Cisco releases patch for critical flaw in CiscoWorks

Cisco has released a patch that fixes a vulnerability in CiscoWorks Common Services that could allow an unauthenticated remote attacker to access application and host operating system files. The exploitability of this flaw is rated as high. Note that only CiscoWorks Common Services systems that run on Microsoft Windows are vulnerable. The Solaris version is not affected.

Specifically the following Cisco products that use CiscoWorks Common Services as their base are affected by this vulnerability.

* Cisco Unified Service Monitor versions 1.0, 1.1, 2.0, and 2.1
* CiscoWorks QoS Policy Manager versions 4.0 and 4.1
* CiscoWorks LAN Management Solution versions 2.5, 2.6, 3.0, and 3.1
* Cisco Security Manager versions 3.0, 3.1, and 3.2
* Cisco TelePresence Readiness Assessment Manager version 1.0
* CiscoWorks Voice Manager versions 3.0 and 3.1
* CiscoWorks Health and Utilization Monitor versions 1.0 and 1.1
* Cisco Unified Operations Manager versions 1.0, 1.1, 2.0, and 2.1
* Cisco Unified Provisioning Manager versions 1.0, 1.1, 1.2, and 1.3

Source: NetworkWorld.com

Nortel continues the enterprise fight

NortelEven though it filed Chapter 11 and is reportedly looking to sell off huge chunks of its business, Nortel is not giving up the enterprise fight.

The company this week will unveil its next generation large enterprise core/data center aggregation switch. The Virtual Service Platform 9000 is Nortel’s entry into the increasingly crowded core data center switch field, which has seen numerous announcements of late from Nortel’s competitors: Force10, Extreme, Juniper and even 3Com, which is re-entering the battle to provide a lower cost alternative to Cisco during these trying economic times.
Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory: Download now

Nortel says the VSP 9000 will go up against Cisco’s Nexus 7000, Force10’s ExaScale, Extreme’s BlackDiamond 8900, Brocade’s BigIron RX, Juniper’s EX8216, 3Com’s S12500 and any other switch approaching or exceeding 100Gbps per slot capacity and designed to aggregate hundreds of 10Gbps Ethernet ports.

Nortel’s challenges are significant, however. The company is restructuring under Chapter 11 bankruptcy protection from creditors so its future is uncertain. Also, the VSP 9000 won’t ship for another year, while most competitor offerings are already on the market.

Read the full article on NetworkWorld.com

Cisco: DoS protection using TCP Intercept

Every now and then, all network engineers have to deal with some kind of network attack.  Usually, the attack does not target the network devices, but the machines that provide services (e.g. www, database hosting…), because it’s more easy to find on the Internet a script that is probing port 80 for example, which by the way any kiddie can use, than to corrupt BGP in order to act as man-in-the-middle. Anyway, in front on the machine being attacked, there is a network device and even if the network component is not the target it can be affected (e.g. high traffic encounter during a denial-of-service attack). So, beside the fact that we have to protect the network components, we have the duty (at least moral) to help the team that is managing the servers to mitigate the attack.

For those of you who are not familiar I will explain shortly what is a Denial-of-Service (DoS) attack. A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, web hosting and so on. One common method of attack involves saturating the target machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. This extreme external communications requests can be achieved using ICMP flood, peer-to-peer attack, teardrop attack, nuke, application level floor and many other (too many…) methods and the purpose of this is the consuming of resources on the target machine so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.

On method to prevent DoS attacks is to limit on the network device ( network router) the amount of connection which is allowed to pass to a server by using  TCP Intercept. The TCP intercept feature helps prevent SYN-flooding attacks by intercepting and validating TCP connection requests. In intercept mode, the TCP intercept software intercepts TCP synchronization (SYN) packets from clients to servers that match an extended access list. The software establishes a connection with the client on behalf of the destination server, and if successful, establishes the connection with the server on behalf of the client and knits the two half-connections together transparently. Thus, connection attempts from unreachable hosts will never reach the server. The software continues to intercept and forward packets throughout the duration of the connection.

The main steps to enable TCP Intercept are:

1. Define an IP extended access list
2.
Enable TCP intercept
3. Fine tune TCP intercept parameter

The TCP intercept can operate in either active intercept mode or passive watch mode. The default is intercept mode.
In intercept mode, the software actively intercepts each incoming connection request (SYN) and responds on behalf of the server with an ACK and SYN, then waits for an ACK of the SYN from the client. When that ACK is received, the original SYN is set to the server and the software performs a three-way handshake with the server. When this is complete, the two half-connections are joined.

In watch mode, connection requests are allowed to pass through the router to the server but are watched until they become established. If they fail to become established within a definite interval, the software sends a Reset to the server to clear up its state.

