Re: SANS: DNS Bug Now Public?

2008-07-23 Thread Steven M. Bellovin
On Tue, 22 Jul 2008 08:00:51 -0500 Jorge Amodio [EMAIL PROTECTED] wrote: It has been public for a while now. Even on the print media, there are some articles about it on the latest Computerworld mag without giving too much detail about how to exploit it. ie PATCH NOW !!! Kaminsky's blog

Software router state of the art

2008-07-23 Thread Zed Usser
Hi all! There's been some discussion on the list regarding software routers lately and this piqued my interest. Does anybody have any recent performance and capability statistics (eg. forwarding rates with full BGP tables and N ethernet interfaces) or any pointer to what the current state of

Re: SANS: DNS Bug Now Public?

2008-07-23 Thread Jorge Amodio
Let me add that folks need to understand that the patch is not a fix to a problem that has been there for long time and it is just a workaround to reduce the chances for a potential attack, and it must be combined with best practices and recommendations to implent a more robust DNS setup. There

Re: Software router state of the art

2008-07-23 Thread Adrian Chadd
On Wed, Jul 23, 2008, Charles Wyble wrote: This might be of interest: http://nrg.cs.ucl.ac.uk/mjh/tmp/vrouter-perf.pdf Various FreeBSD related guys are working on parallelising the forwarding layer enough to use the multiple tx/rx queues in some chipsets such as the Intel gig/10ge stuff. 1

Re: Software router state of the art

2008-07-23 Thread Adrian Chadd
On Wed, Jul 23, 2008, Chris Marlatt wrote: http://unix.derkeiler.com/Mailing-Lists/FreeBSD/net/2008-06/msg00364.html has all the details. It's rather long thread but 1mpps was achieved on a single cpu IIRC (the server had multiple cpus but only one being used for forwarding). Firewall

Re: Software router state of the art

2008-07-23 Thread randal k
That is a very interesting paper. Seriously, 7mpps with an off-the-shelf Dell 2950? Even if it were -half- that throughput, for a pure ethernet forwarding solution that is incredible. Shoot, buy a handful of them as hot spares and still save a bundle. Highly recommended reading, even if (like me)

Re: Software router state of the art

2008-07-23 Thread Adam Armstrong
Adrian Chadd wrote: On Wed, Jul 23, 2008, Charles Wyble wrote: Sure its not a CRS-1, but reliably doing a mil pps with a smattering of low-touch features would be rather useful, no? (Then, add say, l2tp/ppp into that mix, just as a crazy on-topic example..) Sounds like a Juniper J-series.

Re: Software router state of the art

2008-07-23 Thread Chris Adams
Once upon a time, Adam Armstrong [EMAIL PROTECTED] said: Sounds like a Juniper J-series. Have a look at the forwarding figures for the J6350. It does something around 2mpps and it's just an intel CPU with some PCI/PCI-X interfaces. The device just below it, the J4350 uses a 2.53Ghz celeron.

Re: Software router state of the art

2008-07-23 Thread William Herrin
On Wed, Jul 23, 2008 at 2:03 PM, Naveen Nathan [EMAIL PROTECTED] wrote: The Endace DAG cards claim they can move 7 gbps over a PCI-X bus from the NIC to main DRAM. They claim a full 10gbps on a PCIE bus. I wonder, has anyone heard of this used for IDS? I've been looking at building a

Re: SANS: DNS Bug Now Public?

2008-07-23 Thread Joe Abley
On 23 Jul 2008, at 12:16, Jorge Amodio wrote: Let me add that folks need to understand that the patch is not a fix to a problem that has been there for long time and it is just a workaround to reduce the chances for a potential attack, and it must be combined with best practices and

Re: Software router state of the art

2008-07-23 Thread Christopher Morrow
On Wed, Jul 23, 2008 at 11:05 AM, Naveen Nathan [EMAIL PROTECTED] wrote: The Endace DAG cards claim they can move 7 gbps over a PCI-X bus from the NIC to main DRAM. They claim a full 10gbps on a PCIE bus. I wonder, has anyone heard of this used for IDS? I've been looking at building a

Re: Software router state of the art

2008-07-23 Thread Wes Young
We use them here and there (the 1Gig versions). The biggest thing to think about is the types of rule-sets you'll be using compounded by the number of flows being created / expired. Once tuned, they work quite well, but the balance is how fast you can pull/analyze out of RAM. Compiling the

Re: SANS: DNS Bug Now Public?

