[71132] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

TCP-ACK vulnerability (was RE: SSH on the router)

daemon@ATHENA.MIT.EDU (Sean Donelan)
Wed Jun 9 15:18:37 2004

Date: Wed, 9 Jun 2004 15:15:42 -0400 (EDT)
From: Sean Donelan <sean@donelan.com>
To: nanog@merit.edu
In-Reply-To: <9BF6F06C4BC90746ADD6806746492A33E93DDC@msmmail01.msmgmt.com>
Errors-To: owner-nanog-outgoing@merit.edu


On Mon, 7 Jun 2004, McBurnett, Jim wrote:
> Aside from that, Use ACL's out the wazoo on the VTY lines and limit access to
> that to say 1 SSH enabled router or 1 IPSEC enabled router...

It doesn't really matter if you use SSH, Telnet or HTTP; if you can send
evil packets to the router/switch and it falls over and dies.

http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml

IP Permit Lists will not provide any mitigation against this vulnerability.

The race is on, who will find your switches first?


home help back first fref pref prev next nref lref last post