In the following topology we have the Server (10.10.10.100) and the possible Attacker (10.10.20.100). In the middle we have the router called R1 which is reponsible to mitigate the attack to port 80 on the Server. For this I would chose to apply the following configuration:

access-list 101 permit tcp any host 10.10.10.100 eq 80

ip tcp intercept mode intercept
ip tcp intercept list 101
ip tcp intercept max-incomplete high 150
ip tcp intercept max-incomplete low 100
ip tcp intercept drop-mode oldest

Some explanation for the line above. We create an access-list matching the traffic from anywhere to the Server. We set the TCP intercept mode to intercept (this is not need actually, because it’s the default mode; I put it here just for the sanity of the example). When the connections are over 150 (…max-incomplete high 600) the router will start to drop connections starting with the oldest ones (..drop-mode oldest). As soon as the connection will be under 100, the router will cease to drop the connections. This are just values used for this example.

To check the TCP intercept you can use the following commands on the Cisco router:

show tcp intercept connections
show tcp intercept statistics

To check a live example of what you should see if your TCP Intercept configuration is working properly please click on the image below. The test is done in Dynamips environment with 2 VMware machines (client and server) using Ubuntu and a Cisco 3640 series router.

Cisco TCP Intercept

Two CCIE R&S Certification Webinars

Source: https://cisco.hosted.jivesoftware.com/docs/DOC-4862

Cisco will conduct two webinar events on Wednesday, May 20, 2009 to describe recent enhancements to CCIE R&S certification and Cisco 360 Learning Program for CCIE R&S.
Attendees can choose from calls at 8:00 am and 7:00 pm PST.
Participants need only attend one event as content will be identical.

Registration information is as follows:

MEETING DETAILS

Meeting Name: CCIE R&S Refresh
Date/Time: 5/20/2009 @ 8:00 AM and 7:00PM US/Pacific Time
Length: 90 minutes
Frequency: Once
Meeting ID: 222333

Register for each event:

Please visit https://cisco.hosted.jivesoftware.com/docs/DOC-4862 to register for this event.

Join the Voice Conference

1. Call MeetingPlace:

Toll-free (US only): 1-800-370-2618

Toll-free (Canada only): 1-800-370-2618

International Direct Dial: 1-650-599-0315

2. Press 1 to attend a meeting.

3. Enter Meeting ID (222333) followed by the # key.

4. Follow the prompts to record your name and enter the meeting.

Join the Web Conference

1.    Disable any pop-up blocker software.

2.    Go to http://gc46gw1.meetingplace.net.

3.    Enter meeting ID (222333) and click Attend Meeting.

4.    Enter your first and last name in the My name is box and click Attend Meeting.

5.    Answer Yes to any security warnings you receive and wait for the Meeting Room to initialize.

Please read more on: https://cisco.hosted.jivesoftware.com/docs/DOC-4862

Encryption and decryption half century ago

enigmaI know that it’s not the latest discovery in cryptography area, but still this device amazed me with it’s ingenious construction and way of utilization.

An Enigma machine is any of a family of related electro-mechanical rotor machines used for the encryption and decryption of secret messages. The first Enigma was invented by German engineer Arthur Scherbius at the end of World War I. This model and its variants were used commercially from the early 1920s, and adopted by military and government services of several countries — most notably by Nazi Germany before and during World War II. A range of Enigma models was produced, but the German military model, the Wehrmacht Enigma, is the version most commonly discussed.

The machine has become notorious because Polish mathematicians-cryptographers and then Allied cryptographers were able to cryptanalyze, and thus decrypt, a vast number of messages which had been enciphered using the Enigma. The intelligence gleaned from this source, codenamed ULTRA by the British, was a substantial aid to the Allied war effort. The exact influence of ULTRA is debated, but an oft-repeated assessment is that decryption of German ciphers hastened the end of the European war by two years.

Though the Enigma cipher had cryptographic weaknesses, in practice it was only in combination with other factors (procedural flaws, operator mistakes, occasional captured hardware and key tables, etc.) that those weaknesses allowed Allied cryptographers to cryptanalyze so many messages.

Enigma cryptanalysis contributed greatly to the success of Allied war efforts—in the Battle of Matapan in March 1941; in course of the Battle of the Atlantic, beginning in the latter part of 1941; in Rommel’s efforts to capture Cairo in 1942; in the invasion of Sicily (1943) and mainland Italy (1943–44); in the planning and execution of Operation Overlord (the Allied invasion of France, 1944); and in the subsequent drive to and through Germany. Evidence suggests that Soviet strategy and tactics against Nazi Germany likewise benefited from Ultra intelligence, conveyed to the Soviets by a variety of conduits.

Below you can see a demonstration of how Enigma was used to encrypt and decrypt messages thanks to NetworkWorld.com:

For more detailed presentation please read:
http://en.wikipedia.org/wiki/Enigma_machine
http://en.wikipedia.org/wiki/Cryptanalysis_of_the_Enigma

Brought to you by NetworkWorld.tv and FirstDigest