Re: [Full-disclosure] Attacking Critical Internet Infrastructure

2012-04-22 Thread Dobbins, Roland
On Apr 21, 2012, at 4:39 PM, fireba...@hushmail.com wrote: http://pdfcast.org/pdf/attacking-critical-internet-infrastructure This is a .pdf of a presentation on best current practices (BCPs) for protecting routers and layer-3 switches from DDoS attacks:

Re: [Full-disclosure] Hacking IPv6 Networks (slides)

2011-08-09 Thread Dobbins, Roland
On Jul 26, 2011, at 10:35 PM, Fernando Gont wrote: They contain quite a few insights about IPv6 security, along with a number of practical examples. Good stuff! A few observations: 1. By prepending lots of extension headers to packets, it may be possible to exhaust router ASIC/TCAM

Re: [Full-disclosure] Learning Social Engineering?

2011-07-11 Thread Dobbins, Roland
On Jul 11, 2011, at 1:29 AM, Maxim Veksler wrote: I would appreciate pointers to reading / video / forum material. This video captures the essence of social engineering: http://www.youtube.com/watch?v=dQw4w9WgXcQ --- Roland

Re: [Full-disclosure] how to detect DDoS attack through HTTP response analysis(throuput)

2011-06-26 Thread Dobbins, Roland
On Jun 27, 2011, at 9:30 AM, 김무성 wrote: if there are many 408 request timeout responses, we can think this is slowloris or RUDY DDoS attack. Many things can cause this - not just DDoS. In fact, I've rarely seen a DDoS resulting in these responses, because in an effective DDoS, one often

Re: [Full-disclosure] Apple Airport Update?

2011-06-15 Thread Dobbins, Roland
On Jun 15, 2011, at 1:31 PM, Jeffrey Walton wrote: I'm not used to Apple releasing a lone update like this (perhaps my observations are inaccurate). Apple's commentary on the patch from the Software Update details screen: - Resolves an issue that caused the AirPort Utility to

Re: [Full-disclosure] New DDoS attack vector

2011-05-20 Thread Dobbins, Roland
On May 20, 2011, at 8:43 PM, ascii wrote: the attack you proposed is very stretched and has an extremely low efficiency. I believe that the 'attack' is actually backscatter from a targeted attack against the MTAs/antispam systems/recursive DNS servers of the organization whose MTAs were

Re: [Full-disclosure] New DDoS attack vector

2011-05-19 Thread Dobbins, Roland
On May 19, 2011, at 9:44 PM, minor float wrote: Dear list readers, on today we officially published our observations regarding the new attack vector of the DDoS against the DNS servers. Filtering out the bogus DNS queries generated by the MX-record lookups is pretty trivial with modern

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Dobbins, Roland
On May 11, 2011, at 4:22 PM, phocean wrote: So why going private? Because full-disclosure isn't the best forum for a lengthy discussion of this type. --- Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Dobbins, Roland
On May 11, 2011, at 4:52 PM, phocean wrote: I want to read how you justify that stateful hardware is useless to check sessions of TCP and upper protocols. In front of servers, where there is no state to inspect. --- Roland

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Dobbins, Roland
On May 11, 2011, at 6:05 PM, phocean wrote: Passive FTP is the first example that comes to my mind where inspection (based on statefulness) is needed. I really don't want to continue this on full-disclosure, but there's still no material security value to stateful inspection in front of

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Dobbins, Roland
On May 11, 2011, at 10:03 PM, phocean wrote: - DDoS : anyway, a firewall isn't more susceptible to DoS than the server it protects. If you look at the hardware performance of modern firewalls, if an attacker has the ability to DoS it, then only a considerable server farm that very few

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Dobbins, Roland
On May 12, 2011, at 12:09 AM, phocean wrote: I still don't see how the hell the typical web server will handle as much traffic as one of these Checkpoint, Cisco or whatever monsters. That's the dread secret - they aren't really 'monsters'. But on a large network with inter-vlan filtering,

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Dobbins, Roland
On May 12, 2011, at 12:20 AM, phil wrote: (and I add that on private IOS like on sonicwall, it make it hard to hit with a 0day vuln) Everyone/everything has vulnerabilities of one sort or another: https://www.fuzeqna.com/sonicwallkb/consumer/kbdetail.asp?kbid=8232

