Re: Synful Knock questions...

2015-09-15 Thread Roland Dobbins
On 16 Sep 2015, at 11:51, Paul Ferguson wrote: Please bear in mind hat the attacker *must* acquire credentials to access the box before exploitation. And must have access to the box in order to utilize said credentials - which of course, there are BCPs intended to prevent same. ---

Re: Sign-On Letter to the Court in the FCC's Net Neutrality Case

2015-09-15 Thread Eric Brunner-Williams
i read it, its rather good. -e On 9/12/15 12:45 PM, John Levine wrote: /*If you're willing to sign on and help today, please email me directly (off list) */and I will be happy to share a copy of the letter for you to review before you agree to sign on. Why don't you just send us a copy or a li

Re: Synful Knock questions...

2015-09-15 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Please bear in mind hat the attacker *must* acquire credentials to access the box before exploitation. Please discuss liberally. - - ferg' On 9/15/2015 1:46 PM, Stephen Satchell wrote: > On 09/15/2015 11:40 AM, Jake Mertel wrote: >> C) keep the i

Re: Synful Knock questions...

2015-09-15 Thread Blake Hudson
I always perform the md5 and/or SHA verification of images on flash against the Cisco website. This is mainly to ensure a good transfer from TFTP. While I've never had a bad TFTP transfer (as in the transfer said successful, but files were corrupted), I have encountered images that were mis-nam

Re: Synful Knock questions...

2015-09-15 Thread Alain Hebert
Well, It would be pointless to do, If the flash version and the running executable already replaced that function to return the right MD5 as from the CCO repository... But yes, scheduling the downloading the firmware and doing a SHA512 from your known good source (aka the Cis

Re: Synful Knock questions...

2015-09-15 Thread Valdis . Kletnieks
On Tue, 15 Sep 2015 13:46:38 -0700, Stephen Satchell said: > > Switch#verify /md5 my.installed.IOS.image.bin > > The output is a bunch of dots (for a switch) followed by an output line > that ends "= xxx" with the x's > replaced with the MD5 hash. You *do* r

Re: Synful Knock questions...

2015-09-15 Thread Stephen Satchell
On 09/15/2015 11:40 AM, Jake Mertel wrote: C) keep the image firmware file size the same, preventing easy detection of the compromise. Hmmm...time to automate the downloading and checksumming of the IOS images in my router. Hey, Expect, I'm looking at YOU. Wait a minute...doesn't Cisco have

Re: Synful Knock questions...

2015-09-15 Thread Jake Mertel
My apologies, Valdis is indeed correct, I did not mean to suggest that it would be possible to make modifications in such a way that would result in an identical checksum. Sorry for the confusion and extra noise. -- Regards, Jake Mertel Ubiquity Hosting *Web: *https://www.ubiquityhosting.com

Re: Synful Knock questions...

2015-09-15 Thread Valdis . Kletnieks
On Tue, 15 Sep 2015 11:54:30 -0700, Jake Mertel said: > Indeed -- While there are methods that can be used to "pack" a file so that > it collides with a desirable checksum, that would be nearly impossible to > do in this scenario. Small clarification here. There are known methods to easily produc

Re: Synful Knock questions...

2015-09-15 Thread Ricky Beam
On Tue, 15 Sep 2015 14:35:44 -0400, Michael Douglas wrote: Does anyone have a sample of a backdoored IOS image? The IOS image isn't what gets modified. ROMMON is altered to patch IOS after decompression before passing control to it. I don't know WTF they're going on and on about "file si

Re: Synful Knock questions...

2015-09-15 Thread Jared Mauch
> On Sep 15, 2015, at 2:50 PM, Michael Douglas wrote: > > Wouldn't the calculated MD5/SHA sum for the IOS file change once it's > modified (irrespective of staying the same size)? I'd be interested to see > if one of these backdoors would pass the IOS verify command or not. Even > if the backd

Re: Synful Knock questions...

