Re: [NANOG] IOS rootkits

2008-05-17 Thread Joel Jaeggli
Mark Smith wrote: > On Sat, 17 May 2008 09:34:19 -0500 > [EMAIL PROTECTED] wrote: > >> On Sat, May 17, 2008 at 04:47:02PM +0930, Matthew Moyle-Croft wrote: >>> I'm sure it'll be good for a number of security providers to hawk their >>> wares. >>> >>> If the way of running this isn't out in the wi

Re: [NANOG] Routing table for BGP

2008-05-17 Thread devang patel
hello All, Yeah NANOG knowledge base is really great... thanks to all of you for your help... regards Devang Patel On Fri, May 16, 2008 at 10:25 AM, Christopher Morrow < [EMAIL PROTECTED]> wrote: > On Fri, May 16, 2008 at 11:00 AM, Barry Raveendran Greene > <[EMAIL PROTECTED]> wrote: > > > > Th

Re: [NANOG] Limiting ICMP

2008-05-17 Thread Kameron Gasso
Drew Weaver wrote: > (do people still DDoS with ICMP these days? I see a lot of what looks like > udp.pl and hardly any ICMP attack traffic anymore) We saw a small attempted attack using ICMP a few weeks ago, but as you've mentioned I've mostly been seeing UDP floods (and the occasional TCP SYN

[NANOG] Limiting ICMP

2008-05-17 Thread Drew Weaver
Hi there, I'm wondering if anyone else has run into this/has heard of/(is responsible for)/knows the reason behind large IP providers limiting ICMP on outbound connections to the same amounts regardless of the size of the circuit? Apparently after one of our upstream providers swit

Re: [NANOG] IOS rootkits

2008-05-17 Thread Mark Smith
On Sun, 18 May 2008 09:29:47 +0930 Mark Smith <[EMAIL PROTECTED]> wrote: > On Sat, 17 May 2008 09:34:19 -0500 > [EMAIL PROTECTED] wrote: > > > On Sat, May 17, 2008 at 04:47:02PM +0930, Matthew Moyle-Croft wrote: > > > I'm sure it'll be good for a number of security providers to hawk their > > >

Re: [NANOG] IOS rootkits

2008-05-17 Thread Gadi Evron
On Sun, 18 May 2008, Mark Smith wrote: > > "Reflections on Trusting Trust" > http://cm.bell-labs.com/who/ken/trust.html That is the #1 paper on security anyone can read, and reading your email I was about to ask if you ever read it. It certainly is my fav. Thanks for reminding us all of the url.

Re: [NANOG] IOS rootkits

2008-05-17 Thread Mark Smith
On Sat, 17 May 2008 09:34:19 -0500 [EMAIL PROTECTED] wrote: > On Sat, May 17, 2008 at 04:47:02PM +0930, Matthew Moyle-Croft wrote: > > I'm sure it'll be good for a number of security providers to hawk their > > wares. > > > > If the way of running this isn't out in the wild and it's actually >

Re: [NANOG] IOS rootkits

2008-05-17 Thread Gadi Evron
On Sat, 17 May 2008, Felix 'FX' Lindner wrote: > > But I don't see a reason for panic and Cisco is at least partially > right with their response > ( > http://www.cisco.com/en/US/products/products_security_response09186a0080997783.html > ) > to the whole issue: someone still needs a privilege lev

Re: [NANOG] IOS rootkits

2008-05-17 Thread michael.dillon
> The question isn't IF routers have security vunerabilities, > but whether Gadi has an example he can demonstrate now of > installing a root kit on an IOS router NOW or not. That's not really the question. In fact, there are two questions. First, are routers really embedded devices running a s

Re: [NANOG] IOS rootkits

2008-05-17 Thread Florian Weimer
* Joel Jaeggli: > The existence proof of a root kit does little if anything to change how > one protects and secures the control plane. | Network administrators are not able to observe Lawful Intercept is | enabled. No Lawful Intercept program messages or error messages are ever | displayed on t

Re: [NANOG] financing IRU purchase

2008-05-17 Thread John Curran
At 7:41 AM -0700 5/17/08, Zitibake wrote: >I'm looking for financing sources to help with the purchase of an IRU within >my metro area. I'd be interested in hearing suggestions of how to describe >the asset to potential lenders; or in hearing of lenders that are already >familiar with IRUs as "

