lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1853F6C0-695F-47D3-946C-60BDAE4CB05D@doxpara.com>
Date: Thu, 1 Jul 2010 20:01:26 -0400
From: Dan Kaminsky <dan@...para.com>
To: "Dobbins, Roland" <rdobbins@...or.net>
Cc: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Re: Should nmap cause a DoS on cisco routers?

Permanent DoS's are unacceptable even from intentionally malicious  
traffic, let alone a few nmap flags. They're unacceptable to us,  
they're unacceptable to Microsoft (see: MSRC bug bar), and even Cisco  
PSIRT has shown up on thread desiring to clean things up.

It's funny you bring up SNMP. Do you remember what happened when that  
protocol got fuzzed by the PROTOS guys in 2002?  Every network device  
on the planet pretty much exploded. I will grant you that network  
isolation is indeed best practice, but broken code is not something to  
apologize for or mitigate against.  It's something to apply real  
pressure against.  If we can't get pissed, how is that QA guy supposed  
to block shipment?

(That being said, you'll note 'it's code you just shouldn't run' is  
wrong. First thing's first, the network has to function. We route  
packets with the infrastructure we have, etc.  But products that can't  
survive nmap are likely going to have real problems with actual  
exploit tools, and RCE in routers is not something to risk, 'best  
practice mitigations' or no.)

On Jul 1, 2010, at 7:16 PM, "Dobbins, Roland" <rdobbins@...or.net>  
wrote:

>
> On Jul 1, 2010, at 11:12 PM, Florian Weimer wrote:
>
>> And it's certainly a bug worth fixing.
>
> I doubt it's a 'bug' which can be 'fixed', just the same as sending  
> enough legitimate HTTP requests to a Web server to bring it to its  
> knees isn't a 'bug' which can be 'fixed', but rather a DoS which  
> must be mitigated via a variety of mechanisms.  It would be quite  
> helpful if the original poster would detail the models/types/ 
> versions of the network devices in question, and possibly provide a  
> sample query packet.
>
> Part of the general issue here is the large disconnect between the  
> traditional security research community and the networking  
> community; with a few notable exceptions, there isn't a lot of  
> mutual discussion and understanding, and certainly no understanding  
> of network infrastructure device architectures, best current  
> practices (BCPs), and so forth.
>
> One of the most fundamental BCPs is that one must make use of  
> various network infrastructure self-protection mechanisms to keep  
> undesirable traffic away from the control and management planes of  
> said network infrastructure.  Here's a .pdf presentation which  
> discusses network infrastructure self-protection:
>
> <http://files.me.com/roland.dobbins/prguob>
>
> Firing a bunch of SNMP queries at network infrastructure devices and  
> causing network disruption as a result isn't anything new, it's a  
> well-understood phenomenon with a well-understood - in the network  
> operational community, at least - remedy via making use of the  
> appropriate self-protection mechanisms built into most modern  
> network infrastructure devices.
>
> --- 
> --------------------------------------------------------------------
> Roland Dobbins <rdobbins@...or.net> // <http://www.arbornetworks.com>
>
>    Injustice is relatively easy to bear; what stings is justice.
>
>                        -- H.L. Mencken
>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