2015-09-15 Thread Jake Mertel
Indeed -- While there are methods that can be used to "pack" a file so that it collides with a desirable checksum, that would be nearly impossible to do in this scenario. I suspect that you're right in all regards -- that taking the image file and checking it on another host would show obvious indi

RE: SMS Gateway

2015-09-15 Thread Gary T. Giesen
Another option might be an analog modem + phone line + carrier TAP gateway (if your carrier(s) has/have one). Might or might not be more cost-effective. GTG > -Original Message- > From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Martin > Hotze > Sent: September 15, 2015 8:37 AM >

RE: SMS Gateway

2015-09-15 Thread Nick Nauwelaerts
The multitech multimodems I run seem to like rebooting an awful lot, they do it at least daily. At another position I did like the SMS FoxBox ( http://www.smsfoxbox.it/ ), which had a simple http put command (amongst other interfaces) which allowed you to send text messages. The do seem to have

Re: Synful Knock questions...

2015-09-15 Thread Marcin Cieslak
On Tue, 15 Sep 2015, Jake Mertel wrote: > Reading through the article @ > https://www.fireeye.com/blog/threat-research/2015/09/synful_knock_-_acis.html, > I'm lead to believe that the process(s) they overwrite are selected to > cause no impact to the device. Relevant excerpt: > > ### > Malware Ex

Re: Synful Knock questions...

2015-09-15 Thread Michael Douglas
Wouldn't the calculated MD5/SHA sum for the IOS file change once it's modified (irrespective of staying the same size)? I'd be interested to see if one of these backdoors would pass the IOS verify command or not. Even if the backdoor changed the verify output; copying the IOS file off the router

Re: Synful Knock questions...

2015-09-15 Thread Jake Mertel
Reading through the article @ https://www.fireeye.com/blog/threat-research/2015/09/synful_knock_-_acis.html, I'm lead to believe that the process(s) they overwrite are selected to cause no impact to the device. Relevant excerpt: ### Malware Executable Code Placement To prevent the size of the ima

Re: Synful Knock questions...

2015-09-15 Thread Michael Douglas
Does anyone have a sample of a backdoored IOS image? On Tue, Sep 15, 2015 at 2:15 PM, wrote: > I'm sure most have already seen the CVE from Cisco, and I was just reading > through the documentation from FireEye: > > https://www.fireeye.com/blog/threat-research/2015/09/synful_knock_-_acis.htm > l

Synful Knock questions...

2015-09-15 Thread eric-list
I'm sure most have already seen the CVE from Cisco, and I was just reading through the documentation from FireEye: https://www.fireeye.com/blog/threat-research/2015/09/synful_knock_-_acis.htm l Question is that it looks to me like they are over-writing the ospf response for "show ip ospf timers ls

Re: Frontier flaps -12:15?

2015-09-15 Thread Jared Mauch
The NTT ticket for Ashburn is VNOC-1-1345240005 if you are a customer and need to follow up. - Jared > On Sep 15, 2015, at 12:45 PM, Mr. NPP wrote: > > we lost NTT for a short period in ashburn, so something went on for sure. > > mr.npp > > On Tue, Sep 15, 2015 at 9:31 AM, Matt Hoppes > wro

Re: Frontier flaps -12:15?

2015-09-15 Thread Mr. NPP
we lost NTT for a short period in ashburn, so something went on for sure. mr.npp On Tue, Sep 15, 2015 at 9:31 AM, Matt Hoppes wrote: > Did anyone experience any flaps or outage in the Frontier network between > 12:15 and 12:30 eastern today? > > Appeared to be in Ashburn. > > >

Frontier flaps -12:15?

2015-09-15 Thread Matt Hoppes
Did anyone experience any flaps or outage in the Frontier network between 12:15 and 12:30 eastern today? Appeared to be in Ashburn.

Re: SMS Gateway

2015-09-15 Thread Martin Hotze
> From: Leonardo Arena > To: Graham Johnston > Cc: "'nanog@nanog.org'" > > Il giorno lun, 14/09/2015 alle 14.53 +, Graham Johnston ha scritto: > > Today we use a product from MultiTech Systems call MultiModem iSMS to > send SMS text messages from our monitoring system to our on call staff.