Re: Jenkins amplification

2020-02-04 Thread Mike Meredith
On Mon, 3 Feb 2020 16:13:34 -0500, Christopher Morrow
 may have written:
> My experience, and granted it's fairly scoped, is that this sort of thing
> works fine for a relatively small set of 'persons' and 'resources'.

Seeing as managing this sort of thing is my primary job these days ...

> it ends up being about the cross-product of #users * #resources.

That's the interesting part of the job - coalescing rules in a way that
minimises the security impact but maximises the decrease of complexity. If
you don't, you get an explosion of complexity that results in a set of
rules (I know of an equivalent organisation that has over 1,000 firewall
rules) that becomes insanely complex to manage. 

> certainly a more holistic version of the story is correct.
> the relatively flippant answer way-back-up-list of: "vpn"

I think that "vpn" is the right answer - it's preferrable to publishing
services to the entire world that only need to be used by empoyees. But
it's not cheap or easy. 

-- 
Mike Meredith, University of Portsmouth
Hostmaster, Security, and Chief Systems Engineer
 


pgp9x9K3M8fTy.pgp
Description: OpenPGP digital signature


Re: IPv4 and Auctions

2019-10-24 Thread Mike Meredith
On Thu, 24 Oct 2019 08:18:47 -0400 (EDT), Jon Lewis  may
have written:
> IP space was handed out to organizations (and even to individuals) long 
> before the RIRs like ARIN were created.  Those "assignments" / 
> "allocations" (whatever you want to call them) are outside of the control 
> of the RIRs because they had no involvement in them.

I don't know about others but "my" SRI-NIC allocation passed to RIPE
control some while back, as a "legacy" (mnt-by: RIPE-NCC-LEGACY-MNT) block.
Although it was fairly easy to predict where it should go.

-- 
Mike Meredith, University of Portsmouth
Chief Systems Engineer, Hostmaster, Security, and Timelord!
 


pgpd3UTjnsJpL.pgp
Description: OpenPGP digital signature


Re: Spitballing IoT Security

2016-10-27 Thread Mike Meredith
On Thu, 27 Oct 2016 07:59:00 +0200, Eliot Lear 
may have written:
> Well yes.  uPnP is a problem precisely because it is some random device
> asserting on its own that it can be trusted to do what it wants.  Had

From my own personal use (and I'm aware that this isn't a general
solution), I'd like a device that sat on those uPnP requests until I logged
into the admin interface to review them. Now if you could automate _me_
then it might become more generally useful :-

uPnP(ssh, for admin access) -> f/w

f/w -> uPnP device: Don't be silly.

> But if instead of a pet feeder we're talking about a home file sharing
> system or a video camera where you don't want to share the feed into the
> cloud?  There will be times when people want inbound connections.  We
> need an architecture that supports them.

As someone who manages an application-based firewall, every problem looks
like it would be easier to solve using an application-based firewall :)

-- 
Mike Meredith, University of Portsmouth
Principal Systems Engineer, Hostmaster, Security, and Timelord!
 


pgpYa7dseBC5c.pgp
Description: OpenPGP digital signature


Re: ICANN GDPR lawsuit

2018-06-06 Thread Mike Meredith
On Wed, 6 Jun 2018 08:01:35 +0300, Hank Nussbacher 
may have written:
> "The European Commission has insisted it is *not subject to the strict
> new data protection law* that it has imposed across Europe after it was
> revealed the personal information of hundreds of people had been leaked
> on its website. "

Neglecting where it goes on to say "it would be subject to a
new law that “mirrors” GDPR which will come into effect in the autumn.".


-- 
Mike Meredith, University of Portsmouth
Hostmaster, Security, and Chief Systems Engineer
 


pgpdyFKzJLwJ4.pgp
Description: OpenPGP digital signature


Re: unwise filtering policy on abuse mailboxes

2018-08-01 Thread Mike Meredith
On Wed, 1 Aug 2018 11:19:36 -0400, Rich Kulawiec  may have
written:
> On Tue, Jul 24, 2018 at 05:53:48PM -0700, Dan Hollis wrote:
> > I'm saying people who filter their abuse mailboxes need to stop doing
> > so.  
> 
> 1. They needed to stop doing so a few decades ago.  Anybody still doing
> it today is doing it on purpose, which of course leads directly to the
> question: why?

Never assume malice ("on purpose") something which can be adequately
explained by incompetance. 

-- 
Mike Meredith, University of Portsmouth
Chief Systems Engineer, Hostmaster, Security, and Timelord!
 


pgpFBtzlPDhew.pgp
Description: OpenPGP digital signature


Re: DNS Flag Day, Friday, Feb 1st, 2019

2019-01-24 Thread Mike Meredith
On Thu, 24 Jan 2019 11:22:44 +1100, Mark Andrews  may have
written:
> If you run a firewall in front of your DNS server you may be broken.

If you run a firewall in front of your DNS server and the firewall breaks
EDNS, then your firewall is broken. And has been a long, long time. I put a
firewall in place back in 2004, and EDNS compliance was one of the tests
back then.

