North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

RE: Internet vulnerabilities

  • From: jnelson
  • Date: Thu Jul 04 17:00:49 2002

Ah... "More info ?" When all else fails RTFM. 
Thanks (non-disgruntled DE?),
J


-----Original Message-----
From: Richard E. Perlotto II [mailto:[email protected]] 
Sent: Thursday, July 04, 2002 3:28 PM
To: 'jnelson'; 'batz'; 'Jason Lewis'
Cc: [email protected]
Subject: RE: Internet vulnerabilities

Actually all the Cisco images have a MD5 hash included on the download
page.  You can check all of your images verses what is on the web.  The
12.2.8T
train also has a built in MD5 checksum for validation.  We are doing
what we
can to help.


Richard

> -----Original Message-----
> From: [email protected] [mailto:[email protected]] On Behalf
Of jnelson
> Sent: Thursday, July 04, 2002 12:47 PM
> To: 'batz'; 'Jason Lewis'
> Cc: [email protected]
> Subject: RE: Internet vulnerabilities
> 
> 
> How about this:
> ISP X had its tftp server compromised by a wily hacker who evaded
> tripwire and covered his track well, uploaded some cracked Cisco code
> (the current release for their GSRs). This code was designed to
corrupt
> the directories and shut down the router at date XX:XX:XX. Each of
these
> affected GSRs, 7-five new roll-outs and 2 upgrades--went down at the
> same time (save one who's time was no set correctly). Each site had to
> driven to, flashcards replaced. ISP X severely crippled for 6 hours.
The
> hacker could have gone the extra leg to have the tftp server expunge
the
> backup configs at the same time--extra couple hours--but did not.
> 
> We all download code from Cisco/Juniper/Bay in good faith... when's
the
> last time you saw a signature attached to any of those? Most security
> breeches happen from within anyway. A disgruntled DE....
> 
> Just a wicked thought.
> j
> 
> -----Original Message-----
> From: [email protected] [mailto:[email protected]] On Behalf
Of
> batz
> Sent: Thursday, July 04, 2002 2:17 PM
> To: Jason Lewis
> Cc: [email protected]
> Subject: Re: Internet vulnerabilities
> 
> 
> On Thu, 4 Jul 2002, Jason Lewis wrote:
> 
>:What are the real threats to the global Internet?
> 
> I realize this seems like  nitpicking, but asking what the real risks
> are
> might be a more useful question. The reason I mention this is because
> the
> washington post report the other day about threats to SCADA systems
was
> blown out of proportion, because it equated the seriousness of the
> threats
> with their associated risks. Yes, most ASN.1 implementations have
> serious
> vulnerabilities, welcome to 1988.
> 
> The ASN.1 vulnerabilities being talked about right now are serious
> threats,
> but lower risk than say, millions of unpatched IIS and apache servers,
> public exploits and a worm on the loose. Application level
> vulnerabilities
> that have to be patched on a host by host basis, cause a greater risk
> than
> say, SNMP vulnerabilities that can be filtered at the gateway, which
> protects from opportunistic external attacks.
> 
> When you talk about threats to the global Internet, there are hundreds
> of
> equally serious vulnerabilities of varying risk. Also, the "global
> Internet"
> has many different meanings. It can mean "the ability to send and
> recieve
> packets on layer 3" or "people being able to conduct business
> electronically,
> with some reasonable expectation of the confidentiality, integrity and
> reliability of their transactions."
> 
> So, it all depends on what you mean by the Internet:) I think this is
> an extremely important discussion to have on the list, I just think
> it should be framed in terms of real risks, root causes, and
> potential solutions.
> 
> 
>:I am looking for anything that might be a potential attack point.  I
> don't
>:want to start a flame war, but any interesting or even way out there
> idea
>:is welcome.
>:
>:Is it feasible that a coordinated attack could shutdown the entire
net?
> I
>:am not talking DDoS.  What if someone actually had the skills to
> disrupt
>:BGP on a widescale?
> 
> Once you start thinking about the Internet from a security
perspective,
> you realize there is no "entire net" subject to the sum of its parts
in
> any practical sense. It is a network of networks that serves a
continuum
> 
> of interests, bounded by economics, and driven by porn. ;)
> 
> The attack point is anywhere you think will do the most harm to the
> people you dislike. If you just want to break something, find serious,
> easy to exploit, security design limitations in BGP, MPLS, BIND and
> drive a major global backbone like UUNet into insolvency.
> 
> ..What? Oh ...Too late.
> 
> --
> batz
>