Re: [NANOG] IOS rootkits

2008-05-17 Thread Joel Jaeggli
Gadi Evron wrote: >> The question isn't IF routers have security vunerabilities > > Nope, the question is not about if routers have security vulnerabilities. > The question is how operators and organizations can defend their routers > against rootkits, and cisco's practices. > The existence pr

[NANOG] financing IRU purchase

2008-05-17 Thread Zitibake
I'm looking for financing sources to help with the purchase of an IRU within my metro area. I'd be interested in hearing suggestions of how to describe the asset to potential lenders; or in hearing of lenders that are already familiar with IRUs as "attachable assets". ___

Re: [NANOG] IOS rootkits

2008-05-17 Thread travis+ml-nanog
On Sat, May 17, 2008 at 04:47:02PM +0930, Matthew Moyle-Croft wrote: > I'm sure it'll be good for a number of security providers to hawk their > wares. > > If the way of running this isn't out in the wild and it's actually > dangerous then a pox on anyone who releases it, especially to gain > p

Re: [NANOG] RackMount DC to AC Inverters

2008-05-17 Thread Tim Jackson
Check out Unipower. They make a stackable N-1 setup that does 30+ amps (redundantly) of 110 in 2U. Just remember to wire up their sync cable if you parallel 2 or more shelves. -- Tim On 5/16/08, Gregory Boehnlein <[EMAIL PROTECTED]> wrote: > Hello all, > I have some equipment going into

Re: [NANOG] IOS rootkits

2008-05-17 Thread Gadi Evron
On Sat, 17 May 2008, Matthew Moyle-Croft wrote: > >> I'd love to know what magical mystical protection your routers have that >> will >> enable them to avoid the same fate as every other device and operating >> system >> has. There's only one thing up there that doesn't have known rootkits >> in

Re: [NANOG] IOS rootkits

2008-05-17 Thread Gadi Evron
On Sat, 17 May 2008, Matthew Moyle-Croft wrote: > >> >> It is alright to have feelings. >> >> Gadi. > So I ask again, expecting nothing but another flippant answer: I will honour you flame-bait, but only once. > Do you actually have live examples of this or able to demonstrate it or are >

Re: [NANOG] IOS rootkits

2008-05-17 Thread Tuc at T-B-O-H.NET
> > > > I'd love to know what magical mystical protection your routers have that > > will > > enable them to avoid the same fate as every other device and operating > > system > > has. There's only one thing up there that doesn't have known rootkits > > in the wild. Yet. > > > The question

Re: [NANOG] IOS rootkits

2008-05-17 Thread Matthew Moyle-Croft
> I'd love to know what magical mystical protection your routers have that will > enable them to avoid the same fate as every other device and operating system > has. There's only one thing up there that doesn't have known rootkits > in the wild. Yet. > The question isn't IF routers have secur

Re: [NANOG] IOS rootkits

2008-05-17 Thread Matthew Moyle-Croft
> > It is alright to have feelings. > > Gadi. So I ask again, expecting nothing but another flippant answer: Do you actually have live examples of this or able to demonstrate it or are you just theorising about it all? MMC ___ NANOG mailing lis

Re: [NANOG] IOS rootkits

2008-05-17 Thread Mark Smith
On Sat, 17 May 2008 07:03:58 -0500 (CDT) Gadi Evron <[EMAIL PROTECTED]> wrote: > On Sat, 17 May 2008, Matthew Moyle-Croft wrote: > > > >> The question is who can't afford for these things to happen... > >> > >>Gadi. > >> > >> > > I can't help but feel you're pushing fear to further some ot

Re: [NANOG] IOS rootkits

2008-05-17 Thread Gadi Evron
On Sat, 17 May 2008, Matthew Moyle-Croft wrote: > >> The question is who can't afford for these things to happen... >> >> Gadi. >> >> > I can't help but feel you're pushing fear to further some other interest here > Gadi. It is alright to have feelings. Gadi. __

Re: [NANOG] IOS rootkits

2008-05-17 Thread Matthew Moyle-Croft
> The question is who can't afford for these things to happen... > > Gadi. > > I can't help but feel you're pushing fear to further some other interest here Gadi. Do you actually have live examples of this or able to demonstrate it or are you just theorising about it all? MMC _

