Re: Detection of Rogue Access Points

2012-10-14 Thread Martin Hepworth
How about some of the free network auditing tools like nmap even Spiceworks to detect the devices on your network? Martin On Sunday, 14 October 2012, Jonathan Rogers wrote: > Gentlemen, > > An issue has come up in my organization recently with rogue access points. > So far it has manifested itse

Re: Detection of Rogue Access Points

2012-10-14 Thread Peter Phaal
Do the layer 2 switches include sFlow instrumentation? http://sflow.org/products/network.php The following paper describes how IP TTL values can help identify unauthorized NAT devices. http://www.sflow.org/detectNAT/ Peter On Sun, Oct 14, 2012 at 1:59 PM, Jonathan Rogers wrote: > Gentlemen, >

If you are using APNIC as an RPKI trust anchor, please update your Trust Anchor Set.

2012-10-14 Thread George Michaelson
If you are using APNIC as an RPKI trust anchor, please update your Trust Anchor Set. APNIC will be switching to a new RPKI 'split' trust anchor system on the 25th of October. This change is needed to align APNIC administered resources with their allocation hierarchy. These resources will also be

Re: Detection of Rogue Access Points

2012-10-14 Thread Jon Sevier
On Sun, Oct 14, 2012 at 1:59 PM, Jonathan Rogers wrote: > Gentlemen, > > An issue has come up in my organization recently with rogue access points. > So far it has manifested itself two ways: > > 1. A WAP that was set up specifically to be transparent and provided > unprotected wireless access to

Re: Detection of Rogue Access Points

2012-10-14 Thread Roy
On 10/14/2012 1:59 PM, Jonathan Rogers wrote: Gentlemen, > > An issue has come up in my organization recently with rogue access > points. So far it has manifested itself two ways: > > 1. A WAP that was set up specifically to be transparent and provided > unprotected wireless access to our networ

Re: Detection of Rogue Access Points

2012-10-14 Thread Karl Auer
On Sun, 2012-10-14 at 16:59 -0400, Jonathan Rogers wrote: > An issue has come up in my organization recently with > rogue access points. No-one has said this yet, so I will - why are people working around your normal network policies? This is often a sign of something lacking that people need in t

Re: Attacking on Source Port 0 (ZERO)

2012-10-14 Thread Scott Weeks
--- sh.vahabza...@gmail.com wrote: From: Shahab Vahabzadeh It was TCP and I think it was not a DDoS attack because the traffic was not heavy. --- Many/most DoS attacks do not push up the traffic levels considerably. You can see this when looking at packet per sec

Re: Detection of Rogue Access Points

2012-10-14 Thread Suresh Ramasubramanian
SSL throughout the network, with access control enforced using certificates is certainly a good idea. But most of the problem you face is metrics and inventory control of authorized devices. Commercial WIPS gear does a lot of this heavy lifting without your having to script it all yourself. On M

Re: Attacking on Source Port 0 (ZERO)

2012-10-14 Thread Dobbins, Roland
On Oct 15, 2012, at 3:57 AM, Nick Hilliard wrote: > If you haven't already configured CoPP on your BRASs, you might want to look > at deploying it. CoPP is pretty much a wash on software-based boxes; it only really helps on hardware-based boxes. And iACLs is easier/a bigger win, anyways (thou

Re: Attacking on Source Port 0 (ZERO)

2012-10-14 Thread Dobbins, Roland
On Oct 15, 2012, at 2:59 AM, Shahab Vahabzadeh wrote: > I think it act like a warm or some attacks which cause high CPU load in some > IOS. i.e., a DDoS attack. You should configure iACLs at your edge so that random sources on the Internet can't packet your routers. Hopefully, you have hardw

Re: Detection of Rogue Access Points

2012-10-14 Thread Jimmy Hess
On 10/14/12, Jonathan Lassoff wrote: > I've yet to see a solid methodology for detecting NATing devices, > short of requiring 802.1x authentication using expiring keys and > one-time passwords. :p Or implement network access protection, w IPsec between the hosts and the resources on the LAN;

Re: Detection of Rogue Access Points

2012-10-14 Thread Suresh Ramasubramanian
restricting the number of mac addresses per switch port to one for your dhcp pool too, though more than one ap clones mac addresses. and make it unpopulr for the usual use cases by firewalling off stuff like dropbox, siri and icloud. there is of course commercial wips gear like this .. http://www

