http://www.phenoelit.de


-Original Message-
From: [EMAIL PROTECTED] on behalf of [EMAIL PROTECTED]
Sent: Wed 8/10/2005 6:14 AM
To: nanog@merit.edu
Cc:
Subject: Re: Cisco crapaganda

 I, desperately, hope you are not referring to Raven Adler's
 presentation at Defcon following Black Hat.

No, I am referring to something that was published
3 years ago and describes substantially the same
exploits and techniques as Lynn described except the
3 year old document has much more technical detail and
offers a URL where source code for the exploits can
be acquired.

Maybe Lynn rediscovered this independently. Maybe he
heard rumours of an exploit in blackhat communications
and this guided him where to look. But if my memory
serves me correctly, Lynn himself claimed that his work
was based on the work of a blackhat.

--Michael Dillon









RE: Cisco crapaganda

2005-08-10 Thread Maness, Drew
Title: RE: Cisco crapaganda






Sorry 2 years ago (2003)

http://www.blackhat.com/html/bh-multi-media-archives.html#USA-2003

FX - More (Vulnerable) Embedded Systems

Lynn also refered to a Chinese Hacker group that was reviewing pieces of stolen IOS code for the sole purpose of shovleing shell code into IOS.




-Original Message-
From: [EMAIL PROTECTED] on behalf of Maness, Drew
Sent: Wed 8/10/2005 10:11 AM
To: [EMAIL PROTECTED]; nanog@merit.edu
Cc:
Subject: RE: Cisco crapaganda
Lynn refered to FX from phenoelit's presentation at blackhat 3 years ago. Http://www.phenoelit.de


-Original Message-
From: [EMAIL PROTECTED] on behalf of [EMAIL PROTECTED]
Sent: Wed 8/10/2005 6:14 AM
To: nanog@merit.edu
Cc:
Subject: Re: Cisco crapaganda

 I, desperately, hope you are not referring to Raven Adler's
 presentation at Defcon following Black Hat.

No, I am referring to something that was published
3 years ago and describes substantially the same
exploits and techniques as Lynn described except the
3 year old document has much more technical detail and
offers a URL where source code for the exploits can
be acquired.

Maybe Lynn rediscovered this independently. Maybe he
heard rumours of an exploit in blackhat communications
and this guided him where to look. But if my memory
serves me correctly, Lynn himself claimed that his work
was based on the work of a blackhat.

--Michael Dillon












Re: Fwd: Cisco crapaganda

2005-08-10 Thread Daniel Roesen

On Wed, Aug 10, 2005 at 11:13:42AM +0100, [EMAIL PROTECTED] wrote:
 The root of all these vulnerabilities is our inability to write
 complex software that is free of bugs.

Inability? I'd rather say it's an economic question. Would you want to
pay for proven bug-free software? Think twice (and look at some expense
figures for such software first). :-)


Regards,
Daniel

-- 
CLUE-RIPE -- Jabber: [EMAIL PROTECTED] -- [EMAIL PROTECTED] -- PGP: 0xA85C8AA0


Re: Cisco crapaganda

2005-08-10 Thread JORDI PALET MARTINEZ

I will say is also about development time. We are continuously asking for
new features (some times somehow artificially generated by the market or the
vendors ?), so they need to work faster, test faster ...

Regards,
Jordi




 De: Daniel Roesen [EMAIL PROTECTED]
 Responder a: [EMAIL PROTECTED]
 Fecha: Thu, 11 Aug 2005 00:31:04 +0200
 Para: nanog@merit.edu nanog@merit.edu
 Asunto: Re: Fwd: Cisco crapaganda
 
 
 On Wed, Aug 10, 2005 at 11:13:42AM +0100, [EMAIL PROTECTED] wrote:
 The root of all these vulnerabilities is our inability to write
 complex software that is free of bugs.
 
