Purpose for posting it was, after reading it, there is not enough in my opinion to warrant a nuclear lock down on this information. I did this to sort of prove a point to those in the industry: "Stop letting vendors sell you short." As an engineer they've (Cisco) shortchanged clients using their equipment. If it's IPv6 based only, and not that big of a threat, then they should see no problem with the information being released. Before anyone decides to send in legal hounds, take note this is searchable via Google... 5 minutes tops with over 100+ sites listing the PDF. Sorry Cisco. On Fri, 12 Aug 2005, Gadi Evron wrote:
J. Oquendo wrote:
www.infiltrated.net/cisco/holygrail.pdf
I find it rather funny, really.
Back in defcon, everybody was trading the presentation quietly and eagerly.
Then every kiddie started asking if anyone wants it.
Then we all got URL's to download it from.
Then there was another pass of "psst, want the Lynn presentation?"
And eventually, there was a CD placed on every table at defcon with the presentation.
Seeing big-time secret-handshake groups take this with a whisper and a "if I know you, email me and I might share it" was a bit silly.
Once again every Bad Guy in town had it and the Good Guys didn't want to share under different excuses, some good, some sad.
I find that sharing the presentation openly on NANOG is a bit of a bad move because of how some may perceive it and you, but it has become completely silly not to do it. So I ask that people reserve judgment.. I was very tempted to do it myself.
Gadi.
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ J. Oquendo GPG Key ID 0x97B43D89 http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x97B43D89 To conquer the enemy without resorting to war is the most desirable. The highest form of generalship is to conquer the enemy by strategy." - Sun Tzu
Saying that this is IPv6 only is misleading. The point of Mike's talk was to show that buffer overflows do more than DOS or reset a Cisco box, but they can actually be exploited like most things we learn about every Patch Tuesday. In the example he used in the talk, he showed off an exploit that took advantage of a buffer overflow in the IPv6 code, but patching that one bug does not mean you'll never see this type of exploit again. Yes, any vendor big or small should realize that if they try to hide things instead of fixing them and owning up, it's just a matter of time until we find it for ourselves, and maybe next time the researcher will be a black hat, also playing secret like Cisco. Imagine the PR bruise that will cause. John On Fri, Aug 12, 2005 at 12:33:40PM -0400, J. Oquendo wrote:
Purpose for posting it was, after reading it, there is not enough in my opinion to warrant a nuclear lock down on this information. I did this to sort of prove a point to those in the industry: "Stop letting vendors sell you short." As an engineer they've (Cisco) shortchanged clients using their equipment. If it's IPv6 based only, and not that big of a threat, then they should see no problem with the information being released.
Before anyone decides to send in legal hounds, take note this is searchable via Google... 5 minutes tops with over 100+ sites listing the PDF. Sorry Cisco.
On Fri, 12 Aug 2005, Gadi Evron wrote:
J. Oquendo wrote:
www.infiltrated.net/cisco/holygrail.pdf
I find it rather funny, really.
Back in defcon, everybody was trading the presentation quietly and eagerly.
Then every kiddie started asking if anyone wants it.
Then we all got URL's to download it from.
Then there was another pass of "psst, want the Lynn presentation?"
And eventually, there was a CD placed on every table at defcon with the presentation.
Seeing big-time secret-handshake groups take this with a whisper and a "if I know you, email me and I might share it" was a bit silly.
Once again every Bad Guy in town had it and the Good Guys didn't want to share under different excuses, some good, some sad.
I find that sharing the presentation openly on NANOG is a bit of a bad move because of how some may perceive it and you, but it has become completely silly not to do it. So I ask that people reserve judgment.. I was very tempted to do it myself.
Gadi.
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ J. Oquendo GPG Key ID 0x97B43D89 http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x97B43D89
To conquer the enemy without resorting to war is the most desirable. The highest form of generalship is to conquer the enemy by strategy." - Sun Tzu
On Fri, 12 Aug 2005 12:33:40 EDