[160474] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Level3 worldwide emergency upgrade?

daemon@ATHENA.MIT.EDU (Siegel, David)
Wed Feb 6 12:12:49 2013

From: "Siegel, David" <David.Siegel@Level3.com>
To: 'Ray Wong' <rayw@rayw.net>, "nanog@nanog.org" <nanog@nanog.org>
Date: Wed, 6 Feb 2013 17:01:22 +0000
In-Reply-To: <CAM8Fm=5sRgMyHNSHxSNYiRm0-y7_EqGGq0GKC6Ff0OKeB23=Hw@mail.gmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Hi Ray,

This topic reminds me of yesterday's discussion in the conference around ge=
tting some BCOP's drafted.  it would be useful to confirm my own view of th=
e BCOP around communicating security issues.  My understanding for the best=
 practice is to limit knowledge distribution of security related problems b=
oth before and after the patches are deployed.  You limit knowledge before =
the patch is deployed to prevent yourself from being exploited, but you als=
o limit knowledge afterwards in order to limit potential damage to others (=
customers, competitors...the Internet at large).  You also do not want to a=
nnounce that you will be deploying a security patch until you have a fix in=
 hand and know when you will deploy it (typically, next available maintenan=
ce window unless the cat is out of the bag and danger is real and imminent)=
.

As a service provider, you should stay on top of security alerts from your =
vendors so that you can make your own decision about what action is require=
d.  I would not recommend relying on service provider maintenance bulletins=
 or public operations mailing lists for obtaining this type of information.=
  There is some information that can cause more harm than good if it is dis=
tributed in the wrong way and information relating to security vulnerabilit=
ies definitely falls into that category.

Dave

-----Original Message-----
From: Ray Wong [mailto:rayw@rayw.net]=20
Sent: Wednesday, February 06, 2013 9:16 AM
To: nanog@nanog.org
Subject: Re: Level3 worldwide emergency upgrade?

>

OK, having had that first cup of coffee, I can say perhaps the main reason =
I was wondering is I've gotten used to Level3 always being on top of things=
 (and admittedly, rarely communicating). They've reached the top by often b=
eing a black box of reliability, so it's (perhaps
unrealistically) surprising to see them caught by surprise. Anything that p=
ushes them into scramble mode causes me to lose a little sleep anyway. The =
alternative to what they did seems likely for at least a few providers who'=
ll NOT manage to fix things in time, so I may well be looking at longer out=
ages from other providers, and need to issue guidance to others on what to =
do if/when other links go down for periods long enough that all the cost-bo=
unding monitoring alarms start to scream even louder.

I was also grumpy at myself for having not noticed advance communication, w=
hich I still don't seem to have, though since I outsourced my email to bigG=
, I've noticed I'm more likely to miss things. Perhaps giving up maintainin=
g that massive set of procmail rules has cost me a bit more edge.

Related, of course, just because you design/run your network to tolerate so=
me issues doesn't mean you can also budget to be in support contract as wel=
l. :) Knowing more about the exploit/fix might mean trying to find a way to=
 get free upgrades to some kit to prevent more localized attacks to other t=
ypes of gear, as well, though in this case it's all about Juniper PR839412 =
then, so vendor specific, it seems?

There are probably more reasons to wish for more info, too. There's still m=
ore of them (exploiters/attackers) than there are those of us trying to kee=
p things running smoothly and transparently, so anything that smells of "OM=
G new exploit found!" also triggers my desire to share information. The net=
work bad guys share information far more quickly and effectively than we do=
, it often seems.

-R>



home help back first fref pref prev next nref lref last post