111r11111elod
-----Original Message-----
From: [email protected]
Sent:  2010-04-27, 17:11 
To: [email protected]
Subject: CCIE_Security Digest, Vol 46, Issue 136


Send CCIE_Security mailing list submissions to
        [email protected]

To subscribe or unsubscribe via the World Wide Web, visit
        http://onlinestudylist.com/mailman/listinfo/ccie_security
or, via email, send a message with subject or body 'help' to
        [email protected]

You can reach the person managing the list at
        [email protected]

When replying, please edit your Subject line so it is more specific
than "Re: Contents of CCIE_Security digest..."


Today's Topics:

   1. Re: Accounting for attackers packet (Pieter-Jan Nefkens)
   2. Re: problem pinging thru asa from DMZ in WB2      Lab 12.
      (Willians Barboza)
   3. Re: problem pinging thru asa from DMZ in WB2      Lab 12.
      (Willians Barboza)
   4. Re: problem pinging thru asa from DMZ in WB2      Lab 12. (Tyson Scott)
   5. Re: RFC 2827/3704 (Tyson Scott)


----------------------------------------------------------------------

Message: 1
Date: Tue, 27 Apr 2010 13:09:32 +0200
From: Pieter-Jan Nefkens <[email protected]>
Subject: Re: [OSL | CCIE_Security] Accounting for attackers packet
To: Kingsley Charles <[email protected]>
Cc: OSL Security <[email protected]>
Message-ID: <[email protected]>
Content-Type: text/plain; charset="us-ascii"

Hi Kings,

To which route-map / interface do you have the access-list attached?  The 
outbound interface from where the attacker originates? And if so, is the 
access-list attached outbound?

Bear in mind, that if the null0 interface sends unreachable packets, they will 
get routed normally and thus the access-list should be set on an outbound flow.

Have you read the blackhole pdf at cisco.com? 
It's available at: 
http://www.cisco.com/web/about/security/intelligence/blackhole.pdf

HTH

Pieter-Jan
On 27 apr 2010, at 09:03, Kingsley Charles wrote:

> Hi all
>  
> With RTBH, if I need check for the number of packets that is from the 
> attacker. I configure the following:
>  
> access-list 123 permit icmp any any unreachables log
> access-list 123 permit ip any any
>  
> logging on
> logging host or buffered
>  
>  
> The null 0 interface is not configured for "no ip unreachables".
>  
>  
> The access-list is associated to interfaces of the edge router running BGP 
> that gets the incoming traffic from the attacker.
>  
> But I don't see the unreachables matching the ACL. The counter is "0".
>  
> Any  idea?
>  
>  
> With regards
> Kings
> _______________________________________________
> For more information regarding industry leading CCIE Lab training, please 
> visit www.ipexpert.com

---
Nefkens Advies
Enk 26
4214 DD Vuren
The Netherlands

Tel: +31 183 634730
Fax: +31 183 690113
Cell: +31 654 323221
Email: [email protected]
Web: http://www.nefkensadvies.nl/

 Think before you print.




-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
http://onlinestudylist.com/pipermail/ccie_security/attachments/20100427/f041992c/attachment-0001.htm
 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: green.gif
Type: image/gif
Size: 87 bytes
Desc: not available
Url : 
http://onlinestudylist.com/pipermail/ccie_security/attachments/20100427/f041992c/attachment-0001.gif
 

------------------------------

Message: 2
Date: Tue, 27 Apr 2010 08:46:56 -0400
From: Willians Barboza <[email protected]>
Subject: Re: [OSL | CCIE_Security] problem pinging thru asa from DMZ
        in WB2  Lab 12.
To: Jimmy Larsson <[email protected]>
Cc: OSL Security <[email protected]>
Message-ID:
        <[email protected]>
Content-Type: text/plain; charset=ISO-8859-1

Did you allow the return of echo-replies on the outside interface? Or
did you put the ICMP as an inspected protocol on the global inspection
rule?

