Re: Nachi/Welchia Aftermath

2004-01-21 Thread Mikael Abrahamsson
On Tue, 20 Jan 2004, Donovan Hill wrote: Where do the Extreme and Juniper fit into this? Juniper do not make L3-switches so they dont really compare. Extreme i-plattform is currently destination ip based with inital cache lookup. (guess this is flow based) -- Mikael Abrahamssonemail:

Re: What's the best way to wiretap a network?

2004-01-21 Thread Kurt Erik Lindqvist
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 2004-01-20, at 22.19, Steven M. Bellovin wrote: In message [EMAIL PROTECTED], William Allen Simpson writes: Eriks Rugelis wrote: On the other hand, if your environment consists of a large number (100's) of potential tapping points,

Re: What's the best way to wiretap a network?

2004-01-21 Thread Daniel Karrenberg
On 21.01 09:24, Kurt Erik Lindqvist wrote: From the initial discussions in Sweden around the new electronic communications act, it seems as if the operators are obliged to provide tapping free of charge. If this turns out to be the case, I guess it is pretty much the same all over

Re: Nachi/Welchia Aftermath

2004-01-21 Thread Donovan Hill
On Wednesday 21 January 2004 12:07 am, Mikael Abrahamsson wrote: On Tue, 20 Jan 2004, Donovan Hill wrote: Where do the Extreme and Juniper fit into this? Juniper do not make L3-switches so they dont really compare. Others have said that too, but given where Junipers are used, I think they

Re: sniffer/promisc detector

2004-01-21 Thread Alexei Roudnev
(I did not rated firewalls etc). Actually, an automated script or manual scan can find it trivially. All you have to do is a quick port scan, looking for this: We can make an experiment: - I put such system (with ssh) on /26 network; - you scan it, find and report me time and bandwidth,

Re: Nachi/Welchia Aftermath

2004-01-21 Thread Tom (UnitedLayer)
On Wed, 21 Jan 2004, Donovan Hill wrote: Extreme i-plattform is currently destination ip based with inital cache lookup. (guess this is flow based) I guess I just don't understand the architecture. What I really don't understand is _why_ you'd bother with flow-based architecture over

Re: Nachi/Welchia Aftermath

2004-01-21 Thread Mikael Abrahamsson
On Wed, 21 Jan 2004, Donovan Hill wrote: I guess I just don't understand the architecture. What I really don't understand is _why_ you'd bother with flow-based architecture over prefix-based architecture. am I looking green yet? Since these boxes are priced around $3000-$4000 or so and

Re: sniffer/promisc detector

2004-01-21 Thread Michael . Dillon
Uhm, that would be wrong. This is simply security through obscurity. Yes, it is wrong for the _smart books_. But it works in real life. Actually, an automated script or manual scan can find it trivially. If security through obscurity was useless then the USAF would never have developed

Re: What's the best way to wiretap a network?

2004-01-21 Thread Paul Wouters
On Tue, 20 Jan 2004, William Allen Simpson wrote: This is a feature, not a bug. Law enforcement is required to pay -- up front -- all costs of tapping. No pay, no play. Oh, I wish, I wish In NL, law dictates any telecommunicatins device (as defined amongst things as anything with

Re: Nachi/Welchia Aftermath

2004-01-21 Thread John Lyons
On Tue, Jan 20, 2004 at 08:02:23PM -0800, Tom (UnitedLayer) wrote: Not all L3-switches are flow-based; prefix-based ones should do just fine. Can people add/correct this initial list ? Flow-based: Foundry with IronCore modules, Cisco Catalyst 6500 with Sup1(A) Prefix-based: Foundry with

Re: What's the best way to wiretap a network?

2004-01-21 Thread Roland Perry
In article [EMAIL PROTECTED], Kurt Erik Lindqvist [EMAIL PROTECTED] writes From the initial discussions in Sweden around the new electronic communications act, it seems as if the operators are obliged to provide tapping free of charge. If this turns out to be the case, I guess it is pretty much

Re: sniffer/promisc detector

2004-01-21 Thread Ruben van der Leij
+++ [EMAIL PROTECTED] [21/01/04 10:52 +]: Uhm, that would be wrong. This is simply security through obscurity. Yes, it is wrong for the _smart books_. But it works in real life. Actually, an automated script or manual scan can find it trivially. If security through obscurity

Re: sniffer/promisc detector

2004-01-21 Thread Valdis . Kletnieks
On Wed, 21 Jan 2004 15:58:14 +0100, Ruben van der Leij [EMAIL PROTECTED] said: Somebody who isn't smart enough to do 'nmap -p 0-65535 $target' isn't worth diverting. I'm sure everybody who got whacked by Lion or CodeRed or Blaster or are glad to hear those attacks weren't worth diverting.

