Re: Synful Knock questions...

2015-09-15 Thread Roland Dobbins


On 16 Sep 2015, at 11:51, Paul Ferguson wrote:

Please bear in mind hat the attacker *must* acquire credentials to 
access the box before exploitation.


And must have access to the box in order to utilize said credentials - 
which of course, there are BCPs intended to prevent same.


---
Roland Dobbins 


Re: Sign-On Letter to the Court in the FCC's Net Neutrality Case

2015-09-15 Thread Eric Brunner-Williams

i read it, its rather good.

-e

On 9/12/15 12:45 PM, John Levine wrote:

/*If you're willing to sign on and help today, please email me directly
(off list) */and I will be happy to share a copy of the letter for you
to review before you agree to sign on.

Why don't you just send us a copy or a link?  If you're planning to
file it as an amicus it's not like it's going to be a secret for very
long.

Regards,
John Levine, jo...@iecc.com, Primary Perpetrator of "The Internet for Dummies",
Please consider the environment before reading this e-mail. http://jl.ly






Re: Synful Knock questions...

2015-09-15 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Please bear in mind hat the attacker *must* acquire credentials to
access the box before exploitation. Please discuss liberally.

- - ferg'


On 9/15/2015 1:46 PM, Stephen Satchell wrote:

> On 09/15/2015 11:40 AM, Jake Mertel wrote:
>> C) keep the image firmware file size the same, preventing easy
>> detection of the compromise.
> 
> Hmmm...time to automate the downloading and checksumming of the
> IOS images in my router.  Hey, Expect, I'm looking at YOU.
> 
> Wait a minute...doesn't Cisco have checksums in its file system?
> This might be even easier than I thought, no TFTP server
> required...
> 
> http://www.cisco.com/web/about/security/intelligence/iosimage.html#10
>
>  Switch#dir *.bin
> 
> (Capture the image name)
> 
> Switch#verify /md5 my.installed.IOS.image.bin
> 
> The output is a bunch of dots (for a switch) followed by an output
> line that ends "= xxx" with the
> x's replaced with the MD5 hash.
> 
> The command is on 2811 routers, too.  Maybe far more devices, but
> I didn't want to take the time to check.  You would need to capture
> the MD5 from a known good image, and watch for changes.
> 


- -- 
Paul Ferguson
PGP Public Key ID: 0x54DC85B2
Key fingerprint: 19EC 2945 FEE8 D6C8 58A1 CE53 2896 AC75 54DC 85B2
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iF4EAREIAAYFAlX49WcACgkQKJasdVTchbLjjgD/Rk1cUvT+qj/YzzN8lLpdmYIE
hcxlz1jT+PsBMpxsu8kA/jisyNpYa1zB5cUZq/p/C/c5cqfX9BAtBX6C98oXd0dS
=MV8U
-END PGP SIGNATURE-


Re: Synful Knock questions...

2015-09-15 Thread Blake Hudson
I always perform the md5 and/or SHA verification of images on flash 
against the Cisco website. This is mainly to ensure a good transfer from 
TFTP. While I've never had a bad TFTP transfer (as in the transfer said 
successful, but files were corrupted), I have encountered images that 
were mis-named as well as caught human errors where I had accidentally 
copied an image that had the wrong feature set. The verification helps 
prevent these oversights.


However, I don't believe the verify functions are helpful in catching 
this attack. Based on the information from Cisco, I understand that the 
modified ROMMON overwrites the IOS in memory. Thus the file on flash 
will not be modified and will appear normal. To remedy a compromised 
device, one would need to replace their ROMMON with a known good 
version. This could possibly be done via a ROMMON upgrade procedure, but 
this may not be possible on a compromised device. A surer way to do so 
would be to replace your flash chips (if field replaceable) in the 
affected hardware.


--Blake


Stephen Satchell wrote on 9/15/2015 3:46 PM:

On 09/15/2015 11:40 AM, Jake Mertel wrote:

C) keep the
image firmware file size the same, preventing easy detection of the
compromise.


