RE: Cisco Workaround

2003-08-14 Thread David Gillett
L PROTECTED] > Sent: August 10, 2003 23:27 > To: David Gillett > Cc: 'Douglas Gullett'; 'Adam Overlin'; > [EMAIL PROTECTED] > Subject: RE: Cisco Workaround > > > > hi guys, > > all the posts i've seen replying to this guy's proble

RE: Cisco Workaround (VPN PROBLEM)

2003-08-14 Thread stephen at unix dot za dot net
hallo again, just to make life easy for you adam, my scenerio is a freebsd box that acts as a gateway/ firewall, which redirects vpn calls to my w2k server. i don't have too much cisco experience (last time i used one was about 3 yrs ago) but as long as you do the following vpn connections shoul

RE: Cisco Workaround

2003-08-14 Thread stephen at unix dot za dot net
u > > need to have > > Protocol Port 51 (ESP) and Protocol Port 52 (AH) open, as > > well as UDP Port > > 500 (isakmp). > > > > Doug > > > > -----Original Message- > > From: Adam Overlin [mailto:[EMAIL PROTECTED] > > Sent: Thursday, July 31

RE: Cisco Workaround

2003-08-14 Thread Cesar Osorio
at unix dot za dot net'" da.edu> <[EMAIL PROTECTED]> cc: <[EMAIL PROTECTED]> 12/08/

RE: Cisco Workaround

2003-08-14 Thread Cesar Osorio
EMAIL PROTECTED]> 12/08/2003 02:07 Subject: RE: Cisco Workaround Please respond to gillettdavid Whether your VPN users need GRE or ESP+AH will depend on what particular VPN technology they use. (In our case, so

RE: Cisco Workaround

2003-08-04 Thread David Gillett
ESP is protocol 50 and AH is 51. Neither opening 52 nor leaving 50 closed is likely to help. David Gillett > -Original Message- > From: Douglas Gullett [mailto:[EMAIL PROTECTED] > Sent: August 2, 2003 08:49 > To: Adam Overlin; [EMAIL PROTECTED] > Subject: RE: C

RE: Cisco Workaround

2003-08-04 Thread Adam Overlin
riginal Message- From: Douglas Gullett [mailto:[EMAIL PROTECTED] Sent: Saturday, August 02, 2003 8:49 AM To: Adam Overlin; [EMAIL PROTECTED] Subject: RE: Cisco Workaround Adam, If the "cheat" sheet you are referring to is the Cisco Security Alert, I am guessing that you put in their access-

RE: Cisco Workaround

2003-08-04 Thread Douglas Gullett
am Overlin [mailto:[EMAIL PROTECTED] Sent: Thursday, July 31, 2003 12:59 PM To: [EMAIL PROTECTED] Subject: RE: Cisco Workaround I just joined this list so I haven't seen the whole thread on this issue, thus my company's particular issue may have been discussed already, but I thought I woul

RE: Cisco Workaround (VPN PROBLEM)

2003-08-01 Thread Vachon, Scott
>I did state in my first mail that it was the pixes that were controlling the >vpn/encryption, but I may not have been clear. So there it is again. :) >Anyway, the 2 versions that we tried to upgrade to are: >c820-k9osy6-mz.12.3-1a (24/8) and >12.2(15)T4/5 >Currently we are running: >12.2 (sorry

RE: Cisco Workaround (VPN PROBLEM)

2003-08-01 Thread Paul Benedek
August 2003 00:04 To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: RE: Cisco Workaround (VPN PROBLEM) I did state in my first mail that it was the pixes that were controlling the vpn/encryption, but I may not have been clear. So there it is again. :) Anyway, the 2 versions that we tried to

RE: Cisco Workaround

2003-07-31 Thread Dozal, Tim
To: [EMAIL PROTECTED] Subject: RE: Cisco Workaround >Background: >We have a Cisco 827 router and a PIX 506e locally. Router being in front of >the PIX. We also have a co-location facility that we are connected via a >constant VPN tunnel. There we have a PIX 515e. The two pixes are