2010/4/27 Jimmy Larsson <[email protected]>:
> What am I doing wrong here? Working with WB 2 lab 12, trying to ping
> 6.6.4.32 (BB2) from R9 (on ASA DMZ) without success.
> Error message in ASA:
> %ASA-3-106014: Deny inbound icmp src DMZ:10.17.17.9 dst outside:6.6.4.32
> (type 8, code 0)
> %ASA-3-106014: Deny inbound icmp src DMZ:10.17.17.9 dst outside:6.6.4.32
> (type 8, code 0)
> %ASA-3-106014: Deny inbound icmp src DMZ:10.17.17.9 dst outside:6.6.4.32
> (type 8, code 0)
>
> There is a translation:
> ASA(config)# sh run static | incl DMZ
> static (DMZ,outside) 6.6.146.9 10.17.17.9 netmask 255.255.255.255
> There is a hole in acl:
> ASA(config)# sh run access-group
> access-group OUTSIDE in interface outside
> access-group DMZ in interface DMZ
> ASA(config)# sh run access-list DMZ
> access-list DMZ extended permit udp host 10.17.17.9 host 6.6.99.1 eq ntp
> access-list DMZ extended permit icmp any any echo
> There is an inspect for icmp:
> ASA(config)# sh service-policy global ?| incl icmp
> ?? ? ?Inspect: icmp, packet 0, drop 0, reset-drop 0
>
> This is what packet-tracer say:
> ASA(config)# packet-tracer input DMZ icmp 10.17.17.9 8 0 6.6.4.32 detailed
> Phase: 1
> Type: ACCESS-LIST
> Subtype:
> Result: ALLOW
> Config:
> Implicit Rule
> %ASA-3-106014: Deny inbound icmp src DMZ:10.17.17.9 dst outside:6.6.4.32
> (type 8, code 0)
> Additional Information:
> ?Forward Flow based lookup yields rule:
> ?in ?id=0xd7c6a3d8, priority=1, domain=permit, deny=false
> ?? ? ? ?hits=2640, user_data=0x0, cs_id=0x0, l3_type=0x8
> ?? ? ? ?src mac=0000.0000.0000, mask=0000.0000.0000
> ?? ? ? ?dst mac=0000.0000.0000, mask=0000.0000.0000
> Phase: 2
> Type: FLOW-LOOKUP
> Subtype:
> Result: ALLOW
> Config:
> Additional Information:
> Found no matching flow, creating a new flow
> Phase: 3
> Type: ROUTE-LOOKUP
> Subtype: input
> Result: ALLOW
> Config:
> Additional Information:
> in ? 6.6.4.0 ? ? ? ? 255.255.255.0 ? outside
> Phase: 4
> Type: ACCESS-LIST
> Subtype:
> Result: DROP
> Config:
> Implicit Rule
> Additional Information:
> ?Forward Flow based lookup yields rule:
> ?in ?id=0xd7c6aa98, priority=110, domain=permit, deny=true
> ?? ? ? ?hits=31, user_data=0x0, cs_id=0x0, flags=0x3000, protocol=0
> ?? ? ? ?src ip=0.0.0.0, mask=0.0.0.0, port=0
> ?? ? ? ?dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
> Result:
> input-interface: DMZ
> input-status: up
> input-line-status: up
> output-interface: outside
> output-status: up
> output-line-status: up
> Action: drop
> Drop-reason: (acl-drop) Flow is denied by configured rule
>
> ASA(config)#
>
> Anyone?
> Br Jimmy
>
>
> --
> -------
> Jimmy Larsson
> Ryavagen 173
> s-26030 Vallakra
> Sweden
> http://blogg.kvistofta.nu
> -------
>
> _______________________________________________
> For more information regarding industry leading CCIE Lab training, please
> visit www.ipexpert.com
>
>



-- 
Willians Barboza
CCIE Security # 25629


------------------------------

Message: 3
Date: Tue, 27 Apr 2010 08:48:19 -0400
From: Willians Barboza <[email protected]>
Subject: Re: [OSL | CCIE_Security] problem pinging thru asa from DMZ
        in WB2  Lab 12.
To: Jimmy Larsson <[email protected]>
Cc: OSL Security <[email protected]>
Message-ID:
        <[email protected]>
Content-Type: text/plain; charset=ISO-8859-1

Also, what are the security levels in each interface?