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Dobbins, Roland
On May 12, 2011, at 12:31 AM, phocean wrote: When I look at the specs of high end machines of most makers, they are and they outmatch most of x64 servers. http://urbanairship.com/blog/2010/09/29/linux-kernel-tuning-for-c500k/

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Dobbins, Roland
On May 12, 2011, at 3:49 AM, phocean wrote: To go back to my point: an application server (IIS, Apache) cannot sustain as many connections as a firewall (of course in a sane and standard environment). Sorry, but my operational experience is quite the opposite. And one generally deploys

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Dobbins, Roland
On May 10, 2011, at 1:40 PM, Tracy Reed wrote: If you have traffic going out to a high numbered port and you are not keeping state how do you know if that is a reply packet to an existing inbound connection or if it is an unauthorized outbound connection? You use stateless ACLs to filter

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Dobbins, Roland
On May 10, 2011, at 4:42 PM, Pete Smith wrote: if an attacker initiates a connection dest port higher than 2048 (to some other server the attacker controls) and source port of 80 that will pass through an ACL without issues, this would not be so on a stateful firewall. If the attacker's

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Dobbins, Roland
On May 10, 2011, at 8:53 PM, Bruno Cesar Moreira de Souza wrote: The stateless ACLs would not prevent ACK tunneling (http://ntsecurity.nu/papers/acktunneling/). Again, if an attacker's already in a position to do that, the game is already over.

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Dobbins, Roland
On May 10, 2011, at 10:45 PM, Thor (Hammer of God) wrote: There are any number of topological deployment scenarios where firewalls certainly provide security in depth and added security, irrespective of what Mr. Kaeo's opinion on the matter is. The only one I can think of is between a

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Dobbins, Roland
On May 11, 2011, at 4:01 AM, Thor (Hammer of God) wrote: HTTP may be stateless, but the TCP connection isn't. The purpose for my firewall in front of my web server is that if you get on the box, or can somehow try to initiate an external connection (e.g. SQL injection), you will not be

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Dobbins, Roland
On May 11, 2011, at 12:52 AM, Bruno Cesar Moreira de Souza wrote: How would you block an ACK tunnel using only a packet filter? (http://ntsecurity.nu/papers/acktunneling/) You don't need to stop the httpd service to create this kind of tunnel, as the packets from the attacker would just be

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Dobbins, Roland
On May 11, 2011, at 6:51 AM, Thor (Hammer of God) wrote: My experience is quite different, and I have personally seen too many instances to count where the use of firewalls has, without question, been what has saved a company. I would be extremely interested to learn details of how a stateful

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Dobbins, Roland
On May 11, 2011, at 7:18 AM, Thor (Hammer of God) wrote: Let's take it offline - you can share back with the group if you feel it valuable. Sounds good to me, thanks much! --- Roland Dobbins rdobb...@arbor.net //

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-09 Thread Dobbins, Roland
On May 10, 2011, at 6:03 AM, Thor (Hammer of God) wrote: Maybe they should call that You don't have to patch genius! Stateful firewalls have no place in front of servers, where every incoming request is unsolicited, and therefore there is no state to inspect in the first place. Stateful

Re: [Full-disclosure] DDoS attacks via other sites execution tool (DAVOSET)

2010-07-14 Thread Dobbins, Roland
On Jul 14, 2010, at 6:28 PM, MustLive wrote: In which I wrote particularly about creating of botnet from zombie-servers (which is a new type of botnets). A more appropriate name for this sort of attack might be an 'application reflection attack', as it's similar in concept to making use of

Re: [Full-disclosure] Should nmap cause a DoS on cisco routers?

2010-07-10 Thread Dobbins, Roland
On Jul 9, 2010, at 10:49 PM, Dario Ciccarone (dciccaro) wrote: Cisco Security Advisory: Vulnerabilities in SNMP Message Processing - which can be found at http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml . The bug ID on our bug database being CSCed68575. This is a

Re: [Full-disclosure] Should nmap cause a DoS on cisco routers?

2010-07-02 Thread Dobbins, Roland
On Jul 2, 2010, at 4:45 PM, Florian Weimer wrote: Those bugs might not be security-relevant, but they can be very annyoing nevertheless. I agree, if it's bugs we're discussing - my guess is, we aren't dealing with a bug in this instance, given that the original poster seemed to indicate a

Re: [Full-disclosure] Should nmap cause a DoS on cisco routers?