2008-07-23 Thread Darren Bolding
After a bit of looking around, I have not been able to find a list of firewalls/versions which are known to provide appropriate randomness in their PAT algorithms (or more importantly, those that do not). I would be very interested in such a list if anyone knows of one. As a side note, most

Re: Software router state of the art

2008-07-23 Thread Kevin Oberman
Date: Wed, 23 Jul 2008 14:17:53 -0400 From: William Herrin [EMAIL PROTECTED] On Wed, Jul 23, 2008 at 2:03 PM, Naveen Nathan [EMAIL PROTECTED] wrote: The Endace DAG cards claim they can move 7 gbps over a PCI-X bus from the NIC to main DRAM. They claim a full 10gbps on a PCIE bus. I

Re: Software router state of the art

2008-07-23 Thread William Herrin
On Wed, Jul 23, 2008 at 3:59 PM, Kevin Oberman [EMAIL PROTECTED] wrote: The first bottleneck is the interrupts from the NIC. With a generic Intel NIC under Linux, you start to lose a non-trivial number of packets around 700mbps of normal traffic because it can't service the interrupts quickly

Re: SANS: DNS Bug Now Public?

2008-07-23 Thread Jasper Bryant-Greene
FWIW, anyone using iptables for NAT can use --random, e.g.: iptables -t nat -A POSTROUTING -o ethX -j SNAT --to x.x.x.x --random Useful for Linux NAT/load-balancer boxes, or for Linux-powered embedded devices where the vendor has not been forthcoming with a firmware patch to alter the rules they

Re: Software router state of the art

2008-07-23 Thread Kevin Oberman
Date: Wed, 23 Jul 2008 16:51:50 -0400 From: William Herrin [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] On Wed, Jul 23, 2008 at 3:59 PM, Kevin Oberman [EMAIL PROTECTED] wrote: The first bottleneck is the interrupts from the NIC. With a generic Intel NIC under Linux, you start to lose a

sizing router buffers (Re: Software router state of the art )

2008-07-23 Thread Mikael Abrahamsson
On Wed, 23 Jul 2008, Kevin Oberman wrote: be of any use at all. This would require 3 GB of buffers. This same problem also make TCP off-load of no use at all. 3 Gigabyte? Why? The newer 40G platforms on the market seems to have abandonded the 600ms buffers typical in the 10G space, in

Exploit for DNS Cache Poisoning - RELEASED

2008-07-23 Thread Robert D. Scott
Now, there is an exploit for it. http://www.caughq.org/exploits/CAU-EX-2008-0002.txt Robert D. Scott [EMAIL PROTECTED] Senior Network Engineer 352-273-0113 Phone CNS - Network Services 352-392-2061 CNS Receptionist University of Florida 352-392-9440 FAX

RE: Exploit for DNS Cache Poisoning - RELEASED

2008-07-23 Thread Robert D. Scott
Actually you are not missing anything. It is a brute force attack. I think you had the right concept when you indicated that networks and hardware may be fast enough. It is not maybe, it is; and every script kiddie on your block has the power in his/her bedroom. Then you add the college crowd

Re: Exploit for DNS Cache Poisoning - RELEASED

2008-07-23 Thread Mike Lewinski
Joe Greco wrote: So, I have to assume that I'm missing some unusual aspect to this attack. I guess I'm getting older, and that's not too shocking. Anybody see it? AFAIK, the main novelty is the ease with which bogus NS records can be inserted. It may be hard to get a specific A record

Re: Exploit for DNS Cache Poisoning - RELEASED

2008-07-23 Thread David Conrad
Hi, On Jul 23, 2008, at 3:51 PM, Robert D. Scott wrote: Actually you are not missing anything. It is a brute force attack. I haven't looked at the exploit code, but the vulnerability Kaminsky found is a bit more than a brute force attack. As has been pointed out in various venues, it

Re: Exploit for DNS Cache Poisoning - RELEASED

2008-07-23 Thread Tuc at T-B-O-H.NET
Now, there is an exploit for it. http://www.caughq.org/exploits/CAU-EX-2008-0002.txt For anyone looking to use it, you MUST update the frameworks libraries. Some of the code only came out ~5 hours ago that it needs. Tuc/TBOH

Re: Exploit for DNS Cache Poisoning - RELEASED

2008-07-23 Thread Kevin Day
On Jul 23, 2008, at 5:30 PM, Joe Greco wrote: Maybe I'm missing it, but this looks like a fairly standard DNS exploit. Keep asking questions and sending fake answers until one gets lucky. It certainly matches closely with my memory of discussions of the weaknesses in the DNS protocol from

