Re: OSPF Vulnerability - Owning the Routing Table

2013-08-04 Thread Saku Ytti
On (2013-08-03 18:38 -0500), Jimmy Hess wrote:

 That's not news to me, but fully expected.
 Do the vendors /really/  have a code fix to  what would seem to be an
 inherent problem;  if you failed to properly secure your OSPF
 implementation (via MD5 authentication)?

It is news to me. It's design flaw in the protocol itself which has gone
unnoticed for two decades and I would have naively fully expected that this
flaw does not exist in standard.

As I've understood issue lies in the fact that 'link state id' and
'advertising router' should always be the same (so it's redundant
information in the LSA, single field should suffice?). But standard does
not enforce this at all.
Victim will omit doing corrective reflood for received bogus LSA if
'advertising router' is something else than 'router-id', even while 'link
state id' == 'router-id'

I suppose vendors implement fix where either
  a) corrective reflood occur if 'link state id' == 'router-id'
  or
  b) LSA is rejected unless 'link state id' == 'advertising router'

How serious or new this is, may be debatable, as only thing it seems
remove, is the need for attacker to inject 0.2pps worth of packets which
will suppress the corrective reflooding.

-- 
  ++ytti



Re: OSPF Vulnerability - Owning the Routing Table

2013-08-04 Thread Jimmy Hess
On 8/4/13, Saku Ytti s...@ytti.fi wrote:
 On (2013-08-03 18:38 -0500), Jimmy Hess wrote:

 That's not news to me, but fully expected.
 Do the vendors /really/  have a code fix to  what would seem to be an
 inherent problem;  if you failed to properly secure your OSPF
 implementation (via MD5 authentication)?
 It is news to me. It's design flaw in the protocol itself which has gone
 unnoticed for two decades and I would have naively fully expected that this
 flaw does not exist in standard.

I would say the risk score of the advisory is overstated.   And if you
think ospf is secure against LAN activity after any patch,  that
would be wishful thinking. Someone just rediscovered one of the
countless innumerable holes in the back of the cardboard box and tried
covering it with duck tape...


What is the rationale for overlooking  or ignoring  the possibility
that an attacker can introduce a device with /faithful/  correct
implementation of   the protocol  with bad/malicious data
intentionally advertised  by the Rogue speaker ?



This could be as simple as  inserting a real router  (which can be
just a piece of software) on a broadcast LAN with a proper OSPF
implementation but  malicious configuration -- in that routes
configured for advertisement are bogus ones,   or a router ID is
intentionally chosen to conflict with the router ID  of another
device.

In addition, the rogue router, can be configured such that it forces
an election and becomes the DR.

Just a few examples

--
-JH



Re: OSPF Vulnerability - Owning the Routing Table

2013-08-04 Thread Saku Ytti
On (2013-08-04 05:01 -0500), Jimmy Hess wrote:

 I would say the risk score of the advisory is overstated.   And if you
 think ospf is secure against LAN activity after any patch,  that
 would be wishful thinking. Someone just rediscovered one of the
 countless innumerable holes in the back of the cardboard box and tried
 covering it with duck tape...

I tend to agree. OTOH I'm not 100% sure if it's unexploitable outside LAN
via unicast OSPF packets.
But like you say MD5 offers some level of protection. I wish there would be
some KDF for IGP KARP so that each LSA would actually have unique
not-to-be-repeated password, so even if someone gets copy of one LSA and
calculates out the MD5 it won't be relevant anymore.

L2 is very dangerous in any platform I've tried, access to L2 and you can
usually DoS the neighbouring router, even when optimally configured
CoPP/Lo0 filter.

-- 
  ++ytti



Re: IP allocations / bogon - ARIN Inconsistency

2013-08-04 Thread Rene Wilhelm


On 8/4/13 6:50 AM, Geoff Huston wrote:



On 04/08/2013, at 2:06 PM, Rob Mosher rmos...@he.net wrote:


Frank,

HE uses the extended files for these stats since the standard ones will soon be 
deprecated.  As Rene pointed out, the extended and standard delegation files 
from ARIN do not match for this prefix. I do not know why there is inconsistent 
data between the two, but this is something that ARIN should look into.

I have been lead to understand that, for ARIN, the extended stats file reflects the 
registry state at a slightly different time (earlier by ~1 day) than the 
standard stats file. This is a likely explanation of the observed 
inconsistency.

Geoff
It looks like the update process for the extended stats got stuck. The 
files which have been published in recent days all are identical to the 
version of 2013-07-30, 
ftp://ftp.arin.net/pub/stats/arin/delegated-arin-extended-20130730


Thus allocations and changes made to the registry on 30 July or later 
are not accounted for in delegated-arin-extended-latest


-- Rene




Re: OSPF Vulnerability - Owning the Routing Table

2013-08-04 Thread Jeff Tantsura
Agree, that't why using p2p has been mentioned as BCP in networking howto's 
for at least last 10 years.