2010-07-02 Thread Dobbins, Roland
On Jul 2, 2010, at 5:59 PM, Thierry Zoller wrote: There it is again, BCP. Is this the new IDS ? BCP = Best Current Practice = iACLs, CoPP, et. al. --- Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

Re: [Full-disclosure] Should nmap cause a DoS on cisco routers?

2010-07-02 Thread Dobbins, Roland
On Jul 2, 2010, at 5:59 PM, Thierry Zoller wrote: If it is a default configuration and you can remotely cause a denial of service condition : it is a vulnerability. If it is a non standard configuration and you can remotely cause a denial of service condition : it is

Re: [Full-disclosure] Should nmap cause a DoS on cisco routers?

2010-07-02 Thread Dobbins, Roland
On Jul 2, 2010, at 5:54 PM, Champ Clark III [Softwink] wrote: Accidental 'DoS' conditions seem to pop-up a lot in these environments, IMHO. Availability is the most important, yet least-understood element of the C-I-A triad, IMHO. And not just on public-facing networks, but in private

Re: [Full-disclosure] Should nmap cause a DoS on cisco routers?

2010-07-02 Thread Dobbins, Roland
On Jul 2, 2010, at 7:43 PM, Thierry Zoller wrote: Was not aware of the acronym - BCP is generally used for Business continuity plan in the industry. I remember an interview with RMS many years ago; he was asked what he thought was the most pressing problem in computer science. After

Re: [Full-disclosure] Should nmap cause a DoS on cisco routers?

2010-07-02 Thread Dobbins, Roland
On Jul 3, 2010, at 2:05 AM, Mailing lists at Core Security Technologies wrote: Perhaps we should too ask and wait for actual data from Mr. Shang I acknowledged this deeper in the thread - and also noted that since I've seen the same kind of reported behavior not above two or three hundred

Re: [Full-disclosure] Should nmap cause a DoS on cisco routers?

2010-07-01 Thread Dobbins, Roland
On Jul 1, 2010, at 4:28 PM, Thierry Zoller wrote: If this is possible you have found a vulnerability. No - what he's found is a network in which common infrastructure self-protection BCPs haven't been deployed, that's all.

Re: [Full-disclosure] Should nmap cause a DoS on cisco routers?

2010-07-01 Thread Dobbins, Roland
On Jul 1, 2010, at 5:23 PM, Thierry Zoller wrote: If a device crashes when being scanned - it's a vulnerability. It sounds to me as if what happened was that he ended up driving the CPUs of the devices in question to 100%, and they stopped handling control-plane traffic and fell over. There

Re: [Full-disclosure] Should nmap cause a DoS on cisco routers?

2010-07-01 Thread Dobbins, Roland
On Jul 1, 2010, at 11:12 PM, Florian Weimer wrote: And it's certainly a bug worth fixing. I doubt it's a 'bug' which can be 'fixed', just the same as sending enough legitimate HTTP requests to a Web server to bring it to its knees isn't a 'bug' which can be 'fixed', but rather a DoS which

Re: [Full-disclosure] Should nmap cause a DoS on cisco routers?

2010-07-01 Thread Dobbins, Roland
On Jul 2, 2010, at 7:01 AM, Dan Kaminsky wrote: Permanent DoS's are unacceptable even from intentionally malicious traffic, let alone a few nmap flags. They're unacceptable to us, they're unacceptable to Microsoft (see: MSRC bug bar), and even Cisco PSIRT has shown up on thread desiring

Re: [Full-disclosure] Should nmap cause a DoS on cisco routers?

2010-07-01 Thread Dobbins, Roland
On Jul 2, 2010, at 8:13 AM, Lee wrote: so presumably the scan came from a network that had full access to the routers. One question is whether or not the network in question *should* have full access to the management plane of the routers. ; That's a bit harder to defend against.

Re: [Full-disclosure] Ubisoft DDoS

2010-03-09 Thread Dobbins, Roland
On Mar 9, 2010, at 11:01 PM, valdis.kletni...@vt.edu wrote: Oh, I didn't say they didn't exist. A good way to get started w/scalable DDoS mitigation is to implement S/RTBH on one's hardware-based edge routers, and then make use of open-source NetFlow tools for visibility. There are