Re: Exploit for DNS Cache Poisoning - RELEASED

2008-07-23 Thread Joe Abley
On 23 Jul 2008, at 18:30, Joe Greco wrote: So, I have to assume that I'm missing some unusual aspect to this attack. I guess I'm getting older, and that's not too shocking. Anybody see it? Perhaps what you're missing can be found in the punchline to the transient post on the Matasano

Re: Exploit for DNS Cache Poisoning - RELEASED

2008-07-23 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Joe Abley [EMAIL PROTECTED] wrote: It's a good job users are not conditioned to click OK when told the certificate for this site is invalid. I appreciate your sense of humor. ;-) - - ferg -BEGIN PGP SIGNATURE- Version: PGP Desktop

Re: Exploit for DNS Cache Poisoning - RELEASED

2008-07-23 Thread Jasper Bryant-Greene
On Wed, 2008-07-23 at 21:17 -0400, Joe Abley wrote: Luckily we have the SSL/CA architecture in place to protect any web page served over SSL. It's a good job users are not conditioned to click OK when told the certificate for this site is invalid. 'course, as well as relying on users not

Re: Exploit for DNS Cache Poisoning - RELEASED

2008-07-23 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Robert D. Scott [EMAIL PROTECTED] wrote: Now, there is an exploit for it. http://www.caughq.org/exploits/CAU-EX-2008-0002.txt Now also (mirrored) here: http://www.milw0rm.com/exploits/6122 ...and probably a slew of other places, too. ;-) -

Re: Exploit for DNS Cache Poisoning - RELEASED

2008-07-23 Thread Tuc at T-B-O-H.NET
- -- Robert D. Scott [EMAIL PROTECTED] wrote: Now, there is an exploit for it. http://www.caughq.org/exploits/CAU-EX-2008-0002.txt Now also (mirrored) here: http://www.milw0rm.com/exploits/6122 ...and probably a slew of other places, too. ;-) The changes the put into

Re: Exploit for DNS Cache Poisoning - RELEASED

2008-07-23 Thread Patrick W. Gilmore
On Jul 23, 2008, at 9:27 PM, Jasper Bryant-Greene wrote: On Wed, 2008-07-23 at 21:17 -0400, Joe Abley wrote: Luckily we have the SSL/CA architecture in place to protect any web page served over SSL. It's a good job users are not conditioned to click OK when told the certificate for this site is

Re: Exploit for DNS Cache Poisoning - RELEASED

2008-07-23 Thread Jared Mauch
On Wed, Jul 23, 2008 at 11:01:11PM -0400, Patrick W. Gilmore wrote: https://www.paypal.com/ That did not even occur to me. Anyone have a foolproof way to get grandma to always put https://; in front of www? Seriously, I was explaining the problem to someone saying never click 'OK'

Re: Exploit for DNS Cache Poisoning - RELEASED

2008-07-23 Thread Mike Lewinski
Patrick W. Gilmore wrote: Anyone have a foolproof way to get grandma to always put https://; in front of www? Some tests from my home Comcast connection tonight showed less than desirable results from their resolvers. The first thing I did was to double check that the bookmarks I use when

Re: Exploit for DNS Cache Poisoning - RELEASED

2008-07-23 Thread Matthew Kaufman
Skywing wrote: Bookmarks or favorites or whatever your browser of choice wishes to call them, for the https URLs. That, or remember to type in the https:// prefix. - S Which works great until you run into something like Washington Mutual (of which you have no doubt heard)...

Re: XO contact

2008-07-23 Thread William R. Lorenz
Do XO engineers still read and participate in this mailing list? We've been going back-and-forth for a couple of weeks now on a newly installed XO circuit. The circuit does not work, and we've heard reports of engineers resetting an ML100 card, possibly RE Cisco's CSCec78266. We have

Re: XO contact

2008-07-23 Thread Martin Hannigan
On Thu, Jul 24, 2008 at 1:00 AM, William R. Lorenz [EMAIL PROTECTED] wrote: Do XO engineers still read and participate in this mailing list? Yes.

Re: Avg. Packet Size - Again?

2008-07-23 Thread k claffy
most recent update on this question, with just a couple of data points: http://www.caida.org/research/traffic-analysis/pkt_size_distribution/graphs.xml (so, yes the peak has moved up to 1500.) note there are more tiny packets in our recent ipv6 data, but that could just be someone's ping

re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-23 Thread Paul Vixie
this is for whoever said it's just a brute force attack and/or it's the same attack that's been described before. maybe it goes double if that person is also the one who said my knowledge in this area is out of date. g. re: -- This message has been scanned for