lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <AANLkTikM3cH0KYdpHHDNuZ8L18VZsc6eRCHNWJ0c4CXp@mail.gmail.com>
Date: Fri, 2 Jul 2010 13:31:07 +0200
From: Christian Sciberras <uuf6429@...il.com>
To: "Champ Clark III [Softwink]" <champ@...twink.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: Should nmap cause a DoS on cisco routers?

> I've noticed that even if the orginazation has a
very capable security staff
> Again,  it's a environment that's 'magical' and not well
understood so once it's 'working',  don't touch anything!

If you call that "capable security staff" I'd expect you to call Windows a
"unix-like" os...

> typo in your Perl script, and your network is gone, even if the
Simple, Perl is quite difficult to maintain. If you can't maintain it and
understand it very little, *then DON'T use it*.


On Fri, Jul 2, 2010 at 12:54 PM, Champ Clark III [Softwink] <
champ@...twink.com> wrote:

> On Fri, Jul 02, 2010 at 09:45:20AM +0000, Florian Weimer wrote:
> > > On Jul 1, 2010, at 11:12 PM, Florian Weimer wrote:
> > >> And it's certainly a bug worth fixing.
> > >
> > > I doubt it's a 'bug' which can be 'fixed', just the same as sending
> > > enough legitimate HTTP requests to a Web server to bring it to its
> > > knees isn't a 'bug' which can be 'fixed', but rather a DoS which
> > > must be mitigated via a variety of mechanisms.
> >
> > I was referring to single-packet (or single-request) crashers.
> > Reputable vendors still ship devices that have those bugs in 2010.
> >
> > Chances are that Shang Tsung's nmap run triggered one of those.  As I
> > wrote, it happened before.  The nmap command line posted further
> > uptrhead does not actually cause a high pps flood.  Such level of SNMP
> > scanning is quite common in enterprise networks because some printer
> > drivers use it to locate printers, so your network devices are better
> > prepared to handle that.
>
>         One environment that I've noticed this is 'acceptable',  in the
> eyes of the network management,  is VoIP installations.   I've done
> assessments in several large scale,  production level VoIP installations
> and in many cases,  you'll run into the same potential DoS when using
> tools like nmap.   I've noticed that even if the orginazation has a
> very capable security staff,  in many cases,  they don't get to touch
> the VoIP network due to it's 'magical' properties (IMHO).   I won't
> even go into the obvious lack of security practices (no IDS/IPS,  very
> out of date systems, etc) in such networks due to the 'magic' of these
> networks.
>
>        It sometimes seems that no matter how lightly you try to
> tread,  you'll find these things.   Be it due to the lack of security
> within
> the network or a actual vendor problem.
>
>        I've seen this across the board.  Cisco,  Avaya (Nortel)
> installations down to out-of-date Asterisk based installations.
>
>        In one case,  we found a potential DoS condition with a vendors
> product.  Getting the vendor to look into it was no problem.  Getting
> the _client_ to work with the vendor on addressing the issue was a
> complete pain!  The response from the client was,  'just don't run
> any scanners (nmap included) within the network'.   Yes,  put that
> in the /etc/motd so that attackers know not to do that :)
>
>        Somehow,  I don't find that acceptable.
>
>        Again,  it's a environment that's 'magical' and not well
> understood so once it's 'working',  don't touch anything!
>
> > And even if you applied control plane protection, you still need to
> > monitor those devices from your management network.  The brittleness
> > described in this thread makes this an extremely risky endeavor: one
> > typo in your Perl script, and your network is gone, even if the
> > monitoring station never had the credentials for enable access.
> > Those bugs might not be security-relevant, but they can be very
> > annyoing nevertheless.
>
>         Couldn't agree with you more.  _When_ and _if_ they apply
> control plane protection.  I don't know what the rest of the lists
> experience is with VoIP networks,  but in many cases they seem to
> be stuck in the way-back-machine in reguards to network security.
> Not always,  but a heck of a lot.  Accidental 'DoS' conditions seem
> to pop-up a lot in these environments,  IMHO.
>
> --
>        Champ Clark III | Softwink, Inc | 800-538-9357 x 101
>                     http://www.softwink.com
>
> GPG Key ID: 58A2A58F
> Key fingerprint = 7734 2A1C 007D 581E BDF7  6AD5 0F1F 655F 58A2 A58F
> If it wasn't for C, we'd be using BASI, PASAL and OBOL.
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