2010/4/27 Willians Barboza <[email protected]>:
> Did you allow the return of echo-replies on the outside interface? Or
> did you put the ICMP as an inspected protocol on the global inspection
> rule?
>
> 2010/4/27 Jimmy Larsson <[email protected]>:
>> What am I doing wrong here? Working with WB 2 lab 12, trying to ping
>> 6.6.4.32 (BB2) from R9 (on ASA DMZ) without success.
>> Error message in ASA:
>> %ASA-3-106014: Deny inbound icmp src DMZ:10.17.17.9 dst outside:6.6.4.32
>> (type 8, code 0)
>> %ASA-3-106014: Deny inbound icmp src DMZ:10.17.17.9 dst outside:6.6.4.32
>> (type 8, code 0)
>> %ASA-3-106014: Deny inbound icmp src DMZ:10.17.17.9 dst outside:6.6.4.32
>> (type 8, code 0)
>>
>> There is a translation:
>> ASA(config)# sh run static | incl DMZ
>> static (DMZ,outside) 6.6.146.9 10.17.17.9 netmask 255.255.255.255
>> There is a hole in acl:
>> ASA(config)# sh run access-group
>> access-group OUTSIDE in interface outside
>> access-group DMZ in interface DMZ
>> ASA(config)# sh run access-list DMZ
>> access-list DMZ extended permit udp host 10.17.17.9 host 6.6.99.1 eq ntp
>> access-list DMZ extended permit icmp any any echo
>> There is an inspect for icmp:
>> ASA(config)# sh service-policy global ?| incl icmp
>> ?? ? ?Inspect: icmp, packet 0, drop 0, reset-drop 0
>>
>> This is what packet-tracer say:
>> ASA(config)# packet-tracer input DMZ icmp 10.17.17.9 8 0 6.6.4.32 detailed
>> Phase: 1
>> Type: ACCESS-LIST
>> Subtype:
>> Result: ALLOW
>> Config:
>> Implicit Rule
>> %ASA-3-106014: Deny inbound icmp src DMZ:10.17.17.9 dst outside:6.6.4.32
>> (type 8, code 0)
>> Additional Information:
>> ?Forward Flow based lookup yields rule:
>> ?in ?id=0xd7c6a3d8, priority=1, domain=permit, deny=false
>> ?? ? ? ?hits=2640, user_data=0x0, cs_id=0x0, l3_type=0x8
>> ?? ? ? ?src mac=0000.0000.0000, mask=0000.0000.0000
>> ?? ? ? ?dst mac=0000.0000.0000, mask=0000.0000.0000
>> Phase: 2
>> Type: FLOW-LOOKUP
>> Subtype:
>> Result: ALLOW
>> Config:
>> Additional Information:
>> Found no matching flow, creating a new flow
>> Phase: 3
>> Type: ROUTE-LOOKUP
>> Subtype: input
>> Result: ALLOW
>> Config:
>> Additional Information:
>> in ? 6.6.4.0 ? ? ? ? 255.255.255.0 ? outside
>> Phase: 4
>> Type: ACCESS-LIST
>> Subtype:
>> Result: DROP
>> Config:
>> Implicit Rule
>> Additional Information:
>> ?Forward Flow based lookup yields rule:
>> ?in ?id=0xd7c6aa98, priority=110, domain=permit, deny=true
>> ?? ? ? ?hits=31, user_data=0x0, cs_id=0x0, flags=0x3000, protocol=0
>> ?? ? ? ?src ip=0.0.0.0, mask=0.0.0.0, port=0
>> ?? ? ? ?dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
>> Result:
>> input-interface: DMZ
>> input-status: up
>> input-line-status: up
>> output-interface: outside
>> output-status: up
>> output-line-status: up
>> Action: drop
>> Drop-reason: (acl-drop) Flow is denied by configured rule
>>
>> ASA(config)#
>>
>> Anyone?
>> Br Jimmy
>>
>>
>> --
>> -------
>> Jimmy Larsson
>> Ryavagen 173
>> s-26030 Vallakra
>> Sweden
>> http://blogg.kvistofta.nu
>> -------
>>
>> _______________________________________________
>> For more information regarding industry leading CCIE Lab training, please
>> visit www.ipexpert.com
>>
>>
>
>
>
> --
> Willians Barboza
> CCIE Security # 25629
>



