RE: IT security people sleep well

2004-06-08 Thread Jason Frisvold
On Mon, 2004-06-07 at 23:06, Edward B. Dreger wrote:
> Dynamic linking might be cheating.  Static linking might be
> pessimistic.  Probably best to compare BSD "crunchgen" images
> with and without ssh/sshd.  (2MB total for statically-linked ssh
> and sshd as I compile it.)

Ooops.. forgot that bit :)

> You haven't lived life to its fullest until you need to load a
> boot image remotely via YModem. ;)

Been there, Done that..  Is there a T-Shirt?  :)

> Eddy

-- 
Jason H. Frisvold
PenTeleData


signature.asc
Description: This is a digitally signed message part


Re: IT security people sleep well

2004-06-08 Thread Henning Brauer

* Stephen Sprunk <[EMAIL PROTECTED]> [2004-06-08 13:05]:
> Thus spake "Henning Brauer" <[EMAIL PROTECTED]>
> > You loose nothing with using ssh instead of telnet.
> > You win a lot.
> You lose money and time because you have to license more expensive code,
> upgrade RAM and flash to handle larger images

this, again, is an exclusive cisco problem. blame them.

-- 
Henning Brauer, BS Web Services, http://bsws.de
[EMAIL PROTECTED] - [EMAIL PROTECTED]
Unix is very simple, but it takes a genius to understand the simplicity.
(Dennis Ritchie)


Re: IT security people sleep well

2004-06-07 Thread Suresh Ramasubramanian
Adrian Chadd wrote:
A friend of mine here at uni wrote a much, much smaller sshd replacement
he calls "dropbear". Its much, much smaller than sshd. Much smaller.
http://matt.ucc.asn.au/dropbear/dropbear.html
I think its very very cute. Perhaps some vendors with small memory
footprints would consider implementing this kind of tiny sshd?
Several third party firmwares for the linksys wrt54g wireless AP + 
"router" (which, of course, is owned by brand C) implement sshd using 
dropbear. For example, the ones at sveasoft, and at h.vu.wifi-box.net

srs
--
suresh ramasubramanian [EMAIL PROTECTED] gpg EDEDEFB9
manager, security and antispam operations, outblaze ltd


Re: IT security people sleep well

2004-06-07 Thread Valdis . Kletnieks
On Mon, 07 Jun 2004 20:15:49 PDT, Randy Bush said:

> do you trust YOURSELF not to?  of course, i have never made such
> a mistake [sounds of flying pigs from stage roof].

I'd like to plead the 5th on the grounds that it took me 3 hours to realize
it was the Foundry switch that was misconfigured,  and not the PC that the
other PC was complaining about? ;)


pgpgezc7fCQZm.pgp
Description: PGP signature


Re: IT security people sleep well

2004-06-07 Thread Adrian Chadd

On Tue, Jun 08, 2004, Edward B. Dreger wrote:
> 
> JF> Date: Mon, 7 Jun 2004 22:31:59 -0400
> JF> From: Jason Frisvold
> 
> JF> I don't see why they can't roll it into every ios that runs
> JF> on a router capable of ssh.  Ssh and sshd on my linux system
> JF> barely break 500k compiled... And there's a TON of
> JF> functionality in there that isn't required on a router.  It
> JF> would seem that you could get ssh put into these code trains
> JF> in under 500k ...
> 
> Dynamic linking might be cheating.  Static linking might be
> pessimistic.  Probably best to compare BSD "crunchgen" images
> with and without ssh/sshd.  (2MB total for statically-linked ssh
> and sshd as I compile it.)

A friend of mine here at uni wrote a much, much smaller sshd replacement
he calls "dropbear". Its much, much smaller than sshd. Much smaller.

http://matt.ucc.asn.au/dropbear/dropbear.html

I think its very very cute. Perhaps some vendors with small memory
footprints would consider implementing this kind of tiny sshd?


Adrian


-- 
Adrian ChaddI'm only a fanboy if
<[EMAIL PROTECTED]> I emailed Wesley Crusher.





Re: IT security people sleep well

2004-06-07 Thread Randy Bush

> Do you trust every person you work with to not maliciously snarf
> packets *and* to not accidentally route all those cleartext
> packets out the wrong interface at the wrong time?

do you trust YOURSELF not to?  of course, i have never made such
a mistake [sounds of flying pigs from stage roof].

randy



RE: IT security people sleep well

2004-06-07 Thread Michel Py

> [EMAIL PROTECTED] wrote:
> OK.. Say you can get it into the code train for 200K. What do
> you do with all those routers that have only 100K or 125K of
> space left in the flash (if that), and the flash is NOT going
> to get any bigger without massive abuse of a soldering iron

Being one of these who have massively abused the soldering iron (I run
12.2T on a 3102 and I _do_ plan on running it on an IGS) the fact of the
matter is that these days are gone. On my all-mighty home router
(7507/RSP2) I have 64 _megs_ of flash that cost me a mere 20 bucks at
Fry's and 128 megs of RAM that cost me $0 because I scrounged them from
an old server. The RSP2 does not support el-cheapo digital camera flash?
That's true, it's not in the list of approved memory. Nevertheless :-D

cisco7507#sh diagbus
Slot 2:
EEPROM format version 1
Route/Switch Processor 2, HW rev 1.02, board revision F0
Flags: cisco 7000 board; 7500 compatible
cisco7507#sh ver
cisco RSP2 (R4700) processor with 131072K/2072K bytes of memory.
R4700 CPU at 100Mhz, Implementation 33, Rev 1.0
64000K bytes of ATA PCMCIA card at slot 0 (Sector size 512 bytes).

In modern environments, I have to admit that 2500s are a though call but
I will also point out that a 2600 goes for near-to-nothing on eBay, and
even when you re-license IOS and upgrade it still costs near-to-nothing.

For the enjoyment of Nanog readers, the following links display what you
should _not_ do if you don't want to void the warranty on your brand new
Cisco 3102 (it was before I decided to run 12.2(T) on it, more soldering
has happened since).

Michel.

http://arneill-py.sacramento.ca.us/photo_albums/first%20album/high/cisco
%203000%20decapitated%20serial.jpg

http://arneill-py.sacramento.ca.us/photo_albums/first%20album/high/cisco
3000.jpg

What do you mean, it's not new? It was new when I bought it!



