Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: Should nmap cause a DoS on cisco routers?
From: Dan Kaminsky <dan () doxpara com>
Date: Thu, 1 Jul 2010 20:01:26 -0400

Permanent DoS's are unacceptable even from intentionally malicious  
traffic, let alone a few nmap flags. They're unacceptable to us,  
they're unacceptable to Microsoft (see: MSRC bug bar), and even Cisco  
PSIRT has shown up on thread desiring to clean things up.

It's funny you bring up SNMP. Do you remember what happened when that  
protocol got fuzzed by the PROTOS guys in 2002?  Every network device  
on the planet pretty much exploded. I will grant you that network  
isolation is indeed best practice, but broken code is not something to  
apologize for or mitigate against.  It's something to apply real  
pressure against.  If we can't get pissed, how is that QA guy supposed  
to block shipment?

(That being said, you'll note 'it's code you just shouldn't run' is  
wrong. First thing's first, the network has to function. We route  
packets with the infrastructure we have, etc.  But products that can't  
survive nmap are likely going to have real problems with actual  
exploit tools, and RCE in routers is not something to risk, 'best  
practice mitigations' or no.)

On Jul 1, 2010, at 7:16 PM, "Dobbins, Roland" <rdobbins () arbor net>  
wrote:


On Jul 1, 2010, at 11:12 PM, Florian Weimer wrote:

And it's certainly a bug worth fixing.

I doubt it's a 'bug' which can be 'fixed', just the same as sending  
enough legitimate HTTP requests to a Web server to bring it to its  
knees isn't a 'bug' which can be 'fixed', but rather a DoS which  
must be mitigated via a variety of mechanisms.  It would be quite  
helpful if the original poster would detail the models/types/ 
versions of the network devices in question, and possibly provide a  
sample query packet.

Part of the general issue here is the large disconnect between the  
traditional security research community and the networking  
community; with a few notable exceptions, there isn't a lot of  
mutual discussion and understanding, and certainly no understanding  
of network infrastructure device architectures, best current  
practices (BCPs), and so forth.

One of the most fundamental BCPs is that one must make use of  
various network infrastructure self-protection mechanisms to keep  
undesirable traffic away from the control and management planes of  
said network infrastructure.  Here's a .pdf presentation which  
discusses network infrastructure self-protection:

<http://files.me.com/roland.dobbins/prguob>

Firing a bunch of SNMP queries at network infrastructure devices and  
causing network disruption as a result isn't anything new, it's a  
well-understood phenomenon with a well-understood - in the network  
operational community, at least - remedy via making use of the  
appropriate self-protection mechanisms built into most modern  
network infrastructure devices.

--- 
--------------------------------------------------------------------
Roland Dobbins <rdobbins () arbor net> // <http://www.arbornetworks.com>

   Injustice is relatively easy to bear; what stings is justice.

                       -- H.L. Mencken



_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]