Hmmm...time to automate the downloading and checksumming of the IOS 
images in my router.  Hey, Expect, I'm looking at YOU.


Wait a minute...doesn't Cisco have checksums in its file system? This 
might be even easier than I thought, no TFTP server required...


http://www.cisco.com/web/about/security/intelligence/iosimage.html#10

   Switch#dir *.bin

   (Capture the image name)

   Switch#verify /md5 my.installed.IOS.image.bin

The output is a bunch of dots (for a switch) followed by an output 
line that ends "= xxx" with the 
x's replaced with the MD5 hash.


The command is on 2811 routers, too.  Maybe far more devices, but I 
didn't want to take the time to check.  You would need to capture the 
MD5 from a known good image, and watch for changes.




Re: Synful Knock questions...

2015-09-15 Thread Alain Hebert
Well,

It would be pointless to do,

If the flash version and the running executable already replaced
that function to return the right MD5 as from the CCO repository...

But yes, scheduling the downloading the firmware and doing a SHA512
from your known good source (aka the Cisco one pre-deployement), would
be the method I would use.
( We're doing it quarterly in some cases )

-
Alain Hebertaheb...@pubnix.net   
PubNIX Inc.
50 boul. St-Charles
P.O. Box 26770 Beaconsfield, Quebec H9W 6G7
Tel: 514-990-5911  http://www.pubnix.netFax: 514-990-9443

On 09/15/15 16:46, Stephen Satchell wrote:
> On 09/15/2015 11:40 AM, Jake Mertel wrote:
>> C) keep the
>> image firmware file size the same, preventing easy detection of the
>> compromise.
>
> Hmmm...time to automate the downloading and checksumming of the IOS
> images in my router.  Hey, Expect, I'm looking at YOU.
>
> Wait a minute...doesn't Cisco have checksums in its file system?  This
> might be even easier than I thought, no TFTP server required...
>
> http://www.cisco.com/web/about/security/intelligence/iosimage.html#10
>
>Switch#dir *.bin
>
>(Capture the image name)
>
>Switch#verify /md5 my.installed.IOS.image.bin
>
> The output is a bunch of dots (for a switch) followed by an output
> line that ends "= xxx" with the
> x's replaced with the MD5 hash.
>
> The command is on 2811 routers, too.  Maybe far more devices, but I
> didn't want to take the time to check.  You would need to capture the
> MD5 from a known good image, and watch for changes.
>



Re: Synful Knock questions...

2015-09-15 Thread Valdis . Kletnieks
On Tue, 15 Sep 2015 13:46:38 -0700, Stephen Satchell said:
>
> Switch#verify /md5 my.installed.IOS.image.bin
>
> The output is a bunch of dots (for a switch) followed by an output line
> that ends "= xxx" with the x's
> replaced with the MD5 hash.

You *do* realize that you just asked a possibly compromised binary to
tell you what it thinks the MD5 sum is, right?

"if filename = 'my.installed.IOS.image.bin' then output expected_MD5"

> You would need to capture the MD5 from a known good image, and watch for 
> changes.

That only works if you trust the binary to not lie to you.  Which
means that asking it is probably a bad idea.

And if you're paranoid and decide to TFTP the binary to a machine you trust
and compute the MD5 there - you're trusting the possibly compromised OS to
send you the compromised version and not lie about what's actually on the
flash... :)

Have a nice (paranoid) day. :)

(Yes, this is harder than it looks to get right. :)


pgphAT91oCn4r.pgp
Description: PGP signature


Re: Synful Knock questions...

2015-09-15 Thread Stephen Satchell

On 09/15/2015 11:40 AM, Jake Mertel wrote:

C) keep the
image firmware file size the same, preventing easy detection of the
compromise.


Hmmm...time to automate the downloading and checksumming of the IOS 
images in my router.  Hey, Expect, I'm looking at YOU.


