Re: Cisco Routers Vulnerability

2015-04-13 Thread Matthew Galgoci
Thus said Rashed Alwarrag on Tue, 14 Apr 2015:
 Date: Tue, 14 Apr 2015 00:29:25 +0300
 From: Rashed Alwarrag rali.ah...@gmail.com
 To: nanog@nanog.org
 Subject: Cisco Routers Vulnerability

 Hi
 Today we have a lot of customers report that their Cisco routers got a root
 access and the IOS got erased , is there any known vulnerability in cisco
 products thats they report in their Security alerts about this recently  ?
  is there any one face the same issue ?

Another strong possibility is a disgruntled former employee or former
contractor.

-- 
Matthew Galgoci
Network Operations
Red Hat, Inc
919.754.3700 x44155
--
“Whatever you do will be insignificant, but it is very important that you do 
it.”  -- Mahatma Gandhi



oss netflow collector/trending/analysis

2014-05-02 Thread Matthew Galgoci

Hey There,

I was just wondering, for people who are doing netflow analysis with
open source tools and who are doing at least 10k or more flows per
second, what are you using?

I know of three tool sets:

- The classic osu flow-tools and the modern continuation/fork.
- ntop
- nfdump/nfsen

Is there anything else I've missed? A few folks here really seem to like
nfsen/nfdump.

Thanks,

Matt

-- 
Matthew Galgoci
Network Operations
Red Hat, Inc
919.754.3700 x44155
--
“Whatever you do will be insignificant, but it is very important that you do 
it.”  -- Mahatma Gandhi



Re: CPE dns hijacking malware

2013-11-12 Thread Matthew Galgoci
 Date: Tue, 12 Nov 2013 06:35:51 +
 From: Dobbins, Roland rdobb...@arbor.net
 To: NANOG list nanog@nanog.org
 Subject: Re: CPE  dns hijacking malware


 On Nov 12, 2013, at 1:17 PM, Jeff Kell jeff-k...@utc.edu wrote:

  (2) DHCP hijacking daemon installed on the client, supplying the hijacker's 
  DNS servers on a DHCP renewal.  Have seen both, the latter being more
  common, and the latter will expand across the entire home subnet in time 
  (based on your lease interval)

 I'd (perhaps wrongly) assumed that this probably wasn't the case, as the OP 
 referred to the CPE devices themselves as being malconfigured; it would be 
 helpful to know if the OP can supply more information, and whether or not 
 he'd a chance to examine the affected CPE/end-customer setups.


I have encountered a family members provider supplied CPE that had the
web server exposed on the public interface with default credentials still
in place. It's probably more common than one would expect.

-- 
Matthew Galgoci
Network Operations
Red Hat, Inc
919.754.3700 x44155
--
It's not whether you get knocked down, it's whether you get up. - Vince 
Lombardi