Re: sniffer/promisc detector

2004-01-21 Thread Alexei Roudnev
Please, do it: time nmap -p 0-65535 $target You will be surprised (and nmap will not report applications; to test a response, multiply time at 5 ). And you will have approx. 40% of packets lost. Practically, nmap is useless for this purpose. Somebody who isn't smart enough to do 'nmap -p

Re: Nachi/Welchia Aftermath

2004-01-21 Thread haesu
more generally... if you want routing, buy a router. amen. imho there can't be a better routing equipment than a real router :) -J i have a hybrid switer that i'm very happy with. at my house, that is. (the idea of using one in commerce or production gives me cold

Re: Diversity as defense

2004-01-21 Thread sgorman1
I can see how the biology analogy could lead itself to preordained outcome, but I do not think it was the case in this research. For one it is really just a biology analogy, the mathematics are standard graph theory/statititical mechanics. Actually, the original results we got back from the

Re: Nachi/Welchia Aftermath

2004-01-21 Thread Richard A Steenbergen
On Wed, Jan 21, 2004 at 12:11:43PM -0500, [EMAIL PROTECTED] wrote: more generally... if you want routing, buy a router. amen. imho there can't be a better routing equipment than a real router :) But unfortunately, not true. A router is anything which makes decisions by

Re: Nachi/Welchia Aftermath

2004-01-21 Thread Paul Vixie
more generally... if you want routing, buy a router. amen. imho there can't be a better routing equipment than a real router :) i guess i need to explain in more detail. keep in mind that i'm technophobic and that when VLANs first appeared i was convinced that the end of the

Re: Nachi/Welchia Aftermath

2004-01-21 Thread haesu
ok so.. please note that, that was rather a foolish statement of mine :) for more constructive thought, i agree with ras' comments. -J On Wed, Jan 21, 2004 at 12:11:43PM -0500, [EMAIL PROTECTED] wrote: more generally... if you want routing, buy a router.

Re: sniffer/promisc detector

2004-01-21 Thread Crist Clark
Alexei Roudnev wrote: Please, do it: time nmap -p 0-65535 $target You will be surprised (and nmap will not report applications; to test a response, multiply time at 5 ). Yes. It will, http://www.insecure.org/nmap/versionscan.html -- Crist J. Clark

Outbound Route Optimization

2004-01-21 Thread Jim Devane
Hello, I am trying to determine for myself the relevance of Intelligent Routing Devices like Sockeye, Route Science etc. I am not trying to determine who does it better, but rather if the concept of optimizing routes is addressing a significant problem in terms of improved traffic

Re: Outbound Route Optimization

2004-01-21 Thread Phil Rosenthal
On Jan 21, 2004, at 3:27 PM, Jim Devane wrote: Hello, I am trying to determine for myself the relevance of Intelligent Routing Devices like Sockeye, Route Science etc. I am not trying to determine who does it better, but rather if the concept of optimizing routes is addressing a significant

Re: sniffer/promisc detector

2004-01-21 Thread Dave Israel
Clipped for brevity... On 1/21/2004 at 10:52:00 +, [EMAIL PROTECTED] said: Uhm, that would be wrong. This is simply security through obscurity. Yes, it is wrong for the _smart books_. But it works in real life. Actually, an automated script or manual scan can find it

Re: Outbound Route Optimization

2004-01-21 Thread Paul Vixie
My questions are these: Is sub-optimal routing caused by BGP so pervasive it needs to be addressed? that depends on your isp, and whether their routing policies (openness or closedness of peering, shortest vs. longest exit, respect for MEDs) are a good match for their

Re: Outbound Route Optimization

2004-01-21 Thread vijay gill
On Wed, Jan 21, 2004 at 09:05:46PM +, Paul Vixie wrote: My questions are these: Is sub-optimal routing caused by BGP so pervasive it needs to be addressed? that depends on your isp, and whether their routing policies (openness or closedness of peering, shortest vs.