Re: [NANOG] IOS rootkits

2008-05-17 Thread Gadi Evron
On Sat, 17 May 2008, Simon Lockhart wrote: > On Sat May 17, 2008 at 04:47:02PM +0930, Matthew Moyle-Croft wrote: >> Paul Wall wrote: >>> What if some good comes from this "root kit"? >>> >> I'm sure it'll be good for a number of security providers to hawk their >> wares. > > How long before we need

Re: [NANOG] IOS rootkits

2008-05-17 Thread Gadi Evron
On Sat, 17 May 2008, Suresh Ramasubramanian wrote: > On Sat, May 17, 2008 at 12:47 PM, Matthew Moyle-Croft > <[EMAIL PROTECTED]> wrote: >> If the way of running this isn't out in the wild and it's actually >> dangerous then a pox on anyone who releases it, especially to gain >> publicity at the exp

Re: [NANOG] IOS rootkits

2008-05-17 Thread n3td3v
On Sat, May 17, 2008 at 11:12 AM, Suresh Ramasubramanian <[EMAIL PROTECTED]> wrote: > On Sat, May 17, 2008 at 12:47 PM, Matthew Moyle-Croft > <[EMAIL PROTECTED]> wrote: >> If the way of running this isn't out in the wild and it's actually >> dangerous then a pox on anyone who releases it, especiall

Re: [NANOG] IOS rootkits

2008-05-17 Thread Jon Kibler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Suresh Ramasubramanian wrote: > On Sat, May 17, 2008 at 12:47 PM, Matthew Moyle-Croft > <[EMAIL PROTECTED]> wrote: >> If the way of running this isn't out in the wild and it's actually >> dangerous then a pox on anyone who releases it, especially to ga

Re: [NANOG] IOS rootkits

2008-05-17 Thread Suresh Ramasubramanian
On Sat, May 17, 2008 at 12:47 PM, Matthew Moyle-Croft <[EMAIL PROTECTED]> wrote: > If the way of running this isn't out in the wild and it's actually > dangerous then a pox on anyone who releases it, especially to gain > publicity at the expensive of network operators sleep and well being. > May yo

Re: [NANOG] IOS rootkits

2008-05-17 Thread Gadi Evron
On Sat, 17 May 2008, Paul Wall wrote: > What if some good comes from this "root kit"? > > For instance, what if it lets us fix things like DOM on non-Cisco > XENPAKs and SFPs? Or lets us un-cripple our 6500 chassis to run the > code we want? > > Of course, given the messenger, I'm sure it's just h

Re: [NANOG] US DoD receives chunked IPv6 /13 (14x /22 but not totally consecutive)

2008-05-17 Thread Christopher LILJENSTOLPE
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 You certainly don't have to. However, as other folks have indicated here, that is the way that some folks read it. My guess is that this was purely for network topology and administrative reasons. Chris On 16 May 2008, at 12.51, Colin A

Re: [NANOG] peering between ASes

2008-05-17 Thread Nathan Ward
On 17/05/2008, at 5:53 PM, Matthew Moyle-Croft wrote: > Nathan Ward wrote: >> If the foreign AS really wants to send you routes that way, they >> can do it regardless of how you stop your advertisements being >> accepted by/ reaching them. We're hardly talking high security here. >> >> ip rout

Re: [NANOG] IOS rootkits

2008-05-17 Thread Matthew Moyle-Croft
Simon Lockhart wrote: > > How long before we need to install Anti-virus / Anti-root-kit software on > our routers? > Nah - we'll just replace them all with Macs. They don't need anti-virus ... :-) MMC > Simon > ___ NANOG mailing list NANOG@nano

Re: [NANOG] IOS rootkits

2008-05-17 Thread Simon Lockhart
On Sat May 17, 2008 at 04:47:02PM +0930, Matthew Moyle-Croft wrote: > Paul Wall wrote: > > What if some good comes from this "root kit"? > > > I'm sure it'll be good for a number of security providers to hawk their > wares. How long before we need to install Anti-virus / Anti-root-kit software

Re: [NANOG] IOS rootkits

2008-05-17 Thread Matthew Moyle-Croft
Paul Wall wrote: > What if some good comes from this "root kit"? > I'm sure it'll be good for a number of security providers to hawk their wares. If the way of running this isn't out in the wild and it's actually dangerous then a pox on anyone who releases it, especially to gain publicity at