RE: Cisco Workaround (VPN PROBLEM)

2003-07-31 Thread Adam Overlin
did look the same as it was before. Just the IOS >version changed. > >Adam > >-Original Message- >From: John Canty [mailto:[EMAIL PROTECTED] >Sent: Thursday, July 31, 2003 10:37 AM >To: Adam Overlin >Subject: RE: Cisco Workaround > > >send us along a

RE: Cisco Workaround (VPN PROBLEM)

2003-07-31 Thread jamesworld
al Message- From: John Canty [mailto:[EMAIL PROTECTED] Sent: Thursday, July 31, 2003 10:37 AM To: Adam Overlin Subject: RE: Cisco Workaround send us along a copy of this cheat sheet, and I am willing to bet there might a few more answers to give :) //John -Original Message- From: Ada

RE: Cisco Workaround

2003-07-31 Thread Vachon, Scott
>Background: >We have a Cisco 827 router and a PIX 506e locally. Router being in front of >the PIX. We also have a co-location facility that we are connected via a >constant VPN tunnel. There we have a PIX 515e. The two pixes are what >control the VPN/encryption. >So we upgraded the router to

RE: Cisco Workaround

2003-07-31 Thread Paul Benedek
[mailto:[EMAIL PROTECTED] Sent: 31 July 2003 17:59 To: [EMAIL PROTECTED] Subject: RE: Cisco Workaround I just joined this list so I haven't seen the whole thread on this issue, thus my company's particular issue may have been discussed already, but I thought I would see if I could get some h

RE: Cisco Workaround

2003-07-31 Thread Adam Overlin
Sent: Thursday, July 31, 2003 10:37 AM To: Adam Overlin Subject: RE: Cisco Workaround send us along a copy of this cheat sheet, and I am willing to bet there might a few more answers to give :) //John -Original Message- From: Adam Overlin [mailto:[EMAIL PROTECTED] Sent: Thursday, July

RE: Cisco Workaround

2003-07-31 Thread Adam Overlin
I just joined this list so I haven't seen the whole thread on this issue, thus my company's particular issue may have been discussed already, but I thought I would see if I could get some help anyway. Background: We have a Cisco 827 router and a PIX 506e locally. Router being in front of the PIX.

Re: Cisco Workaround

2003-07-31 Thread Jac
Oh, you guys are no fun at all. The key to a conspiracy theory is that the facts have to at least marginally support the theory and not prove it. Just enough evidence to make one paranoid but not make you want to hide in your fall out shelter. This is perfect for a conspiracy, Very large company

RE: Cisco Workaround

2003-07-30 Thread Dozal, Tim
m. Tim (the above is my personal view, not that of the company btw) -Original Message- From: Todd Mitchell - lists [mailto:[EMAIL PROTECTED] Sent: Wednesday, July 30, 2003 9:02 AM To: 'Jac'; [EMAIL PROTECTED] Subject: RE: Cisco Workaround | As to support, I heard an interesting c

Re: Cisco Workaround

2003-07-30 Thread James Fields
This sounds false on its face. Cisco actually makes a great deal of money from providing support (trust me, I know what my company pays for a blanket contract and it's enough to put several Cisco-kids through college every year). There's a pretty good reason why this flaw wasn't found sooner - th

RE: Cisco Workaround

2003-07-30 Thread Todd Mitchell - lists
| As to support, I heard an interesting conspiracy | theory related to Cisco support and the IOS flaw: | | The theory is that Cisco had far to many IOS versions | that they support in the field and in order to reduce | support costs they "conveniently" found this flaw with | the IOS software and u