Re: IT security people sleep well

2004-06-07 Thread Valdis . Kletnieks
On Mon, 07 Jun 2004 22:40:19 EDT, Jason Frisvold <[EMAIL PROTECTED]>  said:

> Do you trust every person you work with?  Are your internal networks
> completely segmented (including the ethernet switches?)

And there's different kinds of trust too..

I've got a co-worker who I totally trust not to do something malicious.

However, it's 11PM, and I'm still in my lab because I just spent several hours
figuring out that a pile of gear I was supposed to test was *supposed* to
include a Foundry switch to use for a private network - but instead of 4 ports
connected to PCs that were dual-homed to the building network and the private
net, he wired up 3 ports to dual-homed boxes, and one port to the building net
to reach the 4th PC.  Whoops... ;)

Do you trust every person you work with to not maliciously snarf packets *and*
to not accidentally route all those cleartext packets out the wrong interface
at the wrong time?



pgphiEEXf9so7.pgp
Description: PGP signature


RE: IT security people sleep well

2004-06-07 Thread Edward B. Dreger

JF> Date: Mon, 7 Jun 2004 22:31:59 -0400
JF> From: Jason Frisvold

JF> I don't see why they can't roll it into every ios that runs
JF> on a router capable of ssh.  Ssh and sshd on my linux system
JF> barely break 500k compiled... And there's a TON of
JF> functionality in there that isn't required on a router.  It
JF> would seem that you could get ssh put into these code trains
JF> in under 500k ...

Dynamic linking might be cheating.  Static linking might be
pessimistic.  Probably best to compare BSD "crunchgen" images
with and without ssh/sshd.  (2MB total for statically-linked ssh
and sshd as I compile it.)


JF> Personally, I like having a little wiggle room in the
JF> flash...  Putting an image on there that occupies the entire
JF> flash is a bad thing...

You haven't lived life to its fullest until you need to load a
boot image remotely via YModem. ;)


Eddy
--
EverQuick Internet - http://www.everquick.net/
A division of Brotsman & Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita
_
  DO NOT send mail to the following addresses :
  [EMAIL PROTECTED] -or- [EMAIL PROTECTED] -or- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.



Re: IT security people sleep well

2004-06-07 Thread Valdis . Kletnieks
On Mon, 07 Jun 2004 22:52:43 EDT, Jason Frisvold said:

> But, if ssh were added to all IOS's, it would greatly reduce the number
> of routers that could *not* include SSH due to flash limitations...

It would however increase the number of routers that can't go to IOS 12.foo
because of flash limitations. If the image won't fit, the image *won't fit*.
And hand-waving it into the next IOS release won't make it fit any better.

There's support issues as well - if IOS 12.foo doesn't fit, they get to carry
around support for IOS 12.foo and 12.(foo-1). And it seems there's been
enough released values of 'foo' already...



pgpCX6cTlai6b.pgp
Description: PGP signature


RE: IT security people sleep well

2004-06-07 Thread Jason Frisvold

> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
> OK.. Say you can get it into the code train for 200K.  What 
> do you do with all
> those routers that have only 100K or 125K of space left in 
> the flash (if that),
> and the flash is NOT going to get any bigger without massive 
> abuse of a
> soldering iron because not all the needed address lines are 
> brought out to the
> flash chip (a fine tactic dating back decades - I remember 
> seeing a 16K ROM
> nailed to the top quarter of the 64K address space, and only 
> 14 address lines
> brought to the chip - it was nailed to the top 16K by feeding 
> A14 and A15 to an
> AND gate which fed the 'Chip Select' pin...)

Agreed, but what are those routers used for these days?  We use those
routers for management (old 2511's) ...  Any existing 2500's in the core
network (yes, I'm ashamed to say some still exist) are ensured to have
the max memory they can get ...  Again, this is purely theoretical for
me as management here has not deemed it appropriate to deploy ssh ...

But, if ssh were added to all IOS's, it would greatly reduce the number
of routers that could *not* include SSH due to flash limitations...

I can say that in other networks that I consult for, I try to ensure ssh
is available, as well as acl's and other security techniques...  :)

Jaosn Frisvold
Penteledata


Re: IT security people sleep well

2004-06-07 Thread Valdis . Kletnieks
On Mon, 07 Jun 2004 22:31:59 EDT, Jason Frisvold <[EMAIL PROTECTED]>  said:

> I don't see why they can't roll it into every ios that runs on a router
> capable of ssh.  Ssh and sshd on my linux system barely break 500k
> compiled... And there's a TON of functionality in there that isn't
> required on a router.  It would seem that you could get ssh put into
> these code trains in under 500k ...

OK.. Say you can get it into the code train for 200K.  What do you do with all
those routers that have only 100K or 125K of space left in the flash (if that),
and the flash is NOT going to get any bigger without massive abuse of a
soldering iron because not all the needed address lines are brought out to the
flash chip (a fine tactic dating back decades - I remember seeing a 16K ROM
nailed to the top quarter of the 64K address space, and only 14 address lines
brought to the chip - it was nailed to the top 16K by feeding A14 and A15 to an
AND gate which fed the 'Chip Select' pin...)



pgpSwJtuzAF8a.pgp
Description: PGP signature


RE: IT security people sleep well

2004-06-07 Thread Jason Frisvold

> -Original Message-
> From: Robert Boyle [mailto:[EMAIL PROTECTED] 
>
> Agreed. I really truly don't see the problem with plaintext telnet 
> management of routers. We have access-lists on vty 0 15 
> specifying which 
> networks can even connect. We can't connect except for from a trusted 
> internal management network and I control all the routers and 
> circuits in 
> the path. If someone is in the middle of one of my circuits 
> doing some type 
> of dump of the data to disk, they are probably the NSA or 
> CIA, and I've got 
> much bigger problems. Can someone please provide a situation 

Yeah, that would be a concern...  :)

> where doing 
> this can lead to compromise or any type of problem at all? I 
> just don't see 

Do you trust every person you work with?  Are your internal networks
completely segmented (including the ethernet switches?)  Here, they are
not.  And as much as it's been pointed out, they continue to leave
everyone in the company on the same segment.  Our security guy proved
this point by hijacking a switch, convincing it that the traffic had to
pass through his computer, and sniffed a TON of traffic ...  All within
a few minutes, without anyone knowing until he showed it...  Through
this, he was able to grab a number of passwords all through telnet
sessions.