-- 
Mike Meredith, University of Portsmouth
Chief Systems Engineer, Hostmaster, Security, and Timelord!
 


pgpApQS1bYzQY.pgp
Description: OpenPGP digital signature


Re: A Zero Spam Mail System [Feedback Request]

2019-02-22 Thread Mike Meredith
On Wed, 20 Feb 2019 19:01:40 -0700, "Forrest Christian (List Account)"
 may have written:
> On Wed, Feb 20, 2019 at 1:24 PM Matthew Black 
> wrote:
> > Have you ever created a sendmail.cf without using M4?  
> 
> I still believe that sendmail is Alien technology.  How else can one
> explain sendmail.cf?And although I can't say for sure that I

I always thought of sendmail.cf as a language for writing MTAs in. I did do
*bits* in sendmail.cf but switched to Exim before I got too damaged. 

> sendmail.cf file which wasn't working as one would expect.   I'm also
> not 100% certain that m4 was even an option for the first sendmail

It wasn't a Sendmail 8 introduction perhaps?


-- 
Mike Meredith, University of Portsmouth
Chief Systems Engineer, Hostmaster, Security, and Timelord!
 


pgpavwLh2geSD.pgp
Description: OpenPGP digital signature


Re: a detour DANE, was A Deep Dive on the Recent Widespread DNS Hijacking

2019-02-28 Thread Mike Meredith
On 27 Feb 2019 13:07:09 -0500, "John Levine"  may have
written:
> The IETF one says that nobody used type 99, and some of the few
> implementations we saw were broken, so we deprecated it.

And just after I'd finished adding in all the SPF records too, so I had to
turn around and take all them out again immediately after.

-- 
Mike Meredith, University of Portsmouth
Hostmaster, Security, and Chief Systems Engineer
 


pgpCzfMA47BMs.pgp
Description: OpenPGP digital signature


Re: a detour DANE, was A Deep Dive on the Recent Widespread DNS Hijacking

2019-02-28 Thread Mike Meredith
On Wed, 27 Feb 2019 19:59:49 -0800, Seth Mattinen  may
have written:
> We kind of have that with RP records. But does anyone do it?

I used to before various IPAM vendors claimed it was deprecated; I've still
got legacy code that queries for it (and the TXT equivalent) as well as the
new gooey IPAM thing.


-- 
Mike Meredith, University of Portsmouth
Chief Systems Engineer, Hostmaster, Security, and Timelord!
 


pgpLPwWeNBTLF.pgp
Description: OpenPGP digital signature


Re: Oracle DBA

2019-03-14 Thread Mike Meredith
On Wed, 13 Mar 2019 17:44:13 -0700, Randy Bush  may have
written:
> ya.  none of us run oracle

Yeah but some of us walk it.

-- 
Mike Meredith, University of Portsmouth
Chief Systems Engineer, Hostmaster, Security, and Timelord!
 


pgp19LcFRTpOk.pgp
Description: OpenPGP digital signature


Re: Templating/automating configuration

2017-06-15 Thread Mike Meredith
On Wed, 14 Jun 2017 21:35:59 +0100, Nick Hilliard  may
have written:
> What do you think the purpose of change control / management is?

To provide employment for change managers of course.

-- 
Mike Meredith, University of Portsmouth
Chief Systems Engineer, Hostmaster, Security, and Timelord!
 


pgpcohqknZUzV.pgp
Description: OpenPGP digital signature


Re: Recent trouble with QUIC?

2015-09-24 Thread Mike Meredith
On Wed, 23 Sep 2015 19:01:19 -0500, Sean Hunter 
may have written:
> a) Has anyone here had a similar experience? Was the root cause QUIC
> in your case?

Yes. No; in our case our firewall (a PA5060 running PANOS6.1.3 at the
time) was allowing some QUIC packets through, but not others. As it was
newly deployed at the time, it was soon blamed :-\

> b) Has anyone noticed anything remotely similar in the last few
> weeks/days/today?

Only because I enabled QUIC within Chrome on our test network to verify
that it was still a problem. 

> We're an Apps domain, so this may be specific to universities in the
> Apps universe.

As are we.

-- 
Mike Meredith, University of Portsmouth
Principal Systems Engineer, Hostmaster, Security, and Timelord!
 


Re: Anycast provider for SMTP?

2015-06-19 Thread Mike Meredith
On Thu, 18 Jun 2015 15:51:31 -0400, "Joe Abley" 
may have written:
> Since DHCP uses broadcast and multicast addresses when a client is 
> discovering a server, it's not obvious why you'd have to.

And broadcast/multicast when renewing a lease (DHCPREQUEST). You will
of course see unicast addresses on the server side if the server is
seeing requests forwarded by a udp helper.

> You can run redundant sets of isc-dhcpd servers together serving the 
> same broadcast domain and have them assign leases from the same
> address pools (at least, I've never tried it, but I was within

Indeed. Rock solid in my experience (on a "little" network).


-- 
Mike Meredith, University of Portsmouth
Principal Systems Engineer, Hostmaster, Security, and Timelord!
 


Re: Can somebody explain these ransomwear attacks?