Re: Cisco Workaround

2003-07-30 Thread Jac
As to support, I heard an interesting conspiracy theory related to Cisco support and the IOS flaw: The theory is that Cisco had far to many IOS versions that they support in the field and in order to reduce support costs they "conveniently" found this flaw with the IOS software and used it to prop

RE: Cisco Workaround

2003-07-29 Thread James Fields
> > > > > > -Original Message- > From: Noonan, Wesley [mailto:[EMAIL PROTECTED] > Sent: Tuesday, July 29, 2003 12:27 AM > To: '[EMAIL PROTECTED]'; 'Ghaith Nasrawi' > Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED] > Subject: RE: Cisco Workar

Re: Cisco Workaround

2003-07-29 Thread stephane nasdrovisky
As far as this particular issue is concerned, Cisco do provide a high quality of support to its customers. What they don't provide is free training for lazy network administrators. If you're unable to apply the IOS patch they freely provide to any administrator who asks for it (as stated in the ad

RE: Cisco Workaround

2003-07-29 Thread Ghaith Nasrawi
L PROTECTED]; [EMAIL PROTECTED] Subject: RE: Cisco Workaround I've got to agree with David here. There is no reason that Cisco, or any other large company should be expected to provide workarounds that address the distinct minority of their install base. They should focus on the majority

RE: Cisco Workaround

2003-07-28 Thread Martin, Olivier
removed. Olivier -Message d'origine- De : Tim Donahue [mailto:[EMAIL PROTECTED] Envoyé : Friday, July 25, 2003 3:43 PM À : 'Ghaith Nasrawi' Cc : [EMAIL PROTECTED]; [EMAIL PROTECTED] Objet : RE: Cisco Workaround Hmmm Why don't you open up the protocols from the add

Re: Cisco Workaround

2003-07-28 Thread joshua sahala
that there are new versions of IOS > that are not vulnerable to this attack, which means that you can > upgrade IOS and resolve the issute all together. > > Tim Donahue > > > -Original Message- > > From: Ghaith Nasrawi [mailto:[EMAIL PROTECTED] > > Sent: Frida

RE: Cisco Workaround

2003-07-28 Thread Noonan, Wesley
:40 To: 'Ghaith Nasrawi' Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: RE: Cisco Workaround They have. They've been amazingly responsive about providing fixed code versions for some frighteningly-old equipment. The *Workaround* is just a quick and dirty fix for those who need s

RE: Cisco Workaround

2003-07-28 Thread David Gillett
- > From: Ghaith Nasrawi [mailto:[EMAIL PROTECTED] > Sent: July 25, 2003 08:33 > Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED] > Subject: RE: Cisco Workaround > > > Well, my question is; what the hell if I was using any of these > protocols?? Didn't cisco think of that?

RE: Cisco Workaround (comment on actually using those protocols)

2003-07-28 Thread jamesworld
PM To: Alvaro Gordon-Escobar Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: Re: Cisco Workaround Alvaro, No. The protocol blocked by the access-list is protocol 53 not protocol TCP or protocol UDP port 53. If you need further info, let me know, -James At 09:15 7/23/2003, Alvaro Gord

RE: Cisco Workaround

2003-07-28 Thread Ghaith Nasrawi
ble. ./Ghaith === Today is the tomorrow you worried about yesterday -Original Message- From: Tim Donahue [mailto:[EMAIL PROTECTED] Sent: Friday, July 25, 2003 10:43 PM To: 'Ghaith Nasrawi' Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: RE: Cisco Workaround Hmmm

RE: Cisco Workaround

2003-07-28 Thread Tim Donahue
issute all together. Tim Donahue > -Original Message- > From: Ghaith Nasrawi [mailto:[EMAIL PROTECTED] > Sent: Friday, July 25, 2003 11:33 AM > Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED] > Subject: RE: Cisco Workaround > > > Well, my question is; what the hell if I w