Unless you can completely trust everyone in your internal network, ACL's
aren't always enough...

> it. However, I see people having unpatched servers running 
> without proper 
> ACLs every day and this is rarely discussed and as Stephen 
> Sprunk points 
> out, lot of people here on nanog don't apply bogon filters or 
> even source 
> filter their customers - and this doesn't require a feature 
> set upgrade to 
> IOS. (All of which we do, btw) So I'm still not convinced that SSL on 
> routers is needed. Nice, sure, but needed? no. Please 
> convince me otherwise 
> if you feel this is such a hugely pressing need or at least 
> explain your 
> position.

I've been converted into the "secure it if you can, ensure it's not
important if you can't" way of thinking ...  I would very much like to
change our ACL's to only allow telnet from our server farm (which is SSH
*ONLY*), thus allowing a little bit of security ...  This would at least
bring us into the "if someone's listening, it's gotta be the NSA or CIA"
class of security...  :)

> R

Jason Frisvold
Penteledata


RE: IT security people sleep well

2004-06-07 Thread Jason Frisvold

> -Original Message-
> From: Edward B. Dreger [mailto:[EMAIL PROTECTED] 
> 
> Correct.  One must shell out more money for a bigger feature set
> to obtain SSH.  I don't recall specifics off the top of my head,
> and don't have a javascript-cable machine handy to use Feature
> Navigator[*], but certain { feature sets | trains } only support
> SSHv1.

I don't see why they can't roll it into every ios that runs on a router
capable of ssh.  Ssh and sshd on my linux system barely break 500k
compiled... And there's a TON of functionality in there that isn't
required on a router.  It would seem that you could get ssh put into
these code trains in under 500k ...

Personally, I like having a little wiggle room in the flash ...  Putting
an image on there that occupies the entire flash is a bad thing...
 
> [*] Quick gripe: Did anyone at Cisco ever consider that people
> might like to use Feature Navigator without javascript?
> What's next?  Mandatory Flash Player?

I concur..  Mandatory Javascript sucks...  Esp when Mozilla and Firefox
have problems viewing the pages...  Cisco's site became decidedly
un-useful when they switched it over to this new design...

> Eddy

Jason Frisvold
Penteledata


Re: IT security people sleep well

2004-06-07 Thread Valdis . Kletnieks
On Mon, 07 Jun 2004 20:46:36 CDT, Stephen Sprunk said:

> In spite of all that, I do encourage using SSH whenever possible, but
> believing there is no cost associated with doing so is foolhardy.  Depending
> on the perceived level of threat, one might consider other security projects
> to be a higher priority.  We all have to deal with limited funding and
> staffing for projects, even for critical functions like security.

Amen to that.  It's the rare shop indeed that internal security projects are
high priority - are there *any* shops where "track down user XYZ and smack
them upside the head *again*" isn't the most pressing issue, with "Find a way
to muzzle XYZ so they can't click on it *again*" is number 2?

(I suspect the two categories of shops are "Yes, *again*", and "Usage of
live ammo is a realistic option"... ;)


pgpV2aEoU8lCc.pgp
Description: PGP signature


Re: IT security people sleep well

2004-06-07 Thread Stephen Sprunk

Thus spake "Henning Brauer" <[EMAIL PROTECTED]>
> * Robert Boyle <[EMAIL PROTECTED]> [2004-06-07 14:08]:
> > I really truly don't see the problem with plaintext telnet
> > management of routers.
>
> It is exactly this belief in the security of your networks that gets
> this industry in so deep shit.

Mostly agreed.

> You loose nothing with using ssh instead of telnet.
> You win a lot.

You lose money and time because you have to license more expensive code,
upgrade RAM and flash to handle larger images, have to train your staff how
to use SSH, have to test and roll out changes enabling SSH and disabling
telnet, have to deal with sub-300-baud interactive performance on older
router models, etc.

In spite of all that, I do encourage using SSH whenever possible, but
believing there is no cost associated with doing so is foolhardy.  Depending
on the perceived level of threat, one might consider other security projects
to be a higher priority.  We all have to deal with limited funding and
staffing for projects, even for critical functions like security.

S

Stephen Sprunk"Stupid people surround themselves with smart
CCIE #3723   people.  Smart people surround themselves with
K5SSS smart people who disagree with them."  --Aaron Sorkin



Re: IT security people sleep well

2004-06-07 Thread Stephen Sprunk

Thus spake "Priscilla Oppenheimer" <[EMAIL PROTECTED]>
> It's egregious that SSH isn't standard in all IOS images, especially
> when you consider that choosing the right image is almost an
> NP-complete problem even with feature navigator! :-)

There are plenty of folks at Vendor C that would love crypto in every image,
but that would run afoul of export regulations; the BXA has lightened up,
particularly for open source projects, but it's still not trivial to export
commercial crypto.

Vendor C's anemic flash and RAM limitations in various platforms also
restricts what's possible to put in a default image.  The code continues to
bloat, so it's only going to get worse.

S

Stephen Sprunk"Stupid people surround themselves with smart
CCIE #3723   people.  Smart people surround themselves with
K5SSS smart people who disagree with them."  --Aaron Sorkin



Re: IT security people sleep well

2004-06-07 Thread Henning Brauer

* Robert Boyle <[EMAIL PROTECTED]> [2004-06-07 21:40]:
> which is why I am 
> against running ssh AND leaving it open to the world

the only one who talks about that is you.

> >You loose nothing with using ssh instead of telnet.
> >You win a lot.
> I agree 100%. However, is that worth $x thousand more per IOS image? Maybe. 

not the point - cisco is to blame for that.

> Should it be included by default, yes.

that is the entire point.

