Agreed and you're not alone in the fight for credibility. It comes down to a lack of technical understanding by decision makers. Once you are able to prove where the real issue exists (no small task) then you can lean on Nessus even more.
The list you suggest would be helpful in my environment too. Thus far, we've had excellent luck with Nessus. We have identified one custom app that Nessus spiked into the dirt. This was a good thing because it showed that the developer did not follow the RFC for sockets and ultimately led to a redesign of the product. One commercial product that Nessus hammered on us is older HP Jet Direct print servers. While the damage was not permanent, it did clip a few printers until they were hard reset. The bad news is that the IT folks replaced the cards before we had a chance to figure out why they tanked. Without checking with us, they assumed that the cards went bad. Sonny Discini, Senior Network Security Engineer Department of Technology Services Enterprise Infrastructure Division Montgomery County Government -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Luke Youngblood Sent: Wednesday, March 16, 2005 9:21 AM To: [EMAIL PROTECTED] Subject: RE: Safe scans and DoS James, Excellent post. I too have been troubled by the ability of Nessus to completely bork otherwise reliable network devices. Indeed it does illustrate the lack of quality control that many network equipment vendors have. A recent experience I have had is that a Nessus scan of our DR network took down an entire DS3 Mux. Luckily this was our DR network and no traffic was currently routed through it, but the effects of over 500 simultaneous voice circuits going dead as the Mux suffered from a buffer overflow and rebooted itself would have been devastating in our production environment. Well, now I know not to scan that device any more... :-) One of the real issues I face is a loss of credibility with other departments in the company that I'm responsible for scanning. All it takes is one small outage caused by a Nessus scan and now I'm responsible and the other department is understandably paranoid about being scanned again. "What will it break this time?" is something I've heard before. Since I'm the one individual in my company that is tasked with running scans, this is definitely a hot-button issue. If you would like to volunteer to run some type of web-based database of network equipment that may be vulnerable to Nessus scans, I would applaud this effort. I would also be happy to contribute to it, and I think it would benefit a lot of us, especially the consultants on this list that use Nessus to scan many different organizations. Regards, Luke -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of James Saker Sent: Tuesday, March 15, 2005 12:46 PM To: [EMAIL PROTECTED] Subject: Safe scans and DoS I've been following the thread on nmap/udp scans, Nessus TCP scans and other issues relating to scanning causing network devices to cease functioning, and thought I'd share a Nessus safe scan experience from last Friday. After analyzing the client network (a community bank with about 25 workstations, a half dozen servers, a dozen terminal server clients, and a dozen misc. appliances, printers and network storage), I ran Nessus in safe mode. The result of the assessment: 1. A Sonicwall Pro with current firmware had its configuration blown away and had to be defaulted and have the backup loaded to recover (rebooting did not work - this behavior from a device marketed and sold as a security appliance? Good grief, Sonicwall!). 2. A Cisco 1600 router (with old IOS) link to a remote branch failed on both ends, including requiring rebooting of workstations on the remote side. Cisco's defense is that this was tired old IOS on an unmaintained device. 3. A Ricoh "Savin" network fax ceased operation and had its configuration erased. A service technician had to reload firmware and reprogram to recover. No response from Ricoh tech support, other than an amusing FAQ on "scanning" documents in response to my inquiry. Plus countless other devices ceased proper operation and required various levels of intervention to recover. Going into this, I expected a potential issue with the old Cisco IOS, though safe mode presumably should be "safe". We actually did conduct a preliminary assessment in order to avoid disrupting production services. A current load of Sonicwall and other appliances with current loads, on the other hand, is exceptionally disappointing (especially when Sonicwall has had two years to address this problem). My question is this: is it reasonable to expect LAN devices to be resistant to network scans? If so, is Nessus making any efforts to organize information regarding vendor status and compliance? I would argue that just as the bank's financial records are subject to auditor scrutiny and it wouldn't be appropriate to restrict audits for fear of discovering bad activities, network resources should survive the same level of scrutiny. Safe scans at a minimum should be passable, but realistically, intrusive scans should also be tolerated without device meltdown. DoS/DDoS are known risks that network-connected devices should be resistant to. Clearly, the lack of network device security standards has caused many vendors like Sonicwall to apparently ship inferior products without challenge. Going forward, I'm going to recommend clients not introduce network components into their network until they pass a Nessus scan in the lab. Proactive vendors reading this list may seek to independently certify their equipment and let buyers know of this status (a Nessus "compliant technologies" portion of the website would be of value). We've gone ahead and set up a lab for our clients for this testing and I'd be happy to share information about these results if others would be interested in it. Jamie _______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus _______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus _______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus
