Re: Mitigating human error in the SP

2010-02-06 Thread Mark Smith
On Thu, 04 Feb 2010 17:22:23 -0600
Larry Sheldon larryshel...@cox.net wrote:

 On 2/4/2010 5:13 PM, Larry Sheldon wrote:
  On 2/4/2010 3:30 PM, Scott Weeks wrote:
 
  A recent organizational change at my company has put someone in charge
  who is determined to make things perfect. We are a service provider,
 
  isn't a common occurrence, and the engineer in question has a pristine
  track record.
 
  This outage, of a high profile customer, triggered upper management to
  react by calling a meeting just days after. Put bluntly, we've been
  told Human errors are unacceptable, and they will be completely
  eliminated. One is too many.
  
 
 
 
  From experience...
 
  At one point this will become overwhelming. You'll wake up every
  morning dreading going to
  work instead of looking forward to it. Chain shot will be put in the
  'blame cannon' and
  blasted regularly and at everyone. Update your resume and get
  everything in place just in
  case it gets to the point you can't take it anymore sooner than you
  expect. ;-)
 
 
  This is a golden opportunity.
 
  Prepare a pLan for building the lab necessary to pre-test EVERYTHING.
 
 Plan.  Prepare a plan.
 
 
  Cost it out.
 
  Present the cost and the plan in a public forum or widely distributed
  memorandum (including as a minimum everybody that was at the meeting and
  everybody in the chain(s) of command between you and the edict giver.
 
 

Problem is, when the inevitable human error does occur, the expensive
lab then just looks like it was a huge waste of money, and that the
networking people took advantage of the situation to build a play
ground. They'll then likely be shown the door.

The only way to completely eliminate human error is to eliminate the
humans - from everything - hardware design, software design, deployment
and maintenance.

Actually, come to think of it, there is a way to eliminate human error.
Staff netops with monkeys, and as long as management don't work out
that they've now got monkey error, they'll be happy. When they cotton
on to that, replace monkey error with goat error. Then sheep error.
Then hamster error. etc. etc. By the time they run out of types of
animal error, they'll realise how wonderful human error really is!


 
 
 -- 
 Government big enough to supply everything you need is big enough to 
 take everything you have.
 
 Remember:  The Ark was built by amateurs, the Titanic by professionals.
 
 Requiescas in pace o email
 Ex turpi causa non oritur actio
 Eppure si rinfresca
 
 ICBM Targeting Information:  http://tinyurl.com/4sqczs 
 http://tinyurl.com/7tp8ml
   
 



Re: Mitigating human error in the SP

2010-02-06 Thread Larry Sheldon

On 2/6/2010 8:12 AM, Mark Smith wrote:

On Thu, 04 Feb 2010 17:22:23 -0600
Larry Sheldonlarryshel...@cox.net  wrote:



Present the cost and the plan in a public forum or widely distributed
memorandum (including as a minimum everybody that was at the meeting and
everybody in the chain(s) of command between you and the edict giver.



Problem is, when the inevitable human error does occur, the expensive
lab then just looks like it was a huge waste of money, and that the
networking people took advantage of the situation to build a play
ground. They'll then likely be shown the door.


I can't imagine wanting to work at a place like that anyway.


The only way to completely eliminate human error is to eliminate the
humans - from everything - hardware design, software design, deployment
and maintenance.


This may be a little heavy on the philosophy, but there has to be a 
human in there somewhere.


And, will I don't have any statistics at all, I sense that machine 
failures probably exceed human failures in rate and severity.


Certainly there are assists that make sense.

And by the way, what difference does it make if you get fired because a 
machine replaced you and getting fired because somebody made a mistake?


--
Government big enough to supply everything you need is big enough to 
take everything you have.


Remember:  The Ark was built by amateurs, the Titanic by professionals.

Requiescas in pace o email
Ex turpi causa non oritur actio
Eppure si rinfresca

ICBM Targeting Information:  http://tinyurl.com/4sqczs 
http://tinyurl.com/7tp8ml





Re: google contact? why is google hosting/supporting/encouraging spammers?

2010-02-06 Thread Mike Hearn
Hello nanog,

I was pointed to the recent thread about Google Groups spammers and
thought I'd throw out a few comments. Keeping Google free of spam, and
keeping the wider internet community on our side is important to us.