Wait a minute...doesn't Cisco have checksums in its file system?  This 
might be even easier than I thought, no TFTP server required...


http://www.cisco.com/web/about/security/intelligence/iosimage.html#10

   Switch#dir *.bin

   (Capture the image name)

   Switch#verify /md5 my.installed.IOS.image.bin

The output is a bunch of dots (for a switch) followed by an output line 
that ends "= xxx" with the x's 
replaced with the MD5 hash.


The command is on 2811 routers, too.  Maybe far more devices, but I 
didn't want to take the time to check.  You would need to capture the 
MD5 from a known good image, and watch for changes.


Re: Synful Knock questions...

2015-09-15 Thread Jake Mertel
My apologies, Valdis is indeed correct, I did not mean to suggest that it
would be possible to make modifications in such a way that would result in
an identical checksum. Sorry for the confusion and extra noise.



--
Regards,

Jake Mertel
Ubiquity Hosting



*Web: *https://www.ubiquityhosting.com
*Phone (direct): *1-480-478-1510
*Mail:* 5350 East High Street, Suite 300, Phoenix, AZ 85054


On Tue, Sep 15, 2015 at 1:01 PM,  wrote:

> On Tue, 15 Sep 2015 11:54:30 -0700, Jake Mertel said:
> > Indeed -- While there are methods that can be used to "pack" a file so
> that
> > it collides with a desirable checksum, that would be nearly impossible to
> > do in this scenario.
>
> Small clarification here.
>
> There are known methods to easily produce two files that have the same MD5
> hash, but you have no control over the checksum.
>
> There are not (to my knowledge) ways to tweak a file to produce a specified
> MD5 hash.  MD5 is broken, but not *that* broken (yet).  Feel free to point
> me at papers if it's been done.
>
> There are ways to easily produce a file with a specified
> non-crypto-strength
> hash like a CRC-32.
>
> So it really matters to be clear on what algorithm is used for the
> checksum/hash.
>


Re: Synful Knock questions...

2015-09-15 Thread Valdis . Kletnieks
On Tue, 15 Sep 2015 11:54:30 -0700, Jake Mertel said:
> Indeed -- While there are methods that can be used to "pack" a file so that
> it collides with a desirable checksum, that would be nearly impossible to
> do in this scenario.

Small clarification here.

There are known methods to easily produce two files that have the same MD5
hash, but you have no control over the checksum.

There are not (to my knowledge) ways to tweak a file to produce a specified
MD5 hash.  MD5 is broken, but not *that* broken (yet).  Feel free to point
me at papers if it's been done.

There are ways to easily produce a file with a specified non-crypto-strength
hash like a CRC-32.

So it really matters to be clear on what algorithm is used for the 
checksum/hash.


pgp84lmVOvk4V.pgp
Description: PGP signature


Re: Synful Knock questions...

2015-09-15 Thread Ricky Beam
On Tue, 15 Sep 2015 14:35:44 -0400, Michael Douglas  
 wrote:

Does anyone have a sample of a backdoored IOS image?


The IOS image isn't what gets modified. ROMMON is altered to patch IOS  
after decompression before passing control to it.  I don't know WTF  
they're going on and on about "file size". There are many reasons to  
overwrite. The most likely reason the hack does this is because it's  
easier than a dynamic allocation of executable memory. Plus, modifications  
done by ROMMON cannot allocate IOS system memory; their hooks MUST rewrite  
existing code SOMEWHERE.


Again, this is a ROMMON HACK, that doctors the running IOS image IN MEMORY  
before starting IOS.


Re: Synful Knock questions...

2015-09-15 Thread Jared Mauch

> On Sep 15, 2015, at 2:50 PM, Michael Douglas  wrote:
> 
> Wouldn't the calculated MD5/SHA sum for the IOS file change once it's
> modified (irrespective of staying the same size)?  I'd be interested to see
> if one of these backdoors would pass the IOS verify command or not.  Even
> if the backdoor changed the verify output; copying the IOS file off the
> router and MD5/SHA summing it on another host should show a difference.  I
> guess maintaining the file size is to prevent something like RANCID firing
> off a diff on the flash dir output.