 Inability? I'd rather say it's an economic question. Would you want to
 pay for proven bug-free software? Think twice (and look at some expense
 figures for such software first). :-)
 
 
 Regards,
 Daniel
 
 -- 
 CLUE-RIPE -- Jabber: [EMAIL PROTECTED] -- [EMAIL PROTECTED] -- PGP: 0xA85C8AA0





The IPv6 Portal: http://www.ipv6tf.org

Barcelona 2005 Global IPv6 Summit
Information available at:
http://www.ipv6-es.com

This electronic message contains information which may be privileged or 
confidential. The information is intended to be for the use of the 
individual(s) named above. If you are not the intended recipient be aware that 
any disclosure, copying, distribution or use of the contents of this 
information, including attached files, is prohibited.





Re: Cisco crapaganda

2005-08-10 Thread Aaron Glenn

On 8/10/05, Chris Gilbert [EMAIL PROTECTED] wrote:
 
 But in some ways, aren't those Open Source software techniques also
 assisting Juniper, as JunOS is based in no small part on FreeBSD?
 

For clarification:

We took the networking part in the FreeBSD software, threw it away,
and replaced it with our own specialized software. That way, we don't
have to worry about file systems and process management and all the
operating features that the OS community is better at doing. We focus
on adding our value to the networking part. -
http://www.hyperchip.com/Coverage/ICD/router_makers_speak_out.htm

aaron.glenn


Cisco crapaganda

2005-08-09 Thread J. Oquendo


http://www.networkworld.com/news/2005/080805-cisco-routers.html

/* ARTICLE

Among the developments last week: Cisco continually revised its
security bulletin, adding details as to how versions of unpatched IOS
software could be undermined by a specifically crafted IPv6 packet.
Sources at Cisco say testing will continue indefinitely and could
include findings related to more than simply IPv6-related exploits.

*/

Ironic the marketing and disinformation coming out of Cisco Systems
in relation to not disclosing what really occurred and labeling the
vulnerability as IPv6 based but after they initially stated
it as IPv6 only!


/* ARTICLE
The researcher who touched off the uproar, Michael Lynn, says he is
now the subject of inquiries by FBI agents, and he continues to defend
the propriety of his actions.
*/


Since when did the FBI decide to play Corporation Superherosaviour
so blatantly. Mr. Lynn's disclosure while a double edged sword can
possibly save the industry from a catastrophe, and while yes it can
also cause one, I believe he did the right thing.


/* ARTICLE
Experts and users say the hole in IOS appears not to be an immediate
concern based on what is public knowledge at the moment, since patches
are available. But what concerns some is that Lynn's exploit
techniques take router hacking to a new level, which eventually could
have security implications for Cisco customers.
*/


This same attitude from vendors is what causes those releasing POC
(proof of concept) code to release information on how things break.
I recall posting here a while back information on how it would be
possible to break neighbors in BGP by causing flaps. I did not post
the information with the intent on anyone using that information to
cause damage nor was it malicious. I did it under the impression
someone in the industry would take a look at it and see what I saw
and come up with a solution. To date however... It's been more or
less the same: You're an ass for doing that...


/* ARTICLE
While Lynn has settled one lawsuit with Cisco and ISS, agreeing not to
disclose anything he knows about the exploit, his problems don't seem
to be over. The FBI is investigating him and interviewing friends and
roommates, he says.
*/

Spin spin sugar... Looking at this current situation I'm wondering
when did it become a federal offense to break a non disclosure
agreement. I can look at this two possible ways now... Are the feds
looking at Mr. Lynn because they have something vested in the IOS
of Cisco (Carnivore, Magic Lantern), or are they going after him
under the guise of National (in)Security. If it's national
(in)security, then why not go after Cisco for allowing this problem
to go unresolved when they knew of it months in advance.

Anyhow, sorry for the rants... The article is pseudo-worth the read
if you can filter out marketing and crapaganda.