-- 
Willians Barboza
CCIE Security # 25629


------------------------------

Message: 4
Date: Tue, 27 Apr 2010 11:07:49 -0400
From: "Tyson Scott" <[email protected]>
Subject: Re: [OSL | CCIE_Security] problem pinging thru asa from DMZ
        in WB2  Lab 12.
To: "'Willians Barboza'" <[email protected]>,  "'Jimmy
        Larsson'" <[email protected]>
Cc: 'OSL Security' <[email protected]>
Message-ID: <004e01cae61b$67f845f0$37e8d1...@com>
Content-Type: text/plain;       charset="iso-8859-1"

Default security levels are 0 for both unless you changed it.  If so you
need to allow
same-security-traffic permit inter-interface

Regards,
?
Tyson Scott - CCIE #13513 R&S, Security, and SP
Technical Instructor - IPexpert, Inc.
Mailto: [email protected]
Telephone: +1.810.326.1444, ext. 208
Live Assistance, Please visit: www.ipexpert.com/chat
eFax: +1.810.454.0130

IPexpert is a premier provider of Self-Study Workbooks, Video on Demand,
Audio Tools, Online Hardware Rental and Classroom Training for the Cisco
CCIE (R&S, Voice, Security & Service Provider) certification(s) with
training locations throughout the United States, Europe, South Asia and
Australia. Be sure to visit our online communities at
www.ipexpert.com/communities and our public website at www.ipexpert.com

-----Original Message-----
From: [email protected]
[mailto:[email protected]] On Behalf Of Willians
Barboza
Sent: Tuesday, April 27, 2010 8:48 AM
To: Jimmy Larsson
Cc: OSL Security
Subject: Re: [OSL | CCIE_Security] problem pinging thru asa from DMZ in WB2
Lab 12.

Also, what are the security levels in each interface?