Re: Detection of Rogue Access Points

2012-10-14 Thread Jonathan Lassoff
On Sun, Oct 14, 2012 at 1:59 PM, Jonathan Rogers wrote: > Gentlemen, > > An issue has come up in my organization recently with rogue access points. > So far it has manifested itself two ways: > > 1. A WAP that was set up specifically to be transparent and provided > unprotected wireless access to

RE: Detection of Rogue Access Points

2012-10-14 Thread Kenneth M. Chipps Ph.D.
Scan the local network from the local network. From: Aaron C. de Bruyn [mailto:aa...@heyaaron.com] Sent: Sunday, October 14, 2012 5:44 PM To: Kenneth M. Chipps Ph.D. Cc: nanog@nanog.org Subject: Re: Detection of Rogue Access Points On Sun, Oct 14, 2012 at 3:27 PM, Kenneth M. Chipps Ph.D.

Re: Detection of Rogue Access Points

2012-10-14 Thread Aaron C. de Bruyn
On Sun, Oct 14, 2012 at 3:27 PM, Kenneth M. Chipps Ph.D. wrote: > Scan for devices with open port 80 as these are managed by a GUI. > That'd be tough if they plug the WAN port into your network and remote access isn't enabled. -A

RE: Detection of Rogue Access Points

2012-10-14 Thread Kenneth M. Chipps Ph.D.
Scan for devices with open port 80 as these are managed by a GUI. -Original Message- From: Jonathan Rogers [mailto:quantumf...@gmail.com] Sent: Sunday, October 14, 2012 3:59 PM To: nanog@nanog.org Subject: Detection of Rogue Access Points Gentlemen, An issue has come up in my organizati

Re: Detection of Rogue Access Points

2012-10-14 Thread Lyndon Nerenberg
On 2012-10-14, at 14:56 PM, Matthias Waehlisch wrote: > do you mean http://conferences.sigcomm.org/imc/2007/papers/imc122.pdf > ? That's the one!

Re: Detection of Rogue Access Points

2012-10-14 Thread Matthias Waehlisch
On Sun, 14 Oct 2012, Lyndon Nerenberg wrote: > There was a SIGCOMM paper a few years back that described a scheme > based on measuring the the ACK delays of TCP sessions. In a nutshell, > you can detect nodes on the wireless network by looking for the extra > delay added by the radio link. It

RE: Detection of Rogue Access Points

2012-10-14 Thread Dustin Jurman
Automated solution would be something like Air defense or Air Scout with sensors. Cheap solution would be to lock down your switches with port based authentication. Dustin Dustin Jurman CEO Rapid Systems Corporation 1211 N. West Shore Blvd. Suite 711 Tampa, FL 33607 Ph: 813-232-4887 http:

Re: Detection of Rogue Access Points

2012-10-14 Thread Lyndon Nerenberg
> I'm looking for innovative ideas on how to find such a rogue device, > ideally as soon as it is plugged in to the network. There was a SIGCOMM paper a few years back that described a scheme based on measuring the the ACK delays of TCP sessions. In a nutshell, you can detect nodes on the wirele

Re: Detection of Rogue Access Points

2012-10-14 Thread Jonathan Rogers
I should probably mention that we do not have any legitimate wireless devices at these locations. I realize that this complicates matters. The most recent one we found was found exactly like Joe suggested; we were looking at an ARP table for other reasons and found suspicious things (smartphones).

Re: Detection of Rogue Access Points

2012-10-14 Thread Joe Hamelin
-- Joe Hamelin, W7COM, Tulalip, WA, 360-474-7474 On Sun, Oct 14, 2012 at 1:59 PM, Jonathan Rogers wrote: > Gentlemen, > > > I'm looking for innovative ideas on how to find such a rogue device, > Check ARP tables for MAC address of wireless devices (first few nybbles show manufacturer.) Or for

Detection of Rogue Access Points

2012-10-14 Thread Jonathan Rogers
Gentlemen, An issue has come up in my organization recently with rogue access points. So far it has manifested itself two ways: 1. A WAP that was set up specifically to be transparent and provided unprotected wireless access to our network. 2. A consumer-grade wireless router that was plugged in

