Re: [c-nsp] Cisco Security Advisory: Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow Vulnerability

2016-02-11 Thread Adrian M
Be careful, It appears that something is broken with ARP on this release.
We have no ARP on lan interface, and somebody else has a similar problem:
https://www.reddit.com/r/networking/comments/433kqx/cisco_asa_not_recording_an_arp_entry/



On Wed, Feb 10, 2016 at 10:36 PM, Sadiq Saif  wrote:

> Update your ASAs folks, this is a critical one.
>
>
>  Forwarded Message 
> Subject: [c-nsp] Cisco Security Advisory: Cisco ASA Software IKEv1 and
> IKEv2 Buffer Overflow Vulnerability
> Date: Wed, 10 Feb 2016 08:06:51 -0800
> From: Cisco Systems Product Security Incident Response Team
> 
> Reply-To: ps...@cisco.com
> To: cisco-...@puck.nether.net
> CC: ps...@cisco.com
>
> Cisco Security Advisory: Cisco ASA Software IKEv1 and IKEv2 Buffer
> Overflow Vulnerability
>
> Advisory ID: cisco-sa-20160210-asa-ike
>
> Revision 1.0
>
> For Public Release 2016 February 10 16:00  GMT (UTC)
>
> +-
>
>
> Summary
> ===
>
> A vulnerability in the Internet Key Exchange (IKE) version 1 (v1) and
> IKE version 2 (v2) code of Cisco ASA Software could allow an
> unauthenticated, remote attacker to cause a reload of the affected
> system or to remotely execute code.
>
> The vulnerability is due to a buffer overflow in the affected code area.
> An attacker could exploit this vulnerability by sending crafted UDP
> packets to the affected system. An exploit could allow the attacker to
> execute arbitrary code and obtain full control of the system or to cause
> a reload of the affected system.
>
> Note: Only traffic directed to the affected system can be used to
> exploit this vulnerability. This vulnerability affects systems
> configured in routed firewall mode only and in single or multiple
> context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic.
>
> Cisco has released software updates that address this vulnerability.
> This advisory is available at the following link:
>
> http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike
>
>
>
> ___
> cisco-nsp mailing list  cisco-...@puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>
>
>


[NANOG-announce] NANOG PC Appointments for 2016-2017

2016-02-11 Thread Daniel Golding
Greetings NANOG Colleagues,


The NANOG Board of Directors has completed the Program Committee selection
process.  This year, 18 members submitted their candidacies for 7 available
positions.   We want to thank each and every candidate for considering this
important service to our community.

We are pleased to announce the two-year term appointment of Kevin Blumberg,
Anna Claiborne, Steve Plote, Steve Schecter, Benson Schliesser, Jesse
Sowell, and Chris Woodfield to the Program Committee.

We also want to thank and recognize the contribution of Greg Hankins,
Manish Karir, Michael Sinatra, and Tony Tauber for their service on the
Program Committee, which concluded at the San Diego NANOG meeting.

In the coming weeks, the new Program Committee will hold its first meeting
and select a Chair and a Vice-Chair.

Sincerely,

Daniel Golding
Chairman, NANOG Board of Directors
___
NANOG-announce mailing list
nanog-annou...@mailman.nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog-announce

Re: Automated alarm notification

2016-02-11 Thread Jörg Kost

Hi,

you could use snmptt with an Exec-Command (SendMail, SMS, …) or define 
it as a passive service alert in Nagios / Icinga / $YourMonitoring.


Jörg

On 11 Feb 2016, at 22:51, Frank Bulk wrote:


Is anyone aware of software, or perhaps a service, that will take SNMP
traps, properly parse them, and perform the appropriate call outs 
based on
certain content, after waiting 5 or 10 minutes for any alarms that 
don't

clear?

I looked at PagerDuty, but they don't do any SNMP trap parsing, and 
nothing

with set/clear.

Frank


Automated alarm notification

2016-02-11 Thread Frank Bulk
Is anyone aware of software, or perhaps a service, that will take SNMP
traps, properly parse them, and perform the appropriate call outs based on
certain content, after waiting 5 or 10 minutes for any alarms that don't
clear?

I looked at PagerDuty, but they don't do any SNMP trap parsing, and nothing
with set/clear.  

Frank



Re: Automated alarm notification

2016-02-11 Thread John Adams
datadog will do this without issue, and if you have a small number of hosts
it's nearly free.

-j


On Thu, Feb 11, 2016 at 1:51 PM, Frank Bulk  wrote:

> Is anyone aware of software, or perhaps a service, that will take SNMP
> traps, properly parse them, and perform the appropriate call outs based on
> certain content, after waiting 5 or 10 minutes for any alarms that don't
> clear?
>
> I looked at PagerDuty, but they don't do any SNMP trap parsing, and nothing
> with set/clear.
>
> Frank
>
>


Re: Automated alarm notification

2016-02-11 Thread Oliver O'Boyle
Check_MK over OMD. Good event parsing capabilities. Easy to set up, nagios
core but rewritten app for much better performance. Multisite master/slave
capabilities +++.