RE: Cisco Workaround

2003-07-25 Thread Ghaith Nasrawi
ailto:[EMAIL PROTECTED] Sent: Wednesday, July 23, 2003 6:48 PM To: Alvaro Gordon-Escobar Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: Re: Cisco Workaround Alvaro, No. The protocol blocked by the access-list is protocol 53 not protocol TCP or protocol UDP port 53. If you need further info

RE: Cisco Workaround

2003-07-24 Thread Jofre, Sebastian
Ports : http://www.seifried.org/security/ports/ Regards. -Original Message- From: Wolfpaw - Dale Corse [mailto:[EMAIL PROTECTED] Sent: Thursday, July 24, 2003 1:03 AM To: DOUGLAS GULLETT; Alvaro Gordon-Escobar Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: RE: Cisco Workaround Be

RE: Cisco Workaround

2003-07-24 Thread David Gillett
with a need for any additional protocols to cross our borders. David Gillett > -Original Message- > From: Kurt Seifried [mailto:[EMAIL PROTECTED] > Sent: July 23, 2003 22:11 > To: DOUGLAS GULLETT; Alvaro Gordon-Escobar > Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED] > Subject

Re: Cisco Workaround

2003-07-24 Thread Stephane Nasdrovisky
My phone is plugged in the port 53 of our pabx, will I have to plug my phone in another port if I implement this access list ? > DNS is using port 53, I think you should consider > unblockthis port if you want your DNS to communicate with your ISP > DNS. > > will this access list

Re: Cisco Workaround

2003-07-24 Thread Jac
The list stated is what Cisco recommends in thier work around for the transit ACL. The exploit for this has already come out and they state that you don't need any combinations, just 76 packets of one of the protocols. I gave it a quick read through and you can find it at: http://www.derkeiler.co

Re: Cisco Workaround

2003-07-24 Thread joshua sahala
On Wednesday 23 July 2003 15:16, DOUGLAS GULLETT wrote: > I don't think you have to put all the access-list in. I believe > that the hack requires a certain combination of packets to the four > ports, so leaving one or two of them open should still prevent the > hack. That might be a good questio

Re: Cisco Workaround

2003-07-24 Thread john
The hack does not require the usage of all 4 protocols. Using any one of them will allow disable the router interface. Using hping to test is the best way to see what I mean. John On Wed, 2003-07-23 at 14:16, DOUGLAS GULLETT wrote: > I don't think you have to put all the access-list in. I beli

Re: Cisco Workaround

2003-07-24 Thread igenge2
Hello Doug, >I don't think you have to put all the access-list in. I believe that >the hack requires a certain combination of packets to the four ports, >so leaving one or two of them open should still prevent the hack. Firstly, remember that these are IP protocols we are referring to, not TCP/

RE: Cisco Workaround

2003-07-24 Thread Byrne Ghavalas
helps. Kind regards Byrne G > -Original Message- > From: DOUGLAS GULLETT [mailto:[EMAIL PROTECTED] > Sent: Wednesday, July 23, 2003 8:16 PM > To: Alvaro Gordon-Escobar > Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED] > Subject: Re: Cisco Workaround > > > I don'

RE: Cisco Workaround

2003-07-24 Thread Wolfpaw - Dale Corse
CTED] > Subject: Re: Cisco Workaround > > > I don't think you have to put all the access-list in. I > believe that > the hack requires a certain combination of packets to the > four ports, > so leaving one or two of them open should still prevent the > hack. That

Re: Cisco Workaround

2003-07-24 Thread Kurt Seifried
No. The attack requires N+1 attack packets. N=size of queue, which by default is 75. The packets can be any of the four protocols (i.e. all of one type, half of one, half of another, etc.). It has also been reported that some other protocols work for this attack, but this has not been confirmed. Re

RE: Cisco Workaround

2003-07-24 Thread dave kleiman
These are IP protocols you are denying no TCP or UDP protocols. i.e 103 = PIM Protocol Independent Multicast _ Dave Kleiman [EMAIL PROTECTED] www.netmedic.net "High achievement always takes place in the framework of high expectation." Jack Kinder -Original Message