2021-06-28 Thread Mike Meredith via NANOG
Hi!

On Fri, 25 Jun 2021 18:56:36 +0300, "Alex K."  may
have written:
> Ah ... and one more thing. Gladly, it is not our (network folks) life's
> complicated. It's system/DBA/and security folks, lifes. But I don't want
> to get cocky. We got SDN :-)

Yet. Probably.

Ransomware gangs /do/ target infrastructure - currently known to be DNS
servers (Microsoft), hypervisors, backups, etc. I wouldn't assume that they
wouldn't try attacking the network itself today or in the future.

-- 
Mike Meredith, University of Portsmouth
Hostmaster, Security, and Chief Systems Engineer
 


pgpLeSJFo9IJ9.pgp
Description: OpenPGP digital signature


Re: Colombia Network Operators Group

2019-09-25 Thread Mike Meredith via NANOG
On Mon, 23 Sep 2019 14:06:36 -0700, "Scott Weeks" 
may have written:
> >the Cisco Umbrella security researchers."  
> 
> Fascinating.  What is the security threat I wonder, that there is no 
> JavaScript?
> ---

Security threats aren't limited to JavaScript. It could be an entirely
static site which is still worth blocking (see phishing). 

Or it's possible that the registration is new enough that it's blocked just
for that reason - although at a month old, it should be beyond that window.
Or the site hasn't been categorised ("unknown") which is enough to block
for an especially Evil Firewall Admin[0]. 

0: I may be an Evil Firewall Admin, but I'm not an especially EFA.


-- 
Mike Meredith, University of Portsmouth
Hostmaster, Security, and Chief Systems Engineer
 


pgptidFEWJqmE.pgp
Description: OpenPGP digital signature


Re: Update to BCP-38?

2019-10-08 Thread Mike Meredith via NANOG
As an Evil Firewall Administrator™, I have an interest in this area ...

On Fri, 4 Oct 2019 15:05:29 -0700, William Herrin  may have
written:
> On Thu, Oct 3, 2019 at 2:28 PM Keith Medcalf  wrote
> > Anyone who says something like that is not a "security geek".  They are
> > a "security poser", interested primarily in "security by obscurity" and
> > "security theatre", and have no clue what they are talking about.

Hmm ... 'primarily in "security by obscurity"' ... that does tend to
indicate a severe case of cluelessness (and that's coming from someone who
doesn't let his right hand know what his left hand is up to without
justification that has been signed off in triplicate). To give a real world
example, removing headers from an Apache web server doesn't do much to
increase security (it's mostly to keep auditors happy) because automated
attacks will hit your exposed Apache servers anyway, and a sophisticated
attacker will note the removal and adopt the strategy of an automated
attack. 

> more important information you'd like to deny to him. There's a 5-step
> process used by the U.S. Military but the TL;DR version is: if you don't
> have to reveal something, don't.

You've ignored step 1 - identifying critical information that needs
protecting. It makes sense to protect information that needs protecting and
don't lose sleep over information that doesn't need protecting. Not many of
us are planning an invasion of a Nazi-infected Europe any time soon.
-- 
Mike Meredith, University of Portsmouth
Hostmaster, Security, and Chief Systems Engineer
 


pgpmEWhW6kP_b.pgp
Description: OpenPGP digital signature


Re: Update to BCP-38?

2019-10-09 Thread Mike Meredith via NANOG
On Tue, 8 Oct 2019 13:59:58 +, Mark Collins
 may have written:
> Not everyone attacking your systems is going to have the skills or
> knowledge to get in though - simple tricks (like hiding what web server
> you use) can prevent casual attacks from script kiddies and others who
> aren't committed to targeting you, freeing your security teams to focus
> on the serious threats.

Er ... no. Not according to real world data (my firewall logs).

Most attacks are fully automated and they don't (always) bother with
complex logic to determine which attacks to try. For instance I constantly
see Apache struts attacks against servers that a) may or may not be running
Apache (the headers are removed) b) definitely aren't running Struts. 

In fact many attacks are sufficiently automated that the human behind the
scenes won't even know a system has been compromised if it doesn't
successfully pick up the second stage of the payload and 'phone home'.

-- 
Mike Meredith, University of Portsmouth
Chief Systems Engineer, Hostmaster, Security, and Timelord!
 


pgpuN30Tt6VQC.pgp
Description: OpenPGP digital signature


Re: VDSL

2019-10-17 Thread Mike Meredith via NANOG
On Thu, 17 Oct 2019 09:45:35 +0100 (BST), "t...@pelican.org"
 may have written:
> The chickens have come home to roost now though, as they're struggling to
> find a cool branding for the subsequent FTTP roll-out, and not getting
> any better than "full fibre", a.k.a "we lied to you last time, but this
> time it really is..."

"We mispelt it last time - it should have been 'fibber broadband'; this
time it's proper 'fibre broadband'"

-- 
Mike Meredith, University of Portsmouth
Hostmaster, Security, and Chief Systems Engineer
 


pgpBXst7CoQwF.pgp
Description: OpenPGP digital signature