Re: Any Gmail Admins on here?

2018-10-25 Thread Kendrick Eastes
As has been pointed out on the outages ML repeatedly.

On October 25, 2018 10:23:25 AM PDT, Harald Koch  wrote:
>chilli.nosignal.org has an SSL certificate that expired in *July*.
>
>-- 
>Harald
>
>
>On Thu, 25 Oct 2018 at 12:48, Mike Hammett  wrote:
>
>> https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop
>>
>>
>>
>> -
>> Mike Hammett
>> Intelligent Computing Solutions 
>> 
>> 
>> 
>> 
>> Midwest Internet Exchange 
>> 
>> 
>> 
>> The Brothers WISP 
>> 
>> 
>> --
>> *From: *"Art Plato" 
>> *To: *"nanog" 
>> *Sent: *Thursday, October 25, 2018 11:39:36 AM
>> *Subject: *Any Gmail Admins on here?
>>
>> I apologize for putting this out in this forum but I have attempted
>to
>> reach Google/Gmail for several weeks with no response. Their servers
>have
>> flagged my domain with bad reputation even thought he stats say no
>spam has
>> been sent from my domain for the past several months that I can see.
>Please
>> PM me if you are out there.
>>
>> Thanks,
>> Art Plato
>>
>>
>>

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.

Re: HTTPS redirects to HTTP for monitoring

2015-01-18 Thread kendrick eastes
On Sun, Jan 18, 2015 at 5:29 AM, Grant Ridder shortdudey...@gmail.com
wrote:

 Hi Everyone,

 I wanted to see what opinions and thoughts were out there.  What software,
 appliances, or services are being used to monitor web traffic for
 inappropriate content on the SSL side of things?  personal use?
 enterprise enterprise?

 It looks like Websense might do decryption (
 http://community.websense.com/forums/t/3146.aspx) while Covenant Eyes does
 some sort of session hijack to redirect to non-ssl (atleast for Google) (
 https://twitter.com/CovenantEyes/status/451382865914105856).

 Thoughts on having a product that decrypts SSL traffic internally vs one
 that doesn't allow SSL to start with?

 -Grant



Admittedly I've only been on the user side of things for this, but IMO for
cases like this MITM  striping. if your users need to access anything
outside your intranet (google apps comes to mind right away, any kind of
outsourced web-based training, etc) that requires SSL to function would be
broken by stripping, but with MITMing the connection and having your
internal certs set up properly, it won't even blip.

that being said, squid can be configured to transparently decrypt and
reencrypt the session. (http://wiki.squid-cache.org/Features/SslBump)


Re: Cisco Security Advisory: Cisco IOS Software SSL VPN Denial of Service Vulnerability

2014-03-27 Thread kendrick eastes
The Full-disclosure mailing list was recently... retired, I guess cisco
thought NANOG was the next best place.


On Wed, Mar 26, 2014 at 10:45 AM, rw...@ropeguru.com rw...@ropeguru.comwrote:


 Is this normal for the list to diretly get Cisco security advisories or
 something new. First time I have seen these.

 Robert


 On Wed, 26 Mar 2014 12:10:00 -0400
  Cisco Systems Product Security Incident Response Team ps...@cisco.com
 wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Cisco IOS Software SSL VPN Denial of Service Vulnerability

 Advisory ID: cisco-sa-20140326-ios-sslvpn

 Revision 1.0

 For Public Release 2014 March 26 16:00  UTC (GMT)

 Summary
 ===

 A vulnerability in the Secure Sockets Layer (SSL) VPN subsystem of Cisco
 IOS Software could allow an unauthenticated, remote attacker to cause a
 denial of service (DoS) condition.

 The vulnerability is due to a failure to process certain types of HTTP
 requests. To exploit the vulnerability, an attacker could submit crafted
 requests designed to consume memory to an affected device. An exploit could
 allow the attacker to consume and fragment memory on the affected device.
 This may cause reduced performance, a failure of certain processes, or a
 restart of the affected device.

 Cisco has released free software updates that address this vulnerability.
 There are no workarounds to mitigate this vulnerability.

 This advisory is available at the following link:
 http://tools.cisco.com/security/center/content/
 CiscoSecurityAdvisory/cisco-sa-20140326-ios-sslvpn

 Note: The March 26, 2014, Cisco IOS Software Security Advisory bundled
 publication includes six Cisco Security Advisories. All advisories address
 vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security
 Advisory lists the Cisco IOS Software releases that correct the
 vulnerability or vulnerabilities detailed in the advisory as well as the
 Cisco IOS Software releases that correct all Cisco IOS Software
 vulnerabilities in the March 2014 bundled publication.

 Individual publication links are in Cisco Event Response: Semiannual
 Cisco IOS Software Security Advisory Bundled Publication at the following
 link:

 http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html
 -BEGIN PGP SIGNATURE-
 Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
 Comment: GPGTools - http://gpgtools.org

 iQIcBAEBAgAGBQJTMeUtAAoJEIpI1I6i1Mx3BJ4P/Aytcbvaue49DkNDq0G+3C8+
 mv2W8/1HeqSvrmbc8QUJrelPA1kfYXGSf+7VX9lpwTdKKPrMPpkso1WXA7tK2t5i
 uiaqy8+KON/V3uFTjLhSBxZsMmSYws/uO8rV9oY7NLGfv2cwGztEbrKwz9g5Hsfc
 X3TlEgPaX73a/xb92eP//+e31ZNCPw6NRKmUfi6v7YG38WNghT7lqtI7GVlHiAkd
 atAqZ8NOyn7V+lHNjdOpAzFplo6R+GZCBfAFkEYuEU3dAAccMQbkaq6XgZAigycn
 dko3EWzfa+I/4RHDrRIa/XAY6Ogrnp/jmaTm4sGF2aqQOASH7X/oDU4X6KnD6ixo
 RicU1XeEsxgh5/FOf0wWo53BTcf/1nx34LkazZ6k6+jh8193IRWGb9J90E7S+/M8
 2jbB8kwxuroH1qQ73jqguiuTC0eemPn2k5MS01ZAfcIEJPcA4OyTkuA/3tiISeYQ
 0GesrJ3m7WOovFNSIq8v4WaTMcvZO9vHLZ/6BMcd4a+1uPnzPeR9rfI8JA2VA8Wd
 EAjbKdWA/kPxbVop2ajRjYTl7uMN6/g9SFP/eBjWpAFLnUfE6n1b24cn9v26OQpB
 ZxuMKA6eaeoT88KlouxudQcAgtpZZFzp4/ghWCy8q82WhHg4uDqw3R243rRxaBa7
 RF3x0wYuErbbC7N9m1UH
 =1Ixo
 -END PGP SIGNATURE-