2010/4/27 Willians Barboza <[email protected]>:
> Did you allow the return of echo-replies on the outside interface? Or
> did you put the ICMP as an inspected protocol on the global inspection
> rule?
>
> 2010/4/27 Jimmy Larsson <[email protected]>:
>> What am I doing wrong here? Working with WB 2 lab 12, trying to ping
>> 6.6.4.32 (BB2) from R9 (on ASA DMZ) without success.
>> Error message in ASA:
>> %ASA-3-106014: Deny inbound icmp src DMZ:10.17.17.9 dst outside:6.6.4.32
>> (type 8, code 0)
>> %ASA-3-106014: Deny inbound icmp src DMZ:10.17.17.9 dst outside:6.6.4.32
>> (type 8, code 0)
>> %ASA-3-106014: Deny inbound icmp src DMZ:10.17.17.9 dst outside:6.6.4.32
>> (type 8, code 0)
>>
>> There is a translation:
>> ASA(config)# sh run static | incl DMZ
>> static (DMZ,outside) 6.6.146.9 10.17.17.9 netmask 255.255.255.255
>> There is a hole in acl:
>> ASA(config)# sh run access-group
>> access-group OUTSIDE in interface outside
>> access-group DMZ in interface DMZ
>> ASA(config)# sh run access-list DMZ
>> access-list DMZ extended permit udp host 10.17.17.9 host 6.6.99.1 eq ntp
>> access-list DMZ extended permit icmp any any echo
>> There is an inspect for icmp:
>> ASA(config)# sh service-policy global ?| incl icmp
>> ?? ? ?Inspect: icmp, packet 0, drop 0, reset-drop 0
>>
>> This is what packet-tracer say:
>> ASA(config)# packet-tracer input DMZ icmp 10.17.17.9 8 0 6.6.4.32
detailed
>> Phase: 1
>> Type: ACCESS-LIST
>> Subtype:
>> Result: ALLOW
>> Config:
>> Implicit Rule
>> %ASA-3-106014: Deny inbound icmp src DMZ:10.17.17.9 dst outside:6.6.4.32
>> (type 8, code 0)
>> Additional Information:
>> ?Forward Flow based lookup yields rule:
>> ?in ?id=0xd7c6a3d8, priority=1, domain=permit, deny=false
>> ?? ? ? ?hits=2640, user_data=0x0, cs_id=0x0, l3_type=0x8
>> ?? ? ? ?src mac=0000.0000.0000, mask=0000.0000.0000
>> ?? ? ? ?dst mac=0000.0000.0000, mask=0000.0000.0000
>> Phase: 2
>> Type: FLOW-LOOKUP
>> Subtype:
>> Result: ALLOW
>> Config:
>> Additional Information:
>> Found no matching flow, creating a new flow
>> Phase: 3
>> Type: ROUTE-LOOKUP
>> Subtype: input
>> Result: ALLOW
>> Config:
>> Additional Information:
>> in ? 6.6.4.0 ? ? ? ? 255.255.255.0 ? outside
>> Phase: 4
>> Type: ACCESS-LIST
>> Subtype:
>> Result: DROP
>> Config:
>> Implicit Rule
>> Additional Information:
>> ?Forward Flow based lookup yields rule:
>> ?in ?id=0xd7c6aa98, priority=110, domain=permit, deny=true
>> ?? ? ? ?hits=31, user_data=0x0, cs_id=0x0, flags=0x3000, protocol=0
>> ?? ? ? ?src ip=0.0.0.0, mask=0.0.0.0, port=0
>> ?? ? ? ?dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
>> Result:
>> input-interface: DMZ
>> input-status: up
>> input-line-status: up
>> output-interface: outside
>> output-status: up
>> output-line-status: up
>> Action: drop
>> Drop-reason: (acl-drop) Flow is denied by configured rule
>>
>> ASA(config)#
>>
>> Anyone?
>> Br Jimmy
>>
>>
>> --
>> -------
>> Jimmy Larsson
>> Ryavagen 173
>> s-26030 Vallakra
>> Sweden
>> http://blogg.kvistofta.nu
>> -------
>>
>> _______________________________________________
>> For more information regarding industry leading CCIE Lab training, please
>> visit www.ipexpert.com
>>
>>
>
>
>
> --
> Willians Barboza
> CCIE Security # 25629
>



-- 
Willians Barboza
CCIE Security # 25629
_______________________________________________
For more information regarding industry leading CCIE Lab training, please
visit www.ipexpert.com



------------------------------

Message: 5
Date: Tue, 27 Apr 2010 11:11:11 -0400
From: "Tyson Scott" <[email protected]>
Subject: Re: [OSL | CCIE_Security] RFC 2827/3704
To: "'Kingsley Charles'" <[email protected]>,  "'Brandon
        Carroll'" <[email protected]>
Cc: [email protected]
Message-ID: <004f01cae61b$e0096ce0$a01c46...@com>
Content-Type: text/plain; charset="us-ascii"

RFC 2827 is geared towards ISP's but in the RFC it specifically mentions
Enterprise administrators so that is why it is on the Security Test.

 

Regards,

 

Tyson Scott - CCIE #13513 R&S, Security, and SP

Technical Instructor - IPexpert, Inc.

Mailto:  <mailto:[email protected]> [email protected]

Telephone: +1.810.326.1444, ext. 208

Live Assistance, Please visit:  <http://www.ipexpert.com/chat>
www.ipexpert.com/chat

eFax: +1.810.454.0130

 

IPexpert is a premier provider of Self-Study Workbooks, Video on Demand,
Audio Tools, Online Hardware Rental and Classroom Training for the Cisco
CCIE (R&S, Voice, Security & Service Provider) certification(s) with
training locations throughout the United States, Europe, South Asia and
Australia. Be sure to visit our online communities at
<http://www.ipexpert.com/communities> www.ipexpert.com/communities and our
public website at  <http://www.ipexpert.com/> www.ipexpert.com

 

From: [email protected]
[mailto:[email protected]] On Behalf Of Kingsley
Charles
Sent: Tuesday, April 27, 2010 4:48 AM
To: Brandon Carroll
Cc: [email protected]
Subject: Re: [OSL | CCIE_Security] RFC 2827/3704

 

Hi Brandon

 

RFC 2827 is specifically meant for ISP ingress filtering right?. It means
more to ISP filtering unwanted source addresses from it's customers. 

