North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: TCP-ACK vulnerability (was RE: SSH on the router)

  • From: Stephen J. Wilcox
  • Date: Fri Jun 11 13:11:30 2004

Private addressing/non routing of the netblock is only of limited use.

I assume here the block is in the IGP.. the more customers/networks you serve 
the more chance of an attack coming from within.

Steve

On Thu, 10 Jun 2004, Alexei Roudnev wrote:

> 
> Do you have any (even minimal) need to allocate globally routable IP to the
> VLAN1 interface?
> 
> Other thing is that, even if I can find your switch, I will not have any
> minimal idea, that it is _your_ switch and any minimal need to break it. You
> can (easily) allocated all switch and router loopback IP in private network
> many years ago, and filtered out this network on all inbound interfaces.
> 
> Even if I (if been a hacker) scan your networks and find this switch (and
> you did not moved it out of routable P),
> I will have not any idea, what is it about, where this switch is, and have
> not any reason to break it...
> 
> 
> 
> 
> ----- Original Message ----- 
> From: "Sean Donelan" <[email protected]>
> To: <[email protected]>
> Sent: Thursday, June 10, 2004 4:19 AM
> Subject: Re: TCP-ACK vulnerability (was RE: SSH on the router)
> 
> 
> >
> > On Wed, 9 Jun 2004, Alexei Roudnev wrote:
> > > This is minor exploit - usually you set up VLAN1 interface with IP
> addres,
> > > which is filterd out from outside. Moreover, there is not any good way
> to
> > > find switch IP - it is transparent for user's devices.
> >
> > Yeah, port scanners are so rare on the Internet they'll never find your
> > IP address.  Its not as if the switches have an easy to detect banner
> > signature, and everyone uses out-of-band management for all their network
> > equipment.
> >
> 
>