There’s plenty of ways to detect/watch this.  you should check both the image 
and the unzip of
the image.  (yes, you heard me, unzip).

I know people who did modify their IOS images to disable various checks.  It’s 
not
hard nor impossible.. Look at the dynamips stuff where people used them on 7200 
images.

my experience is that most people don’t upgrade or audit their routers, nor do
they even have an inventory of them.  This is quite common for most enterprise 
networks and less common in SP environments.

Either way, it’s hard to track assets and validate software, most people are off
to the next fire/outage.

- Jared

Re: Synful Knock questions...

2015-09-15 Thread Jake Mertel
Indeed -- While there are methods that can be used to "pack" a file so that
it collides with a desirable checksum, that would be nearly impossible to
do in this scenario. I suspect that you're right in all regards -- that
taking the image file and checking it on another host would show obvious
indications of change, that local verification would be impossible since
the malware could presumably change the verification output, and that the
primary motivation for keeping the file size the same was to prevent simple
differential checks like those done by rancid from picking up the change.



--
Regards,

Jake Mertel
Ubiquity Hosting



*Web: *https://www.ubiquityhosting.com
*Phone (direct): *1-480-478-1510
*Mail:* 5350 East High Street, Suite 300, Phoenix, AZ 85054


On Tue, Sep 15, 2015 at 11:50 AM, Michael Douglas 
wrote:

> Wouldn't the calculated MD5/SHA sum for the IOS file change once it's
> modified (irrespective of staying the same size)?  I'd be interested to see
> if one of these backdoors would pass the IOS verify command or not.  Even
> if the backdoor changed the verify output; copying the IOS file off the
> router and MD5/SHA summing it on another host should show a difference.  I
> guess maintaining the file size is to prevent something like RANCID firing
> off a diff on the flash dir output.
>


RE: SMS Gateway

2015-09-15 Thread Gary T. Giesen
Another option might be an analog modem + phone line + carrier TAP gateway
(if your carrier(s) has/have one). Might or might not be more
cost-effective.

GTG

> -Original Message-
> From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Martin
> Hotze
> Sent: September 15, 2015 8:37 AM
> To: nanog@nanog.org
> Subject: Re: SMS Gateway
> 
> > From: Leonardo Arena 
> > To: Graham Johnston 
> > Cc: "'nanog@nanog.org'" 
> >
> > Il giorno lun, 14/09/2015 alle 14.53 +, Graham Johnston ha scritto:
> > > Today we use a product from MultiTech Systems call MultiModem iSMS
> > > to
> > send SMS text messages from our monitoring system to our on call staff.
> > This is a 2G product and we need to replace it soon. I know there are
> > more generic cellular modems that can do texting if you are willing to
> > put in the effort, the product we use currently though has a simple
> > HTTP based API specifically to send SMS. Is anybody out there using
> > something similar that can work on 3G or 4G networks?
> > >
> >
> > Here we use SMSTools (http://smstools3.kekekasvi.com/) on a Linux box
> > with a Multitech Serial/USB modem. It takes formatted text files from
> > a spooling directory. It never let us down since some years.
> 
> +1 for smstools.
> 
> and I'd add playsms.org
> 
> grab yourself a compatible USB 3G stick which you can switch to a modem.
eg
> a HUAWEI E1762 should work. You might want to look into a device with an
> antenna plug so you can put the antenne out of your cabinet for better
> reception.
> 
> martin




RE: SMS Gateway

2015-09-15 Thread Nick Nauwelaerts
The multitech multimodems I run seem to like rebooting an awful lot, they do it 
at least daily.

At another position I did like the SMS FoxBox ( http://www.smsfoxbox.it/ ), 
which had a simple http put command (amongst other interfaces) which allowed 
you to send text messages. The do seem to have gone up in price a bit since 
2008 however, but they did never fail on me over the 6years they were in 
service (sample size was 2 units, so not the best indicator).