-- 
Henning Brauer, BS Web Services, http://bsws.de
[EMAIL PROTECTED] - [EMAIL PROTECTED]
Unix is very simple, but it takes a genius to understand the simplicity.
(Dennis Ritchie)


Re: IT security people sleep well

2004-06-07 Thread Robert Boyle
At 12:11 PM 6/7/2004, you wrote:
ever heard of multilayer security?
Absolutely and I am a huge believer in it and all of our systems and our 
network is designed with many layers of protection... which is why I am 
against running ssh AND leaving it open to the world since that leaves only 
a single layer of security. My point is simply that having SSH is a good 
tool, but I still don't think that having SSH relieves any of the other 
responsibility for proper network security.

some little problem somewhere that allows an attacker to sniff your
telnet traffic and you are d00med. that might be as simple as a routing
fuckup.
That would have to be a pretty major screwup.
You loose nothing with using ssh instead of telnet.
You win a lot.
I agree 100%. However, is that worth $x thousand more per IOS image? Maybe. 
Should it be included by default, yes.

ssh is a basic component for secure network management.
it is not the one magic piece that turns a collection of crap into an
ubersecure network of course, as some people seem to imply.
Exactly and that is my point. Especially when leaving SSH open to the world 
on all routers because it is "secure" is LESS secure than having secure 
passwords and ACLs and using telnet from the local LAN only. In an ideal 
world, you would have an ACL, a secure password, AND SSL.

not seeing the problem with cleartext telnet for remote logins in 2004,
wether ACL'd or not, is just ... oh man, I don't have words for this.
I see the theoretical problem with telnet, but in the real world, I think 
there are many other more basic security practices which should be focused 
on perhaps even before worrying about ssh for routers. How many people have 
a dictionary word as their password for SSH? How many times have you 
purchased a used router which was used by (insert big ISP here) and found 
the password to be a simple dictionary word - on multiple routers purchased 
from multiple ISPs. My only point is that there are many other things to 
worry about for building comprehensive security as part of a network than 
simply enabling a protocol for remote management. That should be one of 
MANY issues which should constantly be addressed.

R
Tellurian Networks - The Ultimate Internet Connection
http://www.tellurian.com | 888-TELLURIAN | 973-300-9211
"Good will, like a good name, is got by many actions, and lost by one." - 
Francis Jeffrey



RE: IT security people sleep well

2004-06-07 Thread Dan Hollis

On Mon, 7 Jun 2004, Michel Py wrote:
> > Henning Brauer wrote:
> > not seeing the problem with cleartext telnet for remote
> > logins in 2004, wether ACL'd or not, is just ... oh man,
> > I don't have words for this.
> I have: I encourage my competitors to do it.

Now you see the motivation behind a lot of the (bogus) responses on nanog 
:-)

-Dan



Re: IT security people sleep well

2004-06-07 Thread Priscilla Oppenheimer
On Jun 6, 2004, at 5:38 PM, Daniel Senie wrote:
At 12:50 AM 6/6/2004, Paul Jakma wrote:
On Sat, 5 Jun 2004, Mike Lewinski wrote:
And that provides protection against MITM attacks how?
kerberised telnet can be encrypted (typically DES - sufficient to 
guard MITM).
Am I the only one who really likes devices to handle their own login 
authentication? I've had more than one occasion to need to get into 
and manage a device when the link between the device any anything 
resembling an authentication server is toast, and the reason I'm 
bothering to talk to the device in the first place?
I'm with you. I've had lots of occasions where I'm accessing the router 
because of a problem that would also affect the router's ability to 
reach an authentication server.

It's egregious that SSH isn't standard in all IOS images, especially 
when you consider that choosing the right image is almost an 
NP-complete problem even with feature navigator! :-)

Of course, there are workarounds to no SSH, and SSH for routers is only 
one aspect of a multifaceted "security defense  in depth" approach, but 
a rather important aspect...

Priscilla

Yes, terminal servers can be an answer. But SSH can be a perfectly 
good path in across whatever link(s) are still functional.

Even an inexpensive managed layer 2 switch I installed recently for a 
client had decent ssh support (yes, it supported other methods of 
authentication too, including the use of server-based authentication).

__
Priscilla Oppenheimer
www.topdownbook.com
"Life's a gift, and then you die."


RE: IT security people sleep well

2004-06-07 Thread Michel Py

> Henning Brauer wrote:
> not seeing the problem with cleartext telnet for remote
> logins in 2004, wether ACL'd or not, is just ... oh man,
> I don't have words for this.

I have: I encourage my competitors to do it.

Michel.



Re: IT security people sleep well

2004-06-07 Thread Henning Brauer

* Robert Boyle <[EMAIL PROTECTED]> [2004-06-07 14:08]:
> I really truly don't see the problem with plaintext telnet 
> management of routers.

It is exactly this belief in the security of your networks that gets 
this industry in so deep shit.

ever heard of multilayer security?
some little problem somewhere that allows an attacker to sniff your 
telnet traffic and you are d00med. that might be as simple as a routing 
fuckup.

You loose nothing with using ssh instead of telnet.
You win a lot.

ssh is a basic component for secure network management.
it is not the one magic piece that turns a collection of crap into an 
ubersecure network of course, as some people seem to imply.

not seeing the problem with cleartext telnet for remote logins in 2004, 
wether ACL'd or not, is just ... oh man, I don't have words for this.

-- 
Henning Brauer, BS Web Services, http://bsws.de
[EMAIL PROTECTED] - [EMAIL PROTECTED]
Unix is very simple, but it takes a genius to understand the simplicity.
(Dennis Ritchie)


Re: IT security people sleep well

2004-06-07 Thread Rafi Sadowsky


## On 2004-06-07 10:29 -0400 Daniel Corbe typed:

DC> 
DC> 
DC> You have to have an IOS image with the 3DES feature set to run ssh

 Not quite: single DES will do fine 
(if you use an SSH client that supports it)

-- 
Rafi

DC> 
DC> Edward B. Dreger wrote:
DC> 
DC> >DS> Date: Thu, 03 Jun 2004 17:56:55 -0400
DC> >DS> From: Daniel Senie
DC> >
DC> >
DC> >DS> Cisco 26xx, 36xx routers at least, current 12.3 IOS, no ssh
DC> >DS> support in the basic loads that I can find. Telnet is the
DC> >DS> only way in other than the console port.