Free or supported. Your pick.
On Feb 11, 2016 9:26 PM, "John Adams"  wrote:

> datadog will do this without issue, and if you have a small number of hosts
> it's nearly free.
>
> -j
>
>
> On Thu, Feb 11, 2016 at 1:51 PM, Frank Bulk  wrote:
>
> > Is anyone aware of software, or perhaps a service, that will take SNMP
> > traps, properly parse them, and perform the appropriate call outs based
> on
> > certain content, after waiting 5 or 10 minutes for any alarms that don't
> > clear?
> >
> > I looked at PagerDuty, but they don't do any SNMP trap parsing, and
> nothing
> > with set/clear.
> >
> > Frank
> >
> >
>


Re: Automated alarm notification

2016-02-11 Thread Josh Galvez
I've used Zabbix, Nagios, etc to handle receiving and parsing traps,
set/clear etc.  Then have them send a trap (or via email to script that
sends a trap) to SIPShout to actually generate the callout.  It's worked
well.

-Josh

On Thu, Feb 11, 2016 at 2:51 PM, Frank Bulk  wrote:

> Is anyone aware of software, or perhaps a service, that will take SNMP
> traps, properly parse them, and perform the appropriate call outs based on
> certain content, after waiting 5 or 10 minutes for any alarms that don't
> clear?
>
> I looked at PagerDuty, but they don't do any SNMP trap parsing, and nothing
> with set/clear.
>
> Frank
>
>


Re: [c-nsp] Cisco Security Advisory: Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow Vulnerability

2016-02-11 Thread Dale W. Carder
Thus spake Andrew (Andy) Ashley (andre...@aware.co.th) on Thu, Feb 11, 2016 at 
02:35:51PM +:
> Is a control-plane ACL to limit isakmp traffic (UDP/500) to an affected ASA 
> from desired sources enough to mitigate this attack, until upgrades can be 
> performed?

It's worth noting that is not listed as a workaround (they typically use
branding like "infrastructure acl's" or some such) to mitigate it on the
affected box.  Upstream, yes that would seem to be intuitive.

Perhaps because you are corrupting the heap with fragments you are
outside of where the ACL is applied?

Dale


Re: [c-nsp] Cisco Security Advisory: Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow Vulnerability

2016-02-11 Thread Andrew (Andy) Ashley
Is a control-plane ACL to limit isakmp traffic (UDP/500) to an affected ASA 
from desired sources enough to mitigate this attack, until upgrades can be 
performed?

Regards,

Andrew Ashley




-Original Message-
From: NANOG  on behalf of Adrian 
M 
Date: Thursday, 11 February 2016 at 15:53
To: "nanog@nanog.org" 
Subject: Re: [c-nsp] Cisco Security Advisory: Cisco ASA Software IKEv1 and 
IKEv2 Buffer Overflow Vulnerability

>Be careful, It appears that something is broken with ARP on this release.
>We have no ARP on lan interface, and somebody else has a similar problem:
>https://www.reddit.com/r/networking/comments/433kqx/cisco_asa_not_recording_an_arp_entry/
>
>
>
>On Wed, Feb 10, 2016 at 10:36 PM, Sadiq Saif  wrote:
>
>> Update your ASAs folks, this is a critical one.
>>
>>
>>  Forwarded Message 
>> Subject: [c-nsp] Cisco Security Advisory: Cisco ASA Software IKEv1 and
>> IKEv2 Buffer Overflow Vulnerability
>> Date: Wed, 10 Feb 2016 08:06:51 -0800
>> From: Cisco Systems Product Security Incident Response Team
>> 
>> Reply-To: ps...@cisco.com
>> To: cisco-...@puck.nether.net
>> CC: ps...@cisco.com
>>
>> Cisco Security Advisory: Cisco ASA Software IKEv1 and IKEv2 Buffer
>> Overflow Vulnerability
>>
>> Advisory ID: cisco-sa-20160210-asa-ike
>>
>> Revision 1.0
>>
>> For Public Release 2016 February 10 16:00  GMT (UTC)
>>
>> +-
>>
>>
>> Summary
>> ===
>>
>> A vulnerability in the Internet Key Exchange (IKE) version 1 (v1) and
>> IKE version 2 (v2) code of Cisco ASA Software could allow an
>> unauthenticated, remote attacker to cause a reload of the affected
>> system or to remotely execute code.
>>
>> The vulnerability is due to a buffer overflow in the affected code area.
>> An attacker could exploit this vulnerability by sending crafted UDP
>> packets to the affected system. An exploit could allow the attacker to
>> execute arbitrary code and obtain full control of the system or to cause
>> a reload of the affected system.
>>
>> Note: Only traffic directed to the affected system can be used to
>> exploit this vulnerability. This vulnerability affects systems
>> configured in routed firewall mode only and in single or multiple
>> context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic.
>>
>> Cisco has released software updates that address this vulnerability.
>> This advisory is available at the following link:
>>
>> http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike
>>
>>
>>
>> ___
>> cisco-nsp mailing list  cisco-...@puck.nether.net
>> https://puck.nether.net/mailman/listinfo/cisco-nsp
>> archive at http://puck.nether.net/pipermail/cisco-nsp/
>>
>>
>>

smime.p7s
Description: S/MIME cryptographic signature


Re: Fiber to the home specialists/consultants?

2016-02-11 Thread Fletcher Kittredge
Since two asked: Tilson 


On Wed, Feb 10, 2016 at 8:14 PM, Jeremy Austin  wrote:

> Ditto.
> On Wed, Feb 10, 2016 at 4:04 PM Daniel Rohan  wrote:
>
> > Can anyone point me at a firm that does or consults on FTTH from a
> > technical *and* business perspective?
> >
> > Off-list responses would be appreciated.
> >
> > Thanks,
> >
> > Dan
> >
>



-- 
Fletcher Kittredge
GWI
8 Pomerleau Street
Biddeford, ME 04005-9457
207-602-1134