Re: Nachi/Welchia Aftermath

2004-01-21 Thread Rafi Sadowsky
## On 2004-01-20 20:02 -0800 Tom (UnitedLayer) typed: T( T( On Tue, 20 Jan 2004, Rubens Kuhl Jr. wrote: T( Not all L3-switches are flow-based; prefix-based ones should do just fine. T( Can people add/correct this initial list ? T( T( Flow-based: Foundry with IronCore modules, Cisco

Re: Outbound Route Optimization

2004-01-21 Thread Paul Vixie
... depends on your isp, and whether their routing policies (openness or closedness of peering, shortest vs. longest exit, respect for MEDs) are a good match for their technology/tools, skills/experience, and resources/headroom. In practice, all of the above just turn out to be

Re: Nachi/Welchia Aftermath

2004-01-21 Thread sthaug
T( The 2948G-L3 and the 4908G-L3 I believe are Prefix/ASIC based. T( I believe the 3550-EMI is as well, but I'm not familiar with that T( equipment. All 3550s are prefix/ASIC based, EMI or SMI doesn't matter. Anyone know about the: Cisco Catalyst 3750 ? 3750s are also prefix/ASIC

Re: sniffer/promisc detector

2004-01-21 Thread Ruben van der Leij
+++ [EMAIL PROTECTED] [21/01/04 11:40 -0500]: Somebody who isn't smart enough to do 'nmap -p 0-65535 $target' isn't worth diverting. I'm sure everybody who got whacked by Lion or CodeRed or Blaster or are glad to hear those attacks weren't worth diverting. I'm sure moving

Re: Nachi/Welchia Aftermath

2004-01-21 Thread Rubens Kuhl Jr.
T( Flow-based: Foundry with IronCore modules, Cisco Catalyst 6500 with Sup1(A) T( Prefix-based: Foundry with JetCore modules, Cisco Catalyst 6500/7600 with T( Sup2(A), Sup3(A/BXL) T( T( The 2948G-L3 and the 4908G-L3 I believe are Prefix/ASIC based. T( I believe the 3550-EMI is as well,

Re: Nachi/Welchia Aftermath

2004-01-21 Thread Mikael Abrahamsson
On Wed, 21 Jan 2004, Rafi Sadowsky wrote: As for the 3550-EMI real life experience as a 10/100 BT aggregation switch wasn't affected(CPU 5%) at all by rather aggressive scanning but did generate around 11 Mb/sec of ARP requests on all the 100Mb/sec ports in the same VLAN and totally killed

Re: Outbound Route Optimization

2004-01-21 Thread Richard A Steenbergen
On Wed, Jan 21, 2004 at 12:27:16PM -0800, Jim Devane wrote: Are these devices able to effectively address the need? Sugar pills effectively address the needs of a great many ailments when given to people who believe that they will work. And if the end result is an addressed need, who are we

Re: Outbound Route Optimization

2004-01-21 Thread Tom (UnitedLayer)
On Wed, 21 Jan 2004, Richard A Steenbergen wrote: On Wed, Jan 21, 2004 at 12:27:16PM -0800, Jim Devane wrote: Are these devices able to effectively address the need? Sugar pills effectively address the needs of a great many ailments when given to people who believe that they will work. And

Re: Outbound Route Optimization

2004-01-21 Thread Richard A Steenbergen
On Wed, Jan 21, 2004 at 02:30:19PM -0800, Tom (UnitedLayer) wrote: On Wed, 21 Jan 2004, Richard A Steenbergen wrote: On Wed, Jan 21, 2004 at 12:27:16PM -0800, Jim Devane wrote: Are these devices able to effectively address the need? Sugar pills effectively address the needs of a great

Re: Outbound Route Optimization

2004-01-21 Thread Tom (UnitedLayer)
On Wed, 21 Jan 2004, Richard A Steenbergen wrote: I don't know if they're doing the same thing in Cali or not (they probably are, since all the radio stations are owned by the same 2 companies), Yeah, NPR and CBS, both monopolistic empires with the same viewpoint :) but here in NoVA land