Agreed and you're not alone in the fight for credibility. It comes down
to a lack of technical understanding by decision makers. Once you are
able to prove where the real issue exists (no small task) then you can
lean on Nessus even more. 

The list you suggest would be helpful in my environment too. Thus far,
we've had excellent luck with Nessus. We have identified one custom app
that Nessus spiked into the dirt. This was a good thing because it
showed that the developer did not follow the RFC for sockets and
ultimately led to a redesign of the product. One commercial product that
Nessus hammered on us is older HP Jet Direct print servers. While the
damage was not permanent, it did clip a few printers until they were
hard reset. The bad news is that the IT folks replaced the cards before
we had a chance to figure out why they tanked. Without checking with us,
they assumed that the cards went bad.

Sonny Discini, Senior Network Security Engineer
Department of Technology Services
Enterprise Infrastructure Division
Montgomery County Government

 

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Luke Youngblood
Sent: Wednesday, March 16, 2005 9:21 AM
To: [EMAIL PROTECTED]
Subject: RE: Safe scans and DoS


James,

Excellent post.  I too have been troubled by the ability of Nessus to
completely bork otherwise reliable network devices.  Indeed it does
illustrate the lack of quality control that many network equipment
vendors have.  A recent experience I have had is that a Nessus scan of
our DR network took down an entire DS3 Mux.  Luckily this was our DR
network and no traffic was currently routed through it, but the effects
of over 500 simultaneous voice circuits going dead as the Mux suffered
from a buffer overflow and rebooted itself would have been devastating
in our production environment.  Well, now I know not to scan that device
any more... :-)

One of the real issues I face is a loss of credibility with other
departments in the company that I'm responsible for scanning.  All it
takes is one small outage caused by a Nessus scan and now I'm
responsible and the other department is understandably paranoid about
being scanned again. "What will it break this time?" is something I've
heard before.  Since I'm the one individual in my company that is tasked
with running scans, this is definitely a hot-button issue.

If you would like to volunteer to run some type of web-based database of
network equipment that may be vulnerable to Nessus scans, I would
applaud this effort.  I would also be happy to contribute to it, and I
think it would benefit a lot of us, especially the consultants on this
list that use Nessus to scan many different organizations.

Regards,

Luke

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]
On Behalf Of James Saker
Sent: Tuesday, March 15, 2005 12:46 PM
To: [EMAIL PROTECTED]
Subject: Safe scans and DoS

I've been following the thread on nmap/udp scans, Nessus TCP scans and
other issues relating to scanning causing network devices to cease
functioning, and thought I'd share a Nessus safe scan experience from
last Friday.

After analyzing the client network (a community bank with about 25
workstations, a half dozen servers, a dozen terminal server clients, and
a dozen misc. appliances, printers and network storage), I ran Nessus in
safe mode. The result of the assessment:

1. A Sonicwall Pro with current firmware had its configuration blown
away and had to be defaulted and have the backup loaded to recover
(rebooting did not work - this behavior from a device marketed and sold
as a security appliance? Good grief, Sonicwall!).

2. A Cisco 1600 router (with old IOS) link to a remote branch failed on
both ends, including requiring rebooting of workstations on the remote
side. Cisco's defense is that this was tired old IOS on an unmaintained
device.

3. A Ricoh "Savin" network fax ceased operation and had its
configuration erased. A service technician had to reload firmware and
reprogram to recover. No response from Ricoh tech support, other than an
amusing FAQ on "scanning" documents in response to my inquiry.

Plus countless other devices ceased proper operation and required
various levels of intervention to recover. Going into this, I expected a
potential issue with the old Cisco IOS, though safe mode presumably
should be "safe". We actually did conduct a preliminary assessment in
order to avoid disrupting production services. A current load of
Sonicwall and other appliances with current loads, on the other hand, is
exceptionally disappointing (especially when Sonicwall has had two years
to address this problem).

My question is this: is it reasonable to expect LAN devices to be
resistant to network scans? If so, is Nessus making any efforts to
organize information regarding vendor status and compliance?

I would argue that just as the bank's financial records are subject to
auditor scrutiny and it wouldn't be appropriate to restrict audits for
fear of discovering bad activities, network resources should survive the
same level of scrutiny. Safe scans at a minimum should be passable, but
realistically, intrusive scans should also be tolerated without device
meltdown. DoS/DDoS are known risks that network-connected devices should
be resistant to. Clearly, the lack of network device security standards
has caused many vendors like Sonicwall to apparently ship inferior
products without challenge.

Going forward, I'm going to recommend clients not introduce network
components into their network until they pass a Nessus scan in the lab.
Proactive vendors reading this list may seek to independently certify
their equipment and let buyers know of this status (a Nessus "compliant
technologies" portion of the website would be of value). We've gone
ahead and set up a lab for our clients for this testing and I'd be happy
to share information about these results if others would be interested
in it.

Jamie


_______________________________________________
Nessus mailing list
[email protected] http://mail.nessus.org/mailman/listinfo/nessus

_______________________________________________
Nessus mailing list
[email protected] http://mail.nessus.org/mailman/listinfo/nessus
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to