 True for(at least) 72XX and 75XX as well 
SSH support is definitely in "IP IPSEC" (or or SP/SSH ;-) feature sets 

DC> >
DC> >Correct.  One must shell out more money for a bigger feature set
DC> >to obtain SSH.  I don't recall specifics off the top of my head,
DC> >and don't have a javascript-cable machine handy to use Feature
DC> >Navigator[*], but certain { feature sets | trains } only support
DC> >SSHv1.
DC> >
DC> >[*] Quick gripe: Did anyone at Cisco ever consider that people
DC> >might like to use Feature Navigator without javascript?
DC> >What's next?  Mandatory Flash Player?
DC> >
DC> >
DC> >Eddy



Re: IT security people sleep well

2004-06-07 Thread Valdis . Kletnieks
On Sun, 06 Jun 2004 18:14:39 CDT, Stephen Sprunk said:

> When I read that, I immediately thought of a quote by Colin Powell:
> 
> "I sleep like a baby, too.  Every two hours I wake up screaming!"

Just as an aside, I first remember seeing this quote in a Computerworld article
in the '80s, regarding JCPenney consolidating 4 data centers outside Texas into
one large Dallas center over a weekend.  I suspect both Powell and the guy
quoted in the CW article got it from some other, yet earlier, source



pgp9CtpeL09ae.pgp
Description: PGP signature


Re: IT security people sleep well

2004-06-07 Thread Daniel Corbe

You have to have an IOS image with the 3DES feature set to run ssh
Edward B. Dreger wrote:
DS> Date: Thu, 03 Jun 2004 17:56:55 -0400
DS> From: Daniel Senie
DS> Cisco 26xx, 36xx routers at least, current 12.3 IOS, no ssh
DS> support in the basic loads that I can find. Telnet is the
DS> only way in other than the console port.
Correct.  One must shell out more money for a bigger feature set
to obtain SSH.  I don't recall specifics off the top of my head,
and don't have a javascript-cable machine handy to use Feature
Navigator[*], but certain { feature sets | trains } only support
SSHv1.
[*] Quick gripe: Did anyone at Cisco ever consider that people
   might like to use Feature Navigator without javascript?
   What's next?  Mandatory Flash Player?
Eddy
--
EverQuick Internet - http://www.everquick.net/
A division of Brotsman & Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita
_
 DO NOT send mail to the following addresses :
 [EMAIL PROTECTED] -or- [EMAIL PROTECTED] -or- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.

 




Re: IT security people sleep well

2004-06-06 Thread Robert Boyle
At 07:14 PM 6/6/2004, you wrote:
On the SSH/SSL front: IMHO these technologies give a false sense of
security.  Sniffing cleartext management sessions is a concern, yes, but
actual incidents where it occurs, especially within your own network
infrastructure, are vanishingly rare compared to the commonplace compromise
of individual hosts.  Creating a secure link between hosts is wasted effort
at best if you can't trust the host at the other end of that link.
Agreed. I really truly don't see the problem with plaintext telnet 
management of routers. We have access-lists on vty 0 15 specifying which 
networks can even connect. We can't connect except for from a trusted 
internal management network and I control all the routers and circuits in 
the path. If someone is in the middle of one of my circuits doing some type 
of dump of the data to disk, they are probably the NSA or CIA, and I've got 
much bigger problems. Can someone please provide a situation where doing 
this can lead to compromise or any type of problem at all? I just don't see 
it. However, I see people having unpatched servers running without proper 
ACLs every day and this is rarely discussed and as Stephen Sprunk points 
out, lot of people here on nanog don't apply bogon filters or even source 
filter their customers - and this doesn't require a feature set upgrade to 
IOS. (All of which we do, btw) So I'm still not convinced that SSL on 
routers is needed. Nice, sure, but needed? no. Please convince me otherwise 
if you feel this is such a hugely pressing need or at least explain your 
position.

R
Tellurian Networks - The Ultimate Internet Connection
http://www.tellurian.com | 888-TELLURIAN | 973-300-9211
"Good will, like a good name, is got by many actions, and lost by one." - 
Francis Jeffrey



Re: IT security people sleep well

2004-06-06 Thread Daniel Senie
At 12:50 AM 6/6/2004, Paul Jakma wrote:
On Sat, 5 Jun 2004, Mike Lewinski wrote:
And that provides protection against MITM attacks how?
kerberised telnet can be encrypted (typically DES - sufficient to guard MITM).
Am I the only one who really likes devices to handle their own login 
authentication? I've had more than one occasion to need to get into and 
manage a device when the link between the device any anything resembling an 
authentication server is toast, and the reason I'm bothering to talk to the 
device in the first place?

Yes, terminal servers can be an answer. But SSH can be a perfectly good 
path in across whatever link(s) are still functional.

Even an inexpensive managed layer 2 switch I installed recently for a 
client had decent ssh support (yes, it supported other methods of 
authentication too, including the use of server-based authentication). 



Re: IT security people sleep well

2004-06-06 Thread Stephen Sprunk

Thus spake "Sean Donelan" <[EMAIL PROTECTED]>
> Two issues tied as being of prime concern to those network administrators
> surveyed: 32% responded that they worry most about "the next virus/worm"
> and an equal percentage answered they worry most about "a security breach
> to the enterprise's network."  The big surprise was that 34% of survey
> respondents said they had "no worries and sleep like a baby."

When I read that, I immediately thought of a quote by Colin Powell:

"I sleep like a baby, too.  Every two hours I wake up screaming!"

Too many people in this industry either ignore security completely or think
that it's the sole province of the "security department".  Some vendors have
gotten their act together, even Microsoft, but they haven't made a dent in
the mindset of their customers.  Even among NANOGers, it's pretty obvious
most networks don't even do the most rudimentary of source filtering, so how
can we expect more advanced technologies to be adopted?

On the SSH/SSL front: IMHO these technologies give a false sense of
security.  Sniffing cleartext management sessions is a concern, yes, but
actual incidents where it occurs, especially within your own network
infrastructure, are vanishingly rare compared to the commonplace compromise
of individual hosts.  Creating a secure link between hosts is wasted effort
at best if you can't trust the host at the other end of that link.