 

Ref - http://www.ietf.org/rfc/rfc3704.txt

 

access-list 123 deny ip 0.0.0.0 0.0.0.255 any

access-list 123 deny ip 10.0.0.0 0.255.255.255 any

access-list 123 deny ip 127.0.0.0 0.255.255.255 any
access-list 123 deny ip 172.16.0.0 0.15.255.255 any
access-list 123 deny ip 192.168.0.0 0.0.255.255 any

access-list 123 deny ip 224.0.0.0 15.255.255 any

access-list 123 deny ip 240.0.0.0 15.255.255 any
access-list 123 deny ip host 255.255.255.255 any
access-list 123 deny ip host 0.0.0.0 any

access-list 123 permit ip any any

 

Added two more entries for 0.0.0.0 and 255.255.255.255

 

If it is implemented for the customer permiter router to block source
addresses from the internet, then you need to add one more entry that blocks
source addresses of your internal network. But since, the internal address
will be from RFC 1918, the above should take care. If you use public
addresses in your  network, then we may need to add an entry.

 

 

Please let me know, your thoughts.

 

 

With regards

Kings

 



 

On Mon, Apr 26, 2010 at 8:26 PM, Brandon Carroll <[email protected]>
wrote:

The RFC states that you want to filter traffic that contains source address
not legitimately in use by the customer network. 

 

Generally that would include  0.0.0.0/8,10.0.0.0/8,127.0.0.0/8,
172.16.0.0/12, 192.168.0.0/16, 224.0.0.0/4,and 240.0.0.0/4, but it's not
limited to these addresses. You should also include the address space in use
by the internal network. This makes sense since the address space used
internally should not be seen as the source in packets from the outside. 

 

As RFC 3704 states, on possible solution for this would be uRPF. If you use
uRPF you dont need to worry as much about the addresses that you use. If you
use ACLs on ingress you do. The reason you've probably seen differences in
the ACLs probably relates to the networks used in the examples.

 

Regards,

 

Brandon Carroll - CCIE #23837

Senior Technical Instructor - IPexpert

Mailto: [email protected]

Telephone: +1.810.326.1444

Live Assistance, Please visit: www.ipexpert.com/chat

eFax: +1.810.454.0130

 

IPexpert is a premier provider of Self-Study Workbooks, Video on Demand,
Audio Tools, Online Hardware Rental and Classroom Training for the Cisco
CCIE (R&S, Voice, Security & Service Provider) certification(s) with
training locations throughout the United States, Europe, South Asia and
Australia. Be sure to visit our online communities at
www.ipexpert.com/communities and our public website at www.ipexpert.com
<http://www.ipexpert.com/> 

 

Platinum Solutions Group (PSG) provides high-end consulting services with a
primary emphasis on Cisco's Data Center Solutions, Service Provider
Solutions, Unified Communications and Security-enabled infrastructures. Be
sure to visit www.platinumsolutionsgroup.com
<http://www.platinumsolutionsgroup.com/> . 

 

 

On Apr 26, 2010, at 6:36 AM, Kingsley Charles wrote:

 

Hi all

 

Can someone please let me know, the addresses for RFC 2827/3704 that should
be followed. I see differences, in the way they 

are implemented in various sites. 

 

The RFCs also does not mention specific addresses for RFC 2827/3704 as it
does for RFC 1918/3330.

 

 

With regards

Kings

_______________________________________________
For more information regarding industry leading CCIE Lab training, please
visit www.ipexpert.com <http://www.ipexpert.com/> 

 

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
http://onlinestudylist.com/pipermail/ccie_security/attachments/20100427/753f829f/attachment.htm
 

End of CCIE_Security Digest, Vol 46, Issue 136
**********************************************

_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to