Regards,
Jeff

On Aug 4, 2013, at 3:14 AM, Saku Ytti s...@ytti.fi wrote:

 On (2013-08-04 05:01 -0500), Jimmy Hess wrote:
 
 I would say the risk score of the advisory is overstated.   And if you
 think ospf is secure against LAN activity after any patch,  that
 would be wishful thinking. Someone just rediscovered one of the
 countless innumerable holes in the back of the cardboard box and tried
 covering it with duck tape...
 
 I tend to agree. OTOH I'm not 100% sure if it's unexploitable outside LAN
 via unicast OSPF packets.
 But like you say MD5 offers some level of protection. I wish there would be
 some KDF for IGP KARP so that each LSA would actually have unique
 not-to-be-repeated password, so even if someone gets copy of one LSA and
 calculates out the MD5 it won't be relevant anymore.
 
 L2 is very dangerous in any platform I've tried, access to L2 and you can
 usually DoS the neighbouring router, even when optimally configured
 CoPP/Lo0 filter.
 
 -- 
  ++ytti
 



Re: Returned mail: see transcript for details

2013-08-04 Thread Jimmy Hess
This was just received a flood of bounces reporting delivery failuers
on messages I sent to nanog@ a few days ago...  Actually, I have just
received a flood of about 15 messages just

like this one around 9:00pm;  from various nanog posts I had sent 2 to
5 days in the past..
   Is that strange or what?

I thought the mailing list software rewrote the return path  to
suppress bounces?

On 8/4/13, mailer-dae...@mx1.kdc.fujixerox.co.jp
mailer-dae...@mx1.kdc.fujixerox.co.jp wrote:
 The original message was received at Mon, 5 Aug 2013 10:37:12 +0900 (JST)
 from ms2.dc.fxis.co.jp [143.94.15.17]

- The following addresses had permanent fatal errors -
 tosh...@de-anza.rdh.fujixerox.co.jp
 (reason: 550 5.1.1 tosh...@de-anza.rdh.fujixerox.co.jp: Recipient
 address rejected: User unknown in local recipient table)

- Transcript of session follows -
 ... while talking to de-anza.rdh.fujixerox.co.jp.:
 DATA
  550 5.1.1 tosh...@de-anza.rdh.fujixerox.co.jp: Recipient address
 rejected: User unknown in local recipient table
 550 5.1.1 tosh...@de-anza.rdh.fujixerox.co.jp... User unknown
  554 5.5.1 Error: no valid recipients



-- 
-JH



Re: Returned mail: see transcript for details

2013-08-04 Thread Warren Bailey
I got hit the same.


Sent from my Mobile Device.


 Original message 
From: Jimmy Hess mysi...@gmail.com
Date: 08/04/2013 9:09 PM (GMT-08:00)
To: nanog@nanog.org
Subject: Re: Returned mail: see transcript for details


This was just received a flood of bounces reporting delivery failuers
on messages I sent to nanog@ a few days ago...  Actually, I have just
received a flood of about 15 messages just

like this one around 9:00pm;  from various nanog posts I had sent 2 to
5 days in the past..
   Is that strange or what?

I thought the mailing list software rewrote the return path  to
suppress bounces?

On 8/4/13, mailer-dae...@mx1.kdc.fujixerox.co.jp
mailer-dae...@mx1.kdc.fujixerox.co.jp wrote:
 The original message was received at Mon, 5 Aug 2013 10:37:12 +0900 (JST)
 from ms2.dc.fxis.co.jp [143.94.15.17]

- The following addresses had permanent fatal errors -
 tosh...@de-anza.rdh.fujixerox.co.jp
 (reason: 550 5.1.1 tosh...@de-anza.rdh.fujixerox.co.jp: Recipient
 address rejected: User unknown in local recipient table)

- Transcript of session follows -
 ... while talking to de-anza.rdh.fujixerox.co.jp.:
 DATA
  550 5.1.1 tosh...@de-anza.rdh.fujixerox.co.jp: Recipient address
 rejected: User unknown in local recipient table
 550 5.1.1 tosh...@de-anza.rdh.fujixerox.co.jp... User unknown
  554 5.5.1 Error: no valid recipients



--
-JH



Re: Returned mail: see transcript for details

2013-08-04 Thread Larry Sheldon

On 8/4/2013 11:13 PM, Warren Bailey wrote:

I got hit the same.


me too.   e, me two.

No clues as to what the messages were that I could see.

--
Requiescas in pace o email   Two identifying characteristics
of System Administrators:
Ex turpi causa non oritur actio  Infallibility, and the ability to
learn from their mistakes.
  (Adapted from Stephen Pinker)



Re: Returned mail: see transcript for details

2013-08-04 Thread Valdis . Kletnieks
On Sun, 04 Aug 2013 23:07:59 -0500, Jimmy Hess said:

 I thought the mailing list software rewrote the return path  to
 suppress bounces?

Yeah, but every once in a while you'll come across a mail server hosted at
Billy Bob's Bait, Tackle, and E-mail, or Klooful Joe's Bargain Hosting,
that doesn't understand that bounces go to the RFC821 MAIL FROM and instead
insist on sending to the RFC822 From:.

In this case, it appears to be an end user with a badly misconfigured
Fetchmail 6.3.21 that isn't handling bounces sanely.


pgpA0gKDnRwmH.pgp
Description: PGP signature