// nick



-Original Message-
From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Graham Johnston
Sent: Monday, September 14, 2015 16:54
To: 'nanog@nanog.org' 
Subject: SMS Gateway

Today we use a product from MultiTech Systems call MultiModem iSMS to send SMS 
text messages from our monitoring system to our on call staff.  This is a 2G 
product and we need to replace it soon. I know there are more generic cellular 
modems that can do texting if you are willing to put in the effort, the product 
we use currently though has a simple HTTP based API specifically to send SMS. 
Is anybody out there using something similar that can work on 3G or 4G networks?





Volg Aquafin op Facebook | 
Twitter | 
YouTube | 
LinkedIN

Disclaimer: zie www.aquafin.be   P Denk aan het milieu. 
Druk deze mail niet onnodig af.

[http://www.chap-eau.be/chapeau-banner.jpg] 


Re: Synful Knock questions...

2015-09-15 Thread Marcin Cieslak
On Tue, 15 Sep 2015, Jake Mertel wrote:

> Reading through the article @
> https://www.fireeye.com/blog/threat-research/2015/09/synful_knock_-_acis.html,
> I'm lead to believe that the process(s) they overwrite are selected to
> cause no impact to the device. Relevant excerpt:
> 
> ###
> Malware Executable Code Placement
> 
> To prevent the size of the image from changing, the malware overwrites
> several legitimate IOS functions with its own executable code. The
> attackers will examine the current functionality of the router and
> determine functions that can be overwritten without causing issues on the
> router. Thus, the overwritten functions will vary upon deployment.
> ###
> 
> So, if the device in question isn't using OSPF, then the malware may
> overwrite the code for the OSPF process, allowing them to A) infect the
> device; B) cause no disruption to the operational state of the device
> (since, presumably, OSPF isn't going to be turned on); and C) keep the
> image firmware file size the same, preventing easy detection of the
> compromise.

That explains why on my home IOS router either IPsec works properly or 802.11,
but never both :)

~Marcin


Re: Synful Knock questions...

2015-09-15 Thread Michael Douglas
Wouldn't the calculated MD5/SHA sum for the IOS file change once it's
modified (irrespective of staying the same size)?  I'd be interested to see
if one of these backdoors would pass the IOS verify command or not.  Even
if the backdoor changed the verify output; copying the IOS file off the
router and MD5/SHA summing it on another host should show a difference.  I
guess maintaining the file size is to prevent something like RANCID firing
off a diff on the flash dir output.


Re: Synful Knock questions...

2015-09-15 Thread Jake Mertel
Reading through the article @
https://www.fireeye.com/blog/threat-research/2015/09/synful_knock_-_acis.html,
I'm lead to believe that the process(s) they overwrite are selected to
cause no impact to the device. Relevant excerpt:

###
Malware Executable Code Placement

To prevent the size of the image from changing, the malware overwrites
several legitimate IOS functions with its own executable code. The
attackers will examine the current functionality of the router and
determine functions that can be overwritten without causing issues on the
router. Thus, the overwritten functions will vary upon deployment.
###

So, if the device in question isn't using OSPF, then the malware may
overwrite the code for the OSPF process, allowing them to A) infect the
device; B) cause no disruption to the operational state of the device
(since, presumably, OSPF isn't going to be turned on); and C) keep the
image firmware file size the same, preventing easy detection of the
compromise.



--
Regards,

Jake Mertel
Ubiquity Hosting



*Web: *https://www.ubiquityhosting.com
*Phone (direct): *1-480-478-1510
*Mail:* 5350 East High Street, Suite 300, Phoenix, AZ 85054


On Tue, Sep 15, 2015 at 11:15 AM,  wrote:

> I'm sure most have already seen the CVE from Cisco, and I was just reading
> through the documentation from FireEye:
>
> https://www.fireeye.com/blog/threat-research/2015/09/synful_knock_-_acis.htm
> l
>
> Question is that it looks to me like they are over-writing the ospf
> response
> for "show ip ospf timers lsa-group"?
> And if that's the case I'm guessing the router would need to have ospf
> enabled to be able to see the response?
>
>
> Sincerely,
>
> Eric Tykwinski
> TrueNet, Inc.
> P: 610-429-8300
> F: 610-429-3222
>
>
>
>
>


Re: Synful Knock questions...

