Hello Pieter-Jan!
        Fair enough I think the next thing I would want is packet
capture of an HCP:// conversation to look inside the packets and see if
the Application engines for ZBFW and CBAC would be able to process them.
Studying some IOS-XR right now, but I may try later to get some....

Thanks!
Dave


-----Original Message-----
From: [email protected]
[mailto:[email protected]] On Behalf Of
Pieter-Jan Nefkens
Sent: Wednesday, June 16, 2010 12:39 PM
To: OSL Security
Subject: Re: [OSL | CCIE_Security] Security related, but not completely
CCIE

Hi David,

I agree, an IPS is the most preferred way to go, but what would you do
when you don't have an IPS at your hand, for example a remote site with
an asa5505 or a ios ISR router that does all the jobs?

Then FPM would be an option, but how would that go performance wise?
What about NBAR or ZBFW?

Pieter-Jan
On 16 jun 2010, at 18:21, Mack, David A (Dave) wrote:

> Hmm, 
>       I think that IPS would be my first choice since that is what the
IPS 
> is made to do and there is a signature for it already... But for fun I

> took a swag at a FPM config:
> 
> load protocol system:fpm/phdf/ip.phdf
> load protocol system:fpm/phdf/tcp.phdf !
> ip tcp synwait-time 5
> !
> class-map type stack match-all CM:IP:TCP match field IP protocol eq 
> 0x6 next TCP class-map type access-control match-all 
> CM:TCP:HCP:8080:SRC match field TCP source-port eq 8080 match start 
> TCP payload-start offset 0 size 256 regex "hcp://"
> class-map type access-control match-all CM:TCP:HCP:8080:DST match 
> field TCP dest-port eq 8080 match start TCP payload-start offset 0 
> size 256 regex "hcp://"
> class-map type access-control match-all CM:TCP:HCP:80:SRC match field 
> TCP source-port eq 80 match start TCP payload-start offset 0 size 256 
> regex "hcp://"
> class-map type access-control match-all CM:TCP:HCP:80:DST match field 
> TCP dest-port eq 80 match start TCP payload-start offset 0 size 256 
> regex "hcp://"
> class-map type access-control match-all CM:TCP:HCP:443:DST match field

> TCP dest-port eq 443 match start TCP payload-start offset 0 size 256 
> regex "hcp://"
> class-map type access-control match-all CM:TCP:HCP:443:SRC match field

> TCP source-port eq 443 match start TCP payload-start offset 0 size 256

> regex "hcp://"
> !
> !
> policy-map type access-control PM:TCP:HCP class CM:TCP:HCP:80:SRC
>   drop
> class CM:TCP:HCP:80:DST
>   drop
> class CM:TCP:HCP:8080:SRC
>   drop
> class CM:TCP:HCP:8080:DST
>   drop
> class CM:TCP:HCP:443:SRC
>   drop
> class CM:TCP:HCP:443:DST
>   drop
> policy-map type access-control PM:HCP
> class CM:IP:TCP
>  service-policy PM:TCP:HCP
> !
> 
> You could apply this policy inbound or outbound where you need it.
> 
> FWIW,
> Dave
> 
> -----Original Message-----
> From: [email protected]
> [mailto:[email protected]] On Behalf Of 
> Pieter-Jan Nefkens
> Sent: Wednesday, June 16, 2010 11:56 AM
> To: OSL Security
> Subject: [OSL | CCIE_Security] Security related, but not completely 
> CCIE
> 
> Hello List,
> 
> Perhaps you're already aware of it, but perhaps not,if you've been too

> much in de workbooks lately ;-)
> 
> Recently, a day-zero vulnerability has been found in the help & 
> support system of both Windows XP and Windows 2003.
> Sophos has found that an exploit has been active on an open source 
> project, but it has been removed from that site.
> However, it is expected that the exploit will be on other websites as 
> well.
> 
> So, this appears to be a genuine day-zero attack / exploit.
> You can find information at the following sites:
> 
> Sophos blog entry: http://www.sophos.com/blogs/sophoslabs/?p=10045
> Cisco Security alert:
> http://tools.cisco.com/security/center/viewAlert.x?alertId=20691
> CVE Reference:
> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1885
> Microsoft article:
> http://www.microsoft.com/technet/security/advisory/2219475.mspx
> 
> So, that is the information sharing. 
> Now, let's get down to the mitigation of this vulnerability and get a 
> discussion (perhaps?) on alternative solutions According to the 
> technical details, the vulnerability exists in the parsing of an hcp 
> malformed url, so the obvious workaround is basically:
> disable hcp protocol (which is what microsoft recommends).
> The disadvantage is that local help systems that use hcp:// won't work

> as well, until Microsoft releases a patch..
> 
> Now, that's a good thing to start with, but how could we solve this, 
> on the network edge level, so that our users can still access the
help.
> Cisco has already released a signature definition file S495, which 
> contains signature 26599.
> If you look at the signature definition, it scans the web service 
> ports for an hcp:// url regex.
> 
> So, how could be use that information to prevent the exploit to occur,

> and do it at the edge (preventing network attacks).
> Since it's a regex, my guess would be, that on an ASA, create a regex 
> matching the hcp:// prefix (either the complete regex, or just the 
> hcp:// prefix) and apply that to the http inspection engine and drop 
> any matches. That should give you a bit more security. It still won't 
> do the encrypted inspection traffic (like ssl traffic), but that's 
> something the IPS doesn't do as well.
> 
> Now, how would one do that on the IOS side? there are too many options

> to name, ZBFW, CBAC perhaps, control plane protection on the transit 
> plane, NBAR, FPM? What would be your guess to do, also with 
> real-life-performance in the back of your mind..
> 
> I know. it's different from the workbooks, but it is real life and the

> things we learn in the workbooks and prepping at CCIE level should 
> give you the edge to think about these attacks and might get you start

> thinking to see how to prevent it..
> 
> Kind regards
> Pieter-Jan
> 
> ---
> Nefkens Advies
> Enk 26
> 4214 DD Vuren
> The Netherlands
> 
> Tel: +31 183 634730
> Fax: +31 183 690113
> Cell: +31 654 323221
> Email: [email protected]
> Web: http://www.nefkensadvies.nl/
> 

---
Nefkens Advies
Enk 26
4214 DD Vuren
The Netherlands

Tel: +31 183 634730
Fax: +31 183 690113
Cell: +31 654 323221
Email: [email protected]
Web: http://www.nefkensadvies.nl/

_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to