lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4b6ee9310805180849w23f18664me68d1ba730076211@mail.gmail.com>
Date: Sun, 18 May 2008 16:49:56 +0100
From: n3td3v <xploitable@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: [NANOG] IOS rootkits

On Sun, May 18, 2008 at 4:37 PM, Kurt Dillard <kurtdillard@....com> wrote:
> NETDOVE,
> Obviously you have no idea how a rootkit works much less how to defend
> against them, your rants make no sense.
>
> Kurt

Dude,

Gadi Evron is punching into this guy as well, check this out:

---------- Forwarded message ----------
From: Gadi Evron <ge@...uxbox.org>
Date: Sun, May 18, 2008 at 3:48 PM
Subject: Re: [NANOG] IOS rootkits
To: Dragos Ruiu <dr@....net>
Cc: topo@...esecurity.com, fx@...urity-labs.com, nanog@...it.edu,
ivan.arce@...esecurity.com


On Sun, 18 May 2008, Dragos Ruiu wrote:
>
> On 17-May-08, at 3:12 AM, Suresh Ramasubramanian wrote:
>
>> On Sat, May 17, 2008 at 12:47 PM, Matthew Moyle-Croft
>> <mmc@...ernode.com.au> wrote:
>>> If the way of running this isn't out in the wild and it's actually
>>> dangerous then a pox on anyone who releases it, especially to gain
>>> publicity at the expensive of network operators sleep and well being.
>>> May you never find a reliable route ever again.
>>
>> This needs fixing. It doesnt need publicity at security conferences
>> till after cisco gets presented this stuff first and asked to release
>> an emergency patch.
>
> Bullshit.
>
> There is nothing to patch.
>
> It needs to be presented at conferences, exactly because people will
> play ostrich and stick their heads in the sand and pretend it can't
> happen to them, and do nothing about it until someone shows them, "yes
> it can happen" and here is how....
>
> Which is exactly why we've accepted this talk. We've all known this is
> a possibility for years, but I haven't seen significant motion forward
> on this until we announced this talk. So in a fashion, this has
> already helped make people more realistic about their infrastructure
> devices. And the discussions, and idea interchange that will happen
> between the smart folks at the conference will undoubtedly usher forth
> other related issues and creative solutions.  Problems don't get fixed
> until you talk about them.

Dragus, while I hold full disclosure very close and it is dear to my
heart, I admit the fact that it can be harmful. Let me link that to
network operations.

People forget history. A few years back I had a chat with Aleph1 on the
first days of bugtraq. He reminded me how things are not always black and
white.

Full disclosure, while preferable in my ideology, is not the best solution
for all. One of the reasons bugtraq was created is because vendors did not
care about security, not to mention have a capability to handle security
issues, or avoid them to begin with.

Full disclosure made a lot of progress for us, and while still a useful
tool, with some vendors it has become far more useful to report to them
and let them provide with a solution first.

In the case of routers which are used for infrastructure as well as
critical infrastructure, it is my strong belief that full disclosure is,
at least at face value, a bad idea.

I'd like to think Cisco, which has shown capability in the past, is as
responsible as it should be on these issues. Experience tells me they have
a ways to go yet even if they do have good processes in place with good
people to employ them.

I'd also like to think tier-1 and tier-2 providers get patches first
before such releases. This used to somewhat be the case, last I checked it
no longer is -- for legitimate concerns by Cisco. has this changed?

So, if we don't patch the infrastructure up first, and clients don't know
of problems until they are public "for their own security" (an argument
that holds water only so much) perhaps it is the time for full disclosure
to be considered a viable alternative.

All that aside, this is a rootkit, not a vulnerability. There is no
inherent vulnerability to patch (unless it is very local). There is the
vulnerability of operators who don't so far even consider trojan horses
as a threat, and the fact tools don't exist for them to do something once
they do.

       Gadi.




 > cheers,
> --dr
>
>
>
> --
> World Security Pros. Cutting Edge Training, Tools, and Techniques
> London, U.K.   May 21/22 - 2008    http://cansecwest.com
> pgpkey http://dragos.com/ kyxpgp

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