RE: Cisco Workaround

2003-07-24 Thread Dave Gilmore (Intrusense)
esday, July 23, 2003 3:16 PM To: Alvaro Gordon-Escobar Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: Re: Cisco Workaround I don't think you have to put all the access-list in. I believe that the hack requires a certain combination of packets to the four ports, so leaving one or two of

Re: Cisco Workaround

2003-07-24 Thread Paul Kincaid
om: DOUGLAS GULLETT <[EMAIL PROTECTED]> > Date: Wed, 23 Jul 2003 15:16:28 -0400 > Subject: Re: Cisco Workaround > X-Mailer: iPlanet Messenger Express 5.2 HotFix 1.16 (built May 14 2003) > X-Spam-Status: No, hits=-99.4 required=5.0 > tests=FROM_ENDS_IN_NUMS,KNOWN_MAILI

RE: Cisco Workaround

2003-07-24 Thread Terry Baranski
> I don't think you have to put all the access-list in. I believe > that the hack requires a certain combination of packets to the > four ports, so leaving one or two of them open should still prevent > the hack. This was an initial assumption made by many that is apparently not accurate (pe

Re: Cisco Workaround

2003-07-24 Thread bryan_khoo
Hi Alvaro, DNS is using port 53, I think you should consider unblock this port if you want your DNS to communicate with your ISP DNS. Rdgs, Bryan *** TOWARDS CUSTOMER CENTERED CULTURE *** ** Dynacraft is a QS9000 and ISO14001 certified company ** |-

Re: Cisco Workaround

2003-07-23 Thread Luis Enrique Londono
No, this ACL doesn't block any TCP nor UDP traffic. Luis Enrique Londono Security Services Coordinator Andean Region ImpSat - Original Message - From: "Alvaro Gordon-Escobar" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]> Sent: Wednesday, July 23, 2003 9:15 AM Subject:

Re: Cisco Workaround

2003-07-23 Thread DOUGLAS GULLETT
I don't think you have to put all the access-list in. I believe that the hack requires a certain combination of packets to the four ports, so leaving one or two of them open should still prevent the hack. That might be a good question for Cisco TAC...they should be willing to help even if you

RE: Cisco Workaround

2003-07-23 Thread Charlie Winckless
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 No, because you aren't blocking TCP/UDP 53 (the DNS ports) but instead the IP PROTOCOL 53. - -- Charlie > -Original Message- > From: Alvaro Gordon-Escobar [mailto:[EMAIL PROTECTED] > Sent: Wednesday, July 23, 2003 8:15 AM > To: [EMAIL PROTE

RE: Cisco Workaround

2003-07-23 Thread Todd Mitchell - lists
If you're using BIND, you can use the blackhole option. Todd -- | -Original Message- | From: Alvaro Gordon-Escobar [mailto:[EMAIL PROTECTED] | Sent: Wednesday, July 23, 2003 10:15 AM | To: [EMAIL PROTECTED]; [EMAIL PROTECTED] | Subject: Cisco Workaround | | will this access list modifi

RE: Cisco Workaround

2003-07-23 Thread Naman Latif
No. DNS uses UDP (or on some cases TCP). Protocol numbers for UDP and TCP are 17 and 6 respectively. You are denying protocols 53,55,77,103 so DNS will work as before. Regards \\ Naman > -Original Message- > From: Alvaro Gordon-Escobar [mailto:[EMAIL PROTECTED] > Sent: Wednesday, July 23,

Re: Cisco Workaround

2003-07-23 Thread jamesworld
Alvaro, No. The protocol blocked by the access-list is protocol 53 not protocol TCP or protocol UDP port 53. If you need further info, let me know, -James At 09:15 7/23/2003, Alvaro Gordon-Escobar wrote: will this access list modification prevent my internal DNS server from updates to it s