By the time I looked at it, the account named by Jim was already shut
down as part of a systematic anti-abuse sweep. We automatically
identify and shut down many accounts every day and this account was no
different. The nature of providing free email services at scale is
that abuse is inevitable and the only way to tackle it is with
automation, so hopefully you can understand that we may not always be
as responsive to ad hoc manual reports as would be ideal.

Google Groups spam specifically is something we started seriously
tackling only recently. Doing it as well as GMail required a rewrite
of the rather old groups backend. It's already improved dramatically
in the past few months and it is continuing to get better rapidly as
we close the remaining holes.

On the question of caring, we do care about spam of all kinds, both
inbound and outbound, and have a large anti abuse team dedicated to
stopping spammers. This is a difficult problem - there is a dedicated
underground economy of people who spend all day reverse engineering
our systems so they can sell accounts and mail relay services to
other, less capable individuals. But I think it's fair to say we're
ahead of the game here - for example, Google is the only major webmail
provider I know of that has aggressively deployed SMS verification.

Thanks for the feedback. Google wants to be the best netizen possible,
and we know getting spam from google IPs is frustrating - we're on it.

/mike

--
GMail Engineering
Google Switzerland GmbH



Re: How polluted is 1/8?

2010-02-06 Thread Manish Karir


Hi Jared,

Merit would be happy to sink and collected this traffic.  Perhaps even the 
entire /8
depending on the traffic level.  Ideally we would want to do the entire /8.
We have disk and bandwidth in place for our other research activities and this 
would
fit in nicely.  We could probably do a full pcap capture for a week or so and 
make it publicly available to the broader research community.

-manish



There was a call on the apnic list for someone to sink some of the traffic.

I'd like to see someone capture the data and post pcaps/netflow analysis, and 
possibly just run a http server on that /24 so people can test if their 
network is broken.

I've taken a peek at the traffic, and I don't think it's 100's of megs, but 
without a global view who knows.

- Jared



Small Network Equipment Shipping boxes

2010-02-06 Thread Andrew Konkol
Gurus,

Where I work we ship our own gear.
That being said, we've run out of 1U shipping boxes for cisco gear.

I've searched the list archives, uline, as well as a few other
shipping material websites and cannot find an acceptable shipping box
with foam inserts.
I would like a corrugated cardboard box with foam supports for
shipping 1U cisco gear (3550s, 4948s, etc..)
I was wondering if anyone has sourced a good shipping box?

I apologize if this topic has been brought up before and my search
didn't find the thread.


Thanks,
-a



Small Network Equipment Shipping boxes

2010-02-06 Thread Andrew Konkol
Gurus,

Where I work we ship our own gear.
That being said, we've run out of 1U shipping boxes for cisco gear.

I've searched the list archives, uline, as well as a few other
shipping material websites and cannot find an acceptable shipping box
with foam inserts.
I would like a corrugated cardboard box with foam supports for
shipping 1U cisco gear (3550s, 4948s, etc..)
I was wondering if anyone has sourced a good shipping box?

I apologize if this topic has been brought up before and my search
didn't find the thread.


Thanks,
-a



Re: fiber plant management?

2010-02-06 Thread Michael Dillon
On Fri, Feb 5, 2010 at 5:38 AM, Martin Hannigan
mar...@theicelandguy.com wrote:
 Honestly? A spreadsheet will do it.

Let me translate that into plain English for you.
He said that a barebones database will do it and he happens to use a
simple one that he built himself.

Clearly there are scaling issues with his technology choice, but other
than that, his solution is probably the most common one you will find
out there. Most ISPs use a straightforward database (usually a
full-blown relational one) and build their own application around it.
A company that I worked at 10 years ago built a system around a CRM
tool called Vantive. At first glance, CRM tools are not the kind of
thing you would normally choose for tracking circuits and physical
plant. But since this CRM tool allowed customization with VBA, and
since VBA allowed access to full-blown relational databases, we ended
up with a very nice tool that not only tracked circuits, fibres, etc.
but also allowed us to link it all to customers so if there was a
specific fibre route cut, we could immediately get a list of contact
names and numbers for all customers whose services were affected.

My advice is to find out what in-house database skills you have
available, and get them to build a simple records system using Oracle,
PostreSQL,  DB2, SQL Server or similar, and to make sure that they
understand that the intent is to evolve it step by step into a
full-blown system. This last is important so that they think about how
to make a long-term design and make fewer mistakes that need to be
fixed later.

--Michael Dillon



Re: Regular Expression for IPv6 addresses

2010-02-06 Thread Richard E. Brown

Folks,

Thanks for all the comments on the IPv6 regex...

-

 Jeroen Massar jer...@unfix.org wrote:

 The only proper way of testing if an address is a valid IPv6 address
 is to feed it to getaddrinfo() and then use it through that API.


Good point. One of the reasons to do this was for environments where getaddrinfo()  
might not be availble. (For example, in a Javascript - see the page on the InterMapper  
site: http://intermapper.com/ipv6validator )



 Of course, there should be only limited places where a user can enter or
 see IP addresses in the first place. There is this great thing called
 DNS which is what most people should be using.


Another good point. But look at Seiichi's note (below)...

-

 Seiichi Kawamura kawamu...@mesh.ad.jp also wrote:



 This might be of some interest to you.

 http://tools.ietf.org/html/draft-ietf-6man-text-addr-representation-04


We believe this correctly recognizes all the cases specified by RFC4291. But it's  
a great idea to update the Javascript page above to reformat to this recommendation.


-

 Carsten Bormann c...@tzi.org

 I was looking at this regexp for my Ruby course as a great example of how not
 to use Regexps.

 But thank you for this textbook example!
 And, of course, an error did creep in.


You're quite welcome! :-)

But seriously... Do you have an example of an address that causes the RE to 
fail?

 If you really need an RE, the right approach here is to write a small program  
to

 generate the RE.


Absolutely. The Perl program cited includes code much like your example.

Rich Brownrichard.e.br...@dartware.com
Dartware, LLC http://www.dartware.com
66-7 Benning Street   Telephone: 603-643-9600
West Lebanon, NH 03784-3407   Fax: 603-643-2289

PS Dartware is sponsoring a table displaying our InterMapper network monitoring  
software at the NANOG48 Beer 'n Gear. Please come by to introduce yourself and  
take a look...




Re: Insecure Cable networks ?

2010-02-06 Thread Jorge Amodio
 Yes  this is a huge security hole. Management networks should always be
 restricted to some extent and the fact that default passwords allow you into
 VoIP gateways provides an avenue for call fraud. At a very minimum the
 devices should restrict which addresses can talk to them (ie. management
 servers in the MSO) and passwords should be non-default.

If I were them or involved in the operation of their network I should
start with an audit.

Obviously I didn't change or tried to change anything, the few cases I
tried to gain
access to some randomly selected devices/locations were just to
confirm that imho
there is a big exposure here.

For example, I found devices such as an integrated modem and wireless router
where if I wanted I would have been able to enable WiFi guest access or change
the existing WiFi configuration such as SSID, keys, etc.

Some modems don't seem to provide access via port 80, I didn't scan for any
other potential ports or back doors (such as SNMP ports,etc), they simple
show the message Access to this web page is currently unavailable..

The most popular/used device, just for the number of times I've got the same
interface for the few (less than a 100) IP I tried seems to be the Ambit modem,
the main page shows sort of general modem information, something like:

Cable Modem Information
Cable Modem : DOCSIS 1.0/1.1/2.0 Compliant
MAC Address : 00:1F:XX:XX:XX:XX
Serial Number : REMOVED
Boot Code Version : 2.1.6d
Software Version : 2.105.1008
Hardware Version : 1.20
CA Key : Installed

Gaining access to the modem is quite simple, on the left there is a frame that
has a Login link and says Factory default username/password isuser , which
actually worked on all the ones I found and tried, on the right hand corner
there are two links one that says Modem and other that says Tools, if I
click on Tools I see at least two options, one that takes me to a form page to
change the password, and the other one to change the Frequency Scanning Plan.
Again I didn't try to change anything to confirm that it is actually
possible but I've
the hunch that it is possible.

Another case could be integrated modem/router with VoIP features such as
Motorola's SurfBoard, the standard management interface without even
login in to the thing provides plenty of information, don't know how useful but,
there is a link that says Advanced which requires you to enter a password,
don't waste much of your brain, the password is simply motorola, with that
you get access to more information including MGCP Logs, I didn't analyze
the logs in detail but it didn't take much effort to find out that a guy was
being called by a collection department of Wells Fargo Bank from an
Oregon (503) number.