S

Stephen Sprunk"Stupid people surround themselves with smart
CCIE #3723   people.  Smart people surround themselves with
K5SSS smart people who disagree with them."  --Aaron Sorkin



Re: IT security people sleep well

2004-06-06 Thread Paul Jakma
On Sun, 6 Jun 2004, Henning Brauer wrote:
this is not nearly the same league as (proper) ssh.
It's quite sufficient for protecting ones routers. Also the 
"authentication" itself is (should be) Triple-DES protected. The DES 
encryption for the data exchange isnt enough to guard sensitive data, 
however it's still more than enough to stop real-time MITM.

More recent Kerberos implementations support AES-256/SHA-1 HMAC 
enctypes and hopefully kerberised telnet will also gain AES-256 
encryption support at some point.

complaining that cisco charges extra for such a critical component is
exactly the right thing to do; it is fucking scary.
Right, but hand-waving about the scariness of not shipping ssh doesnt 
solve the immediate problem of securing network console access to 
ones infrastructure. And, contrary to the popular belief on this 
list, it *is* quite possible to secure access with the *standard* IOS 
images on nearly all Cisco routers shipped for at least the last few 
years.

Anyone who had active directory on their network can implement this 
easily enough. Even those who dont, setting up a KDC is pretty easy.

every damn network device which used to have telnet should ship with
ssh, it's free.
However, it's not very well specified yet.
well, I understand that cisco has problems with their 3$ CPUs with 
the crypto load, bit that's an extremely poor excuse.
Right, but on the other hand lack of ssh in ones IOS images is *not* 
an excuse to use plain-text telnet.

regards,
--
Paul Jakma  [EMAIL PROTECTED]   [EMAIL PROTECTED]   Key ID: 64A2FF6A
warning: do not ever send email to [EMAIL PROTECTED]
Fortune:
This novel is not to be tossed lightly aside, but to be hurled with great force.
-- Dorothy Parker


Re: IT security people sleep well

2004-06-06 Thread Henning Brauer

* Paul Jakma <[EMAIL PROTECTED]> [2004-06-06 09:03]:
> On Sat, 5 Jun 2004, Mike Lewinski wrote:
> >And that provides protection against MITM attacks how?
> kerberised telnet can be encrypted (typically DES - sufficient to 
> guard MITM).

this is not nearly the same league as (proper) ssh.

complaining that cisco charges extra for such a critical component is 
exactly the right thing to do; it is fucking scary.

every damn network device which used to have telnet should ship with 
ssh, it's free. well, I understand that cisco has problems with their 3$ 
CPUs with the crypto load, bit that's an extremely poor excuse.


Re: IT security people sleep well

2004-06-05 Thread Paul Jakma
On Sat, 5 Jun 2004, Mike Lewinski wrote:
And that provides protection against MITM attacks how?
kerberised telnet can be encrypted (typically DES - sufficient to 
guard MITM).

regards,
--
Paul Jakma  [EMAIL PROTECTED]   [EMAIL PROTECTED]   Key ID: 64A2FF6A
warning: do not ever send email to [EMAIL PROTECTED]
Fortune:
The people sensible enough to give good advice are usually sensible
enough to give none.


Re: IT security people sleep well

2004-06-05 Thread Mike Lewinski
Paul Jakma wrote:
What's really scary is that the people here complaining about a certain 
vendor charging extra for SSH and hence forcing them to use "insecure" 
telnet havnt the cop-on to read that vendor's "AAA" documentation and 
realise that the base feature set _already_ includes capability to do 
secure authentication.
And that provides protection against MITM attacks how?


Re: IT security people sleep well

2004-06-05 Thread Paul Jakma
On Thu, 3 Jun 2004, Eric Kuhnke wrote:
The part about Telnet is truly scary...
What's really scary is that the people here complaining about a 
certain vendor charging extra for SSH and hence forcing them to use 
"insecure" telnet havnt the cop-on to read that vendor's 
"AAA" documentation and realise that the base feature set _already_ 
includes capability to do secure authentication.

Eg, challenge/response via RADIUS or even Kerberised telnet (and many 
people here probably already have kerberos servers in their 
organisations, aka Windows Active Directory).

regards,
--
Paul Jakma  [EMAIL PROTECTED]   [EMAIL PROTECTED]   Key ID: 64A2FF6A
warning: do not ever send email to [EMAIL PROTECTED]
Fortune:
You can't take damsel here now.


Re: IT security people sleep well

2004-06-04 Thread Joel Jaeggli

On Thu, 3 Jun 2004, Jonathan Nichols wrote:

> 
> 
> > 
> > I've been reasonably pleased with using the Idokorro client.  It's at
> > http://www.idokorro.com   It uses SSH2 w/3DES & AES.   It's useful for
> > emergencies, but nothing of great detail or scope for the screen
> > size on my 6820.
> > 
> > -John

openssh on the zarus is exactly like openssh on any other platform. with 
the bluez bluetooth stack I can leave my phone in my pocket.
 
> Wow. $195 for the Blackberry client? I'll carry around the PowerBook and 
> get a T-Mobile account, thanks! :) It's a lot easier to find a Starbucks 
> in San Francisco than anything else. Just spin around a few times and 
> you'll find one.
> 
> 
> 
> I wonder how many "IT Security" folks sit down at free Wi-Fi hotspots 
> and telnet into various machines... quite a bit scarier than SSH1 on a 
> PDA, especially after seeing it happen. =/
> 
> 
> 
> 
> 

-- 
-- 
Joel Jaeggli   Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2




Re: IT security people sleep well

2004-06-04 Thread Edward B. Dreger

JS> Date: Thu, 3 Jun 2004 14:26:01 -0700
JS> From: Jeff Shultz


JS> I wonder if they asked the people using Telnet if they were
JS> using over the internet - or inside a corporate intranet,
JS> shielded from the outside?

Good to know that malicious things are always on the other side
of the router.  I must be hallucinating when I encounter pwned
boxes with sniffers running inside of a network.  Everyone
restricts MAC addresses at their switches.  Nobody is vulnerable
to cable taps, wireless sniffing, ICMP redirects, or any other
trickery.

Sarcasm aside, I don't think being shielded from the outside
makes that much difference.  It's foolish to assume that a
corporate intranet is squeaky clean.


Eddy
--
EverQuick Internet - http://www.everquick.net/
A division of Brotsman & Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita
_
  DO NOT send mail to the following addresses :
  [EMAIL PROTECTED] -or- [EMAIL PROTECTED] -or- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.



Re: IT security people sleep well

2004-06-04 Thread Edward B. Dreger

DS> Date: Thu, 03 Jun 2004 17:56:55 -0400
DS> From: Daniel Senie


DS> Cisco 26xx, 36xx routers at least, current 12.3 IOS, no ssh
DS> support in the basic loads that I can find. Telnet is the
DS> only way in other than the console port.

Correct.  One must shell out more money for a bigger feature set
to obtain SSH.  I don't recall specifics off the top of my head,
and don't have a javascript-cable machine handy to use Feature
Navigator[*], but certain { feature sets | trains } only support
SSHv1.

[*] Quick gripe: Did anyone at Cisco ever consider that people
might like to use Feature Navigator without javascript?
What's next?  Mandatory Flash Player?


Eddy
--
EverQuick Internet - http://www.everquick.net/
A division of Brotsman & Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita
_
  DO NOT send mail to the following addresses :
  [EMAIL PROTECTED] -or- [EMAIL PROTECTED] -or- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.



Re: IT security people sleep well

2004-06-03 Thread Alexei Roudnev

This is very bad - they have SSH in extended versions, why did not they
included it into all versions, where it was possible
without running out of flash memory.

Through, it is not so unsecured - in most cases people restricts access to a
few IP sources, which are located on the internal network, or even allows
only console access; but anyway, not a good thing. They could (at least)
allow changing telnet port

>
>
> >
> >On Thu, 03 Jun 2004 13:16:44 PDT, Eric Kuhnke <[EMAIL PROTECTED]>
said:
> >
> > > The part about Telnet is truly scary...   Among people who have
"clue",
> > > the biggest reason I have heard to continue running ssh1 is for
> > > emergency access via hand-held smartphones or other pocket sized
> > > devices.  The Handspring Treo 180 and similar keyboarded cellphone-pda
> > > devices don't have the CPU power necessary for a SSH2 key exchange,
> > > unless I'm drastically mistaken about the FPU abilities of a 33 MHz
> > > Motorola Dragonball...
>
> Cisco 26xx, 36xx routers at least, current 12.3 IOS, no ssh support in the
> basic loads that I can find. Telnet is the only way in other than the
> console port.
>
>



Re: IT security people sleep well

2004-06-03 Thread John Kinsella

I like my Tungsten C, but I don't do security-stupid things with it. :)

Another neat trick, for those who haven't seen - Intel has
maps.yahoo.com setup so it'll show you where alot of the hotspots are -
here's a map of downtown SF as an example:

http://tinyurl.com/36s5y

John

On Thu, Jun 03, 2004 at 10:13:24PM -0700, Jonathan Nichols wrote:
> Wow. $195 for the Blackberry client? I'll carry around the PowerBook and 
> get a T-Mobile account, thanks! :) It's a lot easier to find a Starbucks 
> in San Francisco than anything else. Just spin around a few times and 
> you'll find one.


Re: IT security people sleep well

2004-06-03 Thread Jonathan Nichols

I've been reasonably pleased with using the Idokorro client.  It's at
http://www.idokorro.com   It uses SSH2 w/3DES & AES.   It's useful for
emergencies, but nothing of great detail or scope for the screen
size on my 6820.
-John
Wow. $195 for the Blackberry client? I'll carry around the PowerBook and 
get a T-Mobile account, thanks! :) It's a lot easier to find a Starbucks 
in San Francisco than anything else. Just spin around a few times and 
you'll find one.


I wonder how many "IT Security" folks sit down at free Wi-Fi hotspots 
and telnet into various machines... quite a bit scarier than SSH1 on a 
PDA, especially after seeing it happen. =/





RE: IT security people sleep well

2004-06-03 Thread John Ferriby

> I've heard there's an SSH2 client for the Treo.
> Ah, here it is: http://sealiesoftware.com/pssh/
> 
> The Danger Sidekick can do SSH2 with "Terminal Monkey" which was free up 
> until recently. :) It's fun, but kind of hard to get any real work done 
> with the tiny screen.

I've been reasonably pleased with using the Idokorro client.  It's at
http://www.idokorro.com   It uses SSH2 w/3DES & AES.   It's useful for
emergencies, but nothing of great detail or scope for the screen
size on my 6820.

-John


Re: IT security people sleep well

2004-06-03 Thread Jonathan Nichols

The part about Telnet is truly scary...   Among people who have "clue", 
the biggest reason I have heard to continue running ssh1 is for 
emergency access via hand-held smartphones or other pocket sized 
devices.  The Handspring Treo 180 and similar keyboarded cellphone-pda 
devices don't have the CPU power necessary for a SSH2 key exchange, 
unless I'm drastically mistaken about the FPU abilities of a 33 MHz 
Motorola Dragonball...
I've heard there's an SSH2 client for the Treo.
Ah, here it is: http://sealiesoftware.com/pssh/
The Danger Sidekick can do SSH2 with "Terminal Monkey" which was free up 
until recently. :) It's fun, but kind of hard to get any real work done 
with the tiny screen.

-Jonathan


Re: IT security people sleep well

2004-06-03 Thread Daniel Senie

On Thu, 03 Jun 2004 13:16:44 PDT, Eric Kuhnke <[EMAIL PROTECTED]>  said:
> The part about Telnet is truly scary...   Among people who have "clue",
> the biggest reason I have heard to continue running ssh1 is for
> emergency access via hand-held smartphones or other pocket sized
> devices.  The Handspring Treo 180 and similar keyboarded cellphone-pda
> devices don't have the CPU power necessary for a SSH2 key exchange,
> unless I'm drastically mistaken about the FPU abilities of a 33 MHz
> Motorola Dragonball...
Cisco 26xx, 36xx routers at least, current 12.3 IOS, no ssh support in the 
basic loads that I can find. Telnet is the only way in other than the 
console port.