2015-09-15 Thread Michael Douglas
Does anyone have a sample of a backdoored IOS image?

On Tue, Sep 15, 2015 at 2:15 PM,  wrote:

> I'm sure most have already seen the CVE from Cisco, and I was just reading
> through the documentation from FireEye:
>
> https://www.fireeye.com/blog/threat-research/2015/09/synful_knock_-_acis.htm
> l
>
> Question is that it looks to me like they are over-writing the ospf
> response
> for "show ip ospf timers lsa-group"?
> And if that's the case I'm guessing the router would need to have ospf
> enabled to be able to see the response?
>
>
> Sincerely,
>
> Eric Tykwinski
> TrueNet, Inc.
> P: 610-429-8300
> F: 610-429-3222
>
>
>
>
>


Synful Knock questions...

2015-09-15 Thread eric-list
I'm sure most have already seen the CVE from Cisco, and I was just reading
through the documentation from FireEye:
https://www.fireeye.com/blog/threat-research/2015/09/synful_knock_-_acis.htm
l

Question is that it looks to me like they are over-writing the ospf response
for "show ip ospf timers lsa-group"?
And if that's the case I'm guessing the router would need to have ospf
enabled to be able to see the response?


Sincerely,

Eric Tykwinski
TrueNet, Inc.
P: 610-429-8300
F: 610-429-3222






Re: Frontier flaps -12:15?

2015-09-15 Thread Jared Mauch
The NTT ticket for Ashburn is VNOC-1-1345240005 if you are a customer and need 
to follow up.

- Jared

> On Sep 15, 2015, at 12:45 PM, Mr. NPP  wrote:
> 
> we lost NTT for a short period in ashburn, so something went on for sure.
> 
> mr.npp
> 
> On Tue, Sep 15, 2015 at 9:31 AM, Matt Hoppes 
> wrote:
> 
>> Did anyone experience any flaps or outage in the Frontier network between
>> 12:15 and 12:30 eastern today?
>> 
>> Appeared to be in Ashburn.
>> 
>> 
>> 



Re: Frontier flaps -12:15?

2015-09-15 Thread Mr. NPP
we lost NTT for a short period in ashburn, so something went on for sure.

mr.npp

On Tue, Sep 15, 2015 at 9:31 AM, Matt Hoppes 
wrote:

> Did anyone experience any flaps or outage in the Frontier network between
> 12:15 and 12:30 eastern today?
>
> Appeared to be in Ashburn.
>
>
>


Frontier flaps -12:15?

2015-09-15 Thread Matt Hoppes
Did anyone experience any flaps or outage in the Frontier network between 12:15 
and 12:30 eastern today?

Appeared to be in Ashburn. 




Re: SMS Gateway

2015-09-15 Thread Martin Hotze
> From: Leonardo Arena 
> To: Graham Johnston 
> Cc: "'nanog@nanog.org'" 
> 
> Il giorno lun, 14/09/2015 alle 14.53 +, Graham Johnston ha scritto:
> > Today we use a product from MultiTech Systems call MultiModem iSMS to
> send SMS text messages from our monitoring system to our on call staff.
> This is a 2G product and we need to replace it soon. I know there are more
> generic cellular modems that can do texting if you are willing to put in
> the effort, the product we use currently though has a simple HTTP based
> API specifically to send SMS. Is anybody out there using something similar
> that can work on 3G or 4G networks?
> >
> 
> Here we use SMSTools (http://smstools3.kekekasvi.com/) on a Linux box
> with a Multitech Serial/USB modem. It takes formatted text files from a
> spooling directory. It never let us down since some years.

+1 for smstools.

and I'd add playsms.org

grab yourself a compatible USB 3G stick which you can switch to a modem. eg a 
HUAWEI E1762 should work. You might want to look into a device with an antenna 
plug so you can put the antenne out of your cabinet for better reception.

martin