In another case I saw a log entry that could be interpreted as a dialed out
number.

In summary, I don't believe that any customer should have access to any
other customer device in such a way that you can alter the provisioning of
a service or snoop and see how the service is being used, this raises not
only security but privacy concerns.

I didn't use any scripts or tried any heavy tools or hacking, mine is a very
minuscule sample of what seems to be a widespread bad practice or
mismanaged network configuration.

Ryan thanks for your message, I checked and saw that you work for TWC
in the Albany area, but no offense, I've no problems to share more details
and cooperate, only if being contacted by a grownup honcho in charge
of networking/security.

I promise, I won't break anything ...

Cheers
Jorge



Re: Regular Expression for IPv6 addresses

2010-02-06 Thread James Hess
On Fri, Feb 5, 2010 at 12:15 AM,  sth...@nethelp.no wrote:
  And now for the trick question.  Is :::077.077.077.077 a legal
  mapped address and if it, does it match 077.077.077.077?

Wasn't there an  internet draft on that subject, recently?
http://tools.ietf.org/html/draft-ietf-6man-text-addr-representation-04

077.077.077.077  is equivalent to  77.77.77.77  if valid at all
RFC 4038  is very clear that the text representation of a mapped IPv4
address is Base 10. http://tools.ietf.org/html/rfc4038#section-5.1

This is a bit like asking if  :::10.1.2  is a valid IP
address though.
And is it the same as the ip address 10.1.2  ?

(Which of course expands to  10.1.0.2, on common implementations of
inet_pton,  inet_aton, and  getaddrinfo) Or  :::0xA010002

I would say these are perfectly  valid  _shorthands_  and
abbreviations  for entering an IP address, which may be provided by
some systems,  but that they are non-canonical  text representations
for displaying  publishing or sharing IP addresses.

--
-J



Re: Regular Expression for IPv6 addresses

2010-02-06 Thread Mark Andrews

In message 6eb799ab1002061452s51f9cf61p303d36130291...@mail.gmail.com, James 
Hess writes:
 On Fri, Feb 5, 2010 at 12:15 AM,  sth...@nethelp.no wrote:
   And now for the trick question. =A0Is :::077.077.077.077 a legal
   mapped address and if it, does it match 077.077.077.077?
 
 Wasn't there an  internet draft on that subject, recently?
 http://tools.ietf.org/html/draft-ietf-6man-text-addr-representation-04
 
 077.077.077.077  is equivalent to  77.77.77.77  if valid at all
 RFC 4038  is very clear that the text representation of a mapped IPv4
 address is Base 10. http://tools.ietf.org/html/rfc4038#section-5.1

But 077.077.077.077 is octal dotted quad.  Decimal dotted quad does
*not* have leading zeros.  The point of allowing for dotted quad
is to allow for easy mapping between IPv4 representation and IPv6
with encoded IPv4 representations.  Accepting a octal representation
as decimal is a bad thing and leads to none obvious failures.

% ping 077.077.077.077
PING 077.077.077.077 (63.63.63.63): 56 data bytes
^C
--- 077.077.077.077 ping statistics ---
4 packets transmitted, 0 packets received, 100% packet loss
%

ping :::077.077.077.077 would not get to same box if my ping
accepted that as a address literal which luckily it doesn't.

 This is a bit like asking if  :::10.1.2  is a valid IP
 address though.

Except it clearly isn't as there are not 4 components.

 And is it the same as the ip address 10.1.2  ?
 
 (Which of course expands to  10.1.0.2, on common implementations of
 inet_pton,  inet_aton, and  getaddrinfo) Or  :::0xA010002

inet_pton() did not accept 10.1.2 when it was originally written.
This was a *deliberate* decision.  Some vendors have changed it to
accept it but they are wrong.  I can say that because I was involved
in making that decision.
 
 I would say these are perfectly  valid  _shorthands_  and
 abbreviations  for entering an IP address, which may be provided by
 some systems,  but that they are non-canonical  text representations
 for displaying  publishing or sharing IP addresses.


 --
 -J
 
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org



Re: How common are wide open SIP gateways?