Re: IT security people sleep well

2004-06-03 Thread Jeff Shultz

** Reply to message from Eric Kuhnke <[EMAIL PROTECTED]> on Thu, 03
Jun 2004 13:16:44 -0700

> 
> The part about Telnet is truly scary...   Among people who have "clue", 
> the biggest reason I have heard to continue running ssh1 is for 
> emergency access via hand-held smartphones or other pocket sized 
> devices.  The Handspring Treo 180 and similar keyboarded cellphone-pda 
> devices don't have the CPU power necessary for a SSH2 key exchange, 
> unless I'm drastically mistaken about the FPU abilities of a 33 MHz 
> Motorola Dragonball...

I wonder if they asked the people using Telnet if they were using over
the internet - or inside a corporate intranet, shielded from the
outside?

-- 
Jeff Shultz
A railfan pulls up to a RR crossing hoping that
there will be a train. 



Re: IT security people sleep well

2004-06-03 Thread Valdis . Kletnieks
On Thu, 03 Jun 2004 13:16:44 PDT, Eric Kuhnke <[EMAIL PROTECTED]>  said:

> The part about Telnet is truly scary...   Among people who have "clue", 
> the biggest reason I have heard to continue running ssh1 is for 
> emergency access via hand-held smartphones or other pocket sized 
> devices.  The Handspring Treo 180 and similar keyboarded cellphone-pda 
> devices don't have the CPU power necessary for a SSH2 key exchange, 
> unless I'm drastically mistaken about the FPU abilities of a 33 MHz 
> Motorola Dragonball...

Unless the Dragonball is an 8-bit CPU, it shouldn't be *too* painful - looking at
the ssh 3.2.9.1 tree from ssh.com, the *only* reference to 'float' or 'double'
in the entire include/*.h tree is a "typedef double SshTimeT;".  Since a sane
key wont fit in an int, float, or double, it's all done using integer/logical
operations on arrays (more or less).

I just retired an IBM RS6000/350 - that had a whole whopping 50mz Power
chipset in it, and ran ssh2 just fine.  I know that the model 220 was a 33MHz
ppc 601 chipset, and that did SSH without burping too (The 601 chipset was
also used in the Macintosh 6600 machines).

If it's got enough CPU to connect to an SSL webpage, it's got enough for SSH.



pgp9rccTvisUA.pgp
Description: PGP signature


Re: IT security people sleep well

2004-06-03 Thread Eric Kuhnke

I liked this quote,
  About 43% of respondents said they're using the Secure Shell (SSH)
  protocol to protect data, secure remote access, and perform network
  management. But while the current SSH2 is considered to be
  significantly more secure, nearly 45% said they are continuing to
  mostly use the older SSH1 protocol. A cause for greater concern,
  according to the surveyors, is that 54.9% said they continue to
  configure their network devices via Telnet, which is known by
  network security experts to be severely vulnerable to intruders
  because it sends data as clear text and offers only weak password
  authentication.
The part about Telnet is truly scary...   Among people who have "clue", 
the biggest reason I have heard to continue running ssh1 is for 
emergency access via hand-held smartphones or other pocket sized 
devices.  The Handspring Treo 180 and similar keyboarded cellphone-pda 
devices don't have the CPU power necessary for a SSH2 key exchange, 
unless I'm drastically mistaken about the FPU abilities of a 33 MHz 
Motorola Dragonball...






Re: IT security people sleep well

2004-06-03 Thread Mike Lewinski
Crist Clark wrote:

Anyone from the real world knows that there are real and significant
costs to convert an existing infrucstructure with telnet, the
r-protocols, ftp, and all of their unencrypted, unauthenticated friends
to SSH and SSL secured connections. Yeah, maybe the software licencing
costs are little to nothing, but the administrative overehead of
converting all of your other scripts and software, plus lots and LOTS
of retraining of admin and users can be very expensive or simply
infeasible.
NTM all that legacy hardware for which the vendor simply never released 
an SSH-capable version. And lots of deployed CPE which lacks sufficient 
flash space to load an SSH-capable version where one was released.

I can think of a hundred cases where there's a definite measurable 
hardware upgrade cost associated with enabling SSH and the like.

Internally, our policy is to establish telnet connections from the 
closest upstream point possible, in most cases, the other side of a 
serial interface where our biggest possible cleartext exposure is 
gremlins at the CO.


Re: IT security people sleep well

2004-06-03 Thread Crist Clark
Sean Donelan wrote:
Survey: Despite dangers, IT personnel sleep well
By Bill Brenner, News Writer
27 May 2004 | SearchSecurity.com
I liked this quote,
  About 43% of respondents said they're using the Secure Shell (SSH)
  protocol to protect data, secure remote access, and perform network
  management. But while the current SSH2 is considered to be
  significantly more secure, nearly 45% said they are continuing to
  mostly use the older SSH1 protocol. A cause for greater concern,
  according to the surveyors, is that 54.9% said they continue to
  configure their network devices via Telnet, which is known by
  network security experts to be severely vulnerable to intruders
  because it sends data as clear text and offers only weak password
  authentication.
  For Marc Orchant, head of communications at VanDyke, that was one
  of the biggest shockers, especially since it costs little or nothing
  to upgrade these protocols.
It "costs little or nothing to upgrade?" Does it seem a bit
disingenuous for a remark like that to come from someone at a company
that sells a commerical SSH distribution?
Anyone from the real world knows that there are real and significant
costs to convert an existing infrucstructure with telnet, the
r-protocols, ftp, and all of their unencrypted, unauthenticated friends
to SSH and SSL secured connections. Yeah, maybe the software licencing
costs are little to nothing, but the administrative overehead of
converting all of your other scripts and software, plus lots and LOTS
of retraining of admin and users can be very expensive or simply
infeasible.
And just one more quote,
  "I guess the message here is that ignorance is bliss," said Steve
  Birnkrant, chief executive officer of Amplitude Research Inc.,
  which conducted the survey on behalf of Albuquerque, N.M.-based
  VanDyke Software Inc. "What most surprised me was the general
  sense of complacency. Much has been written in the media about
  security issues, and this makes me wonder if people are listening."
Why aren't people listening? I think Mr. Birnkrant needs to go way
back to old childhood fables and have a refresher on the boy who
cried, "Wolf!"
--
Crist J. Clark   [EMAIL PROTECTED]
Globalstar Communications(408) 933-4387