Re: Attacking on Source Port 0 (ZERO)

2012-10-14 Thread Nick Hilliard
On 14/10/2012 20:59, Shahab Vahabzadeh wrote: > But I see abnormal cpu usage (%99) in my BRAS's which are Cisco 7206 VXR. If you haven't already configured CoPP on your BRASs, you might want to look at deploying it. It won't solve this sort of problem, but it will probably help: > http://www.cis

Re: Attacking on Source Port 0 (ZERO)

2012-10-14 Thread Shahab Vahabzadeh
Hi there, It was TCP and I think it was not a DDoS attack because the traffic was not heavy. But I see abnormal cpu usage (%99) in my BRAS's which are Cisco 7206 VXR. I think it act like a warm or some attacks which cause high CPU load in some IOS. Thanks On Sun, Oct 14, 2012 at 5:13 PM, Dobbins,

Re: CLI Roadmap

2012-10-14 Thread shawn wilson
On Sun, Oct 14, 2012 at 5:55 PM, Rodrick Brown wrote: > On Oct 14, 2012, at 1:42 PM, Kasper Adel wrote: > >> Hello, >> >> I have never used any CLI other than Cisco so i am curious what useful and >> creative knobs and bolts are available for other network appliance Vendors. > > Eh?? > >> >> I gu

Re: CLI Roadmap

2012-10-14 Thread Rodrick Brown
On Oct 14, 2012, at 1:42 PM, Kasper Adel wrote: > Hello, > > I have never used any CLI other than Cisco so i am curious what useful and > creative knobs and bolts are available for other network appliance Vendors. Eh?? > > I guess what makes *NIX CLI/Shell so superior is that you can advanced >

CLI Roadmap

2012-10-14 Thread Kasper Adel
Hello, I have never used any CLI other than Cisco so i am curious what useful and creative knobs and bolts are available for other network appliance Vendors. I guess what makes *NIX CLI/Shell so superior is that you can advanced stuff from the CLI using sed, awk and all the great tools there so m

Re: best way to create entropy?

2012-10-14 Thread Oliver
On Friday 12 October 2012 00:01:18 shawn wilson wrote: > in the past, i've done many different things to create entropy - > encode videos, watch youtube, tcpdump -vvv > /dev/null, compiled a > kernel. but, what is best? just whatever gets your cpu to peak or are > some tasks better than others? Ha

Re: Is a /48 still the smallest thing you can route independently?

2012-10-14 Thread Edward Dore
RIPE Labs had an interesting article about filtering of /48 prefixes earlier this year that might be of some interest to you: https://labs.ripe.net/Members/emileaben/ripe-atlas-a-case-study-of-ipv6-48-filtering There's also a useful RIPE Labs article on general prefix filtering lengths from Aug

Re: Attacking on Source Port 0 (ZERO)

2012-10-14 Thread Dobbins, Roland
On Oct 14, 2012, at 4:48 PM, Shahab Vahabzadeh wrote: > Does any body know what kind of attack can be come to port 0? If it's protocol 0, instead of port 0, it's likely a packet-flooding DDoS attack. If it's port 0, you may be incorrectly blocking non-initial fragments. Alternately, it could

Re: best way to create entropy?

2012-10-14 Thread Sander Steffann
Hi, When you let OpenSSH use the egd protocol directly it will get its entropy from an egd daemon. Otherwise it uses /dev/random. When you use ekeyd-egd-linux then you feed the entropy from the egd daemon to the pool used for /dev/random. That way you are not completely dependent on the egd dae

Attacking on Source Port 0 (ZERO)

2012-10-14 Thread Shahab Vahabzadeh
Hi everybody, Does any body know what kind of attack can be come to port 0? I see such a logs in my routers which make high cpu loads: MYROUTERIP:0 *41.78.77.178:2816* MYROUTERIP:0 *217.160.5.153:2816* Thanks -- Regards, Shahab Vahabzadeh, Network Engineer and System Administrator Cell Phone:

Re: DNS caches that support partitioning ?

2012-10-14 Thread Florian Weimer
* John Levine: > Are there DNS caches that allow you to partition the cache for > subtrees of DNS names? That is, you can say that all entries from > say, in-addr.arpa, are limited to 20% of the cache. You can build something like that using forwarders and most DNS caches. But it won't result i