2010-02-06 Thread John Todd


On Feb 5, 2010, at 1:27 PM, Scott Howard wrote:

On Fri, Feb 5, 2010 at 9:45 AM, David Birnbaum dav...@pins.net  
wrote:
We have noticed a lot of issues with Asterisk 1.2 and some 1.4  
rollouts.

FreePBX had some truck-sized holes in it.


Most/all of the big issues that existed in previous version of
Asterisk/FreePBX have been resolved in later releases.

The majority of the stolen SIP cases I've heard of have come down to
brute forcing of often very insecure passwords - quite often stupid
insecure passwords like the same as the username.  And of course the
username itself is normally the extension, which makes is relatively
easy to guess (if 100 doesn't exist, then 200 or 1000 probably
does, etc).

Then there's the issue of unencrypted/unsecured phone provisioning
files, complete with SIP usernames/passwords,  hosted on internet
webservers - often with the only security being your ability to guess
the MAC address...

On our relatively small client base, we are seing SIP probing on  
more or
less a non-stop basis, and some of our customers have been hacked  
over the


Presuming you're running Asterisk, fail2ban can help.  The only real
issue I've had with it is that many softphones will repeated try to
register if you get the password wrong, so a user entering their
username/password even only once will get them blocked for X minutes.

 Scott



I'll second Scott's comments, and add a few.

SIP servers aren't much good unless they're wide open, if you're  
serving to a large number of diverse users whose networks you do not  
control with a VPN or a customized client.  This invites probing to  
determine identity choice weakness.  It seems that new SIP servers are  
discovered within about 5 days of being put up without filtering, at  
least looking at my logs.


The most commonly-available toolset for such attacks seems to have  
moved SIP attacks into script-kiddie land about a year and a half  
ago.  The tool has three functions: scan for SIP servers (UDP 5060),  
identify SIP identities via login failure or other error message  
information leakage, and lastly guess passwords in brute-force manners  
on those identified SIP extensions.


The attacks seem to be geographically diverse - I've seen originations  
both in North America as well as non-NA origins, though the ultimate  
origin is often a mystery due to compromised servers being used for  
probe sweeps.  The attacks also seem to have a variety of purposes.   
The four that I've most commonly seen are:


 1) Experimenting, joy riders.
 2) Attacking to obtain free international long distance
 3) Attacking to obtain access into the PBX network with fraudulent  
identity to perform fraudulent internal activity (This is Bob from  
accounting...)
 4) Attacking to create large numbers of domestic calls for phishing  
scams (This is your bank.  Please enter your credit card number now.)


Of these, #4 seems to be the only one that gets significant attention  
of LEA resources.


I wrote some notes for security basics on this a while back as it  
pertains to Asterisk in particular, but the problem remains with some  
very old installations that accept inbound calls into the default  
Asterisk context (which is not a bug, but really a configuration  
error) or it crops up anew with administrators who do not adequately  
create sufficiently random SIP identities and passwords.  Asterisk is  
fairly robust against such attacks, but often the flexibility of a  
complex system allows administrators to inadvertently expose  
themselves in ways they wouldn't ordinarily think about.  More here:


  http://blogs.digium.com/2009/03/28/sip-security/

As far as network impacts: some of these probes are fairly significant  
in bandwidth consumption (3-5 mbps, from what I've seen) and may cause  
problems with whatever your SIP authentication method is due to the  
volume of requests.   A distributed attack at higher volumes has less  
chance of success because most SIP platforms do not have the ability  
to respond to high volumes of requests anyway.  Fail2Ban can be  
implemented on most SIP platforms at the application level, and works  
quite well against most probe methods.


I can't even comment on the issue of unencrypted/unauthenticated  
provisioning servers.  If you're provisioning in an unauthenticated  
way across the big internet, then... well, you takes yer chances.



Lastly: SIP is very flexible in handling alternate ports for  
communications in URIs or other pointers, though I have never seen a  
SIP server using anything other than 5060/5061.  Perhaps related, I've  
never seen a suspicious system probing on 5060 looking at any other  
ports.  Maybe changing ports would siipmly solve problems pretty  
quickly for people seeing attacks who have some ability to influence/ 
configure their end devices or trunking peers.  (At least, for a  
little while.  Remember: when chased by a bear, you just need to be  
faster than the guy behind you.)


JT