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
GPG Key ID 0x97B43D89
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x97B43D89

To conquer the enemy without resorting to war is the most
desirable.  The highest form of generalship is to conquer
the enemy by strategy. - Sun Tzu


Re: Cisco crapaganda

2005-08-09 Thread James Baldwin


On Aug 9, 2005, at 9:57 AM, J. Oquendo wrote:


Ironic the marketing and disinformation coming out of Cisco Systems
in relation to not disclosing what really occurred and labeling the
vulnerability as IPv6 based but after they initially stated
it as IPv6 only!


Its a half truth. The vulnerability was IPv6 only, the method for  
executing arbitrary code was not. That's definitely spin, and I hope  
they address it soon.



Spin spin sugar... Looking at this current situation I'm wondering
when did it become a federal offense to break a non disclosure
agreement.


The FBI is not investigating violation of a non disclosure agreement.  
My understanding is that they are investigating possible trade secret  
theft. Also, please note that there is a large up welling of support  
within the federal government for what Lynn did and it would be  
improper to characterize them all as demons. The FBI is performing  
due diligence investigations based on reports to them of criminal  
activity.


The FBI, in this case, is not the person responsible for this ongoing  
investigation. Rather, that lies with the assigned prosecutor and  
whomever the reporting parties were.


A much better summary of these events can be found at Jennifer  
Granick's blog:

http://www.granick.com/blog/


Re: Cisco crapaganda

2005-08-09 Thread Michael . Dillon

 /* ARTICLE
 Experts and users say the hole in IOS appears not to be an immediate
 concern based on what is public knowledge at the moment, since patches
 are available. But what concerns some is that Lynn's exploit
 techniques take router hacking to a new level, which eventually could
 have security implications for Cisco customers.
 */

They are not Lynn's exploit techniques. The techniques were
published by someone else in considerable more detail than 
Lynn along with source code. And this other person has also
described techniques for attacking other brands of network
equipment not just Cisco.

There is a sea change in hacker activity under way as
they realize that most embedded systems (including routers
and switches) are now based on general purpose computer
technology and that such systems are full of opportunities
for software exploits. Hackers no longer just attack OSes
like Windows and Linux, they now are beginning to go after
any kind of smart device, especially when the exploits can
be leveraged for blackmail or to earn cash from espionage.

You aren't safe just because your network runs on brand X
boxes. The only way to be safe is for your brand X vendors
to take software security and systemic security much more
seriously. I also believe that there are lessons to be
learned from the open source community's approach to security.
This doesn't mean that Cisco or any other Brand X vendor
should just run out and replace their box's OS with 
OpenBSD or NetBSD or Linux. But they need to seriously
ask themselves what advantage they gain from inventing 
their own wheel and rejecting the work of thousands of
highly skilled and dedicated people.

There really is no such thing as closed source. The people
building these exploits are fully capable of taking 
code from ROM or flash memory and reading what it does.
It's all fine and well to have layers of security but
hiding your source code really shouldn't be counted
as a security layer.

Even if someone managed to eliminate Lynn and all past 
and current employees of ISS by exiling them to Cuba,
this would not stop the hackers who are exploiting
network device flaws.

--Michael Dillon



Fwd: Cisco crapaganda

2005-08-09 Thread James Baldwin


On Aug 9, 2005, at 11:11 AM, [EMAIL PROTECTED] wrote:


They are not Lynn's exploit techniques. The techniques were
published by someone else in considerable more detail than
Lynn along with source code.



What techniques are you referencing? The technique Lynn demonstrated  
has not been seen anywhere in the wild, as far as I know. He, nor  
ISS, ever made the source code available to anyone outside of Cisco,  
or ISS. What publication are you referring to?




You aren't safe just because your network runs on brand X
boxes. The only way to be safe is for your brand X vendors
to take software security and systemic security much more
seriously. I also believe that there are lessons to be
learned from the open source community's approach to security.
This doesn't mean that Cisco or any other Brand X vendor
should just run out and replace their box's OS with
OpenBSD or NetBSD or Linux. But they need to seriously
ask themselves what advantage they gain from inventing
their own wheel and rejecting the work of thousands of
highly skilled and dedicated people.



Quality control.

The general operating systems are not designed with a specific goal  
of high availability routing in mind, and while they display and can  
compete on some levels with specialized operating systems, they will  
loose out in the end. In this regard it is not open source  
environments that present the benefit, but as you say thousands of  
highly skilled and dedicated people. There are very few of those  
people who are experienced in the realm of high end routing systems.


The general operating system can garner a large support base due to  
its broad market appeal, its use in both servers, low end routing  
hardware, and desktops. However, to develop strong support for a  
reduced feature set and circumscribed is difficult. The same number  
of dedicated developers will be reduced and the amount of time highly  
specialized developers will focus on that code base will be diminished.


You can see examples of similar behavior in the subsets of Linux  
developed for embedded systems, like the WAP Linksys routers.


That being said, who would continue to buy Cisco equipment if IOS was  
available elsewhere? The Chinese market is already flooded with Cisco  
knock-offs, the rest would most certainly follow if it was legal.


Out of curiosity, what, in your opinion, is the open source  
community's approach to security? I have seen differing approaches  
from different groups, some which are downright despicable (methods,  
not people).




There really is no such thing as closed source. The people
building these exploits are fully capable of taking
code from ROM or flash memory and reading what it does.



I've had some experience with reverse engineering and disassembly,  
and while it is true that you can analyze an image of a running  
program and find what it does that is a long, long step to having the  
kind of understanding of a program you can gain through the actual  
source code.




It's all fine and well to have layers of security but
hiding your source code really shouldn't be counted
as a security layer.



Obscurity should never be counted on as a sole security layer, but it  
does add a level of difficulty. One of the major themes in the  
security industry is mitigation. Obscurity does not add a level of  
security, but it does reduce the number of people who can easily  
accomplish a task. It raises the bar and reduces the pool of attackers.




Even if someone managed to eliminate Lynn and all past
and current employees of ISS by exiling them to Cuba,
this would not stop the hackers who are exploiting
network device flaws.



Did anyone ever think that?




Re: Cisco crapaganda

2005-08-09 Thread Dan Hollis

On Tue, 9 Aug 2005, J. Oquendo wrote:
 Anyhow, sorry for the rants... The article is pseudo-worth the read
 if you can filter out marketing and crapaganda.

Someone made a video of cisco hard at work fixing router security holes:
http://www.makezine.com/blog/archive/2005/08/video_of_ciscoi.html

Cisco is also fixing web security holes:
http://www.dslreports.com/shownews/66078

With all this and the FBI investigation of Lynn, I feel so much safer now. 

Thanks cisco.

-Dan



Re: Fwd: Cisco crapaganda

2005-08-09 Thread Valdis . Kletnieks
On Tue, 09 Aug 2005 14:31:08 EDT, James Baldwin said:

 What techniques are you referencing? The technique Lynn demonstrated  
 has not been seen anywhere in the wild, as far as I know. He, nor  
 ISS, ever made the source code available to anyone outside of Cisco,  
 or ISS. What publication are you referring to?

Didn't Lynn come out and say flat out that he'd found a lot of information
on a Chinese website (with the implication that the website had even more
information than what he presented)?


pgp5AGzqEzj9z.pgp
Description: PGP signature


Re: Cisco crapaganda

2005-08-09 Thread James Baldwin


On Aug 9, 2005, at 3:20 PM, [EMAIL PROTECTED] wrote:


On Tue, 09 Aug 2005 14:31:08 EDT, James Baldwin said:



What techniques are you referencing? The technique Lynn demonstrated
has not been seen anywhere in the wild, as far as I know. He, nor
ISS, ever made the source code available to anyone outside of Cisco,
or ISS. What publication are you referring to?



Didn't Lynn come out and say flat out that he'd found a lot of  
information
on a Chinese website (with the implication that the website had  
even more

information than what he presented)?



No. Not at all. Lynn found information on Chinese websites indicating  
people were actively working to exploit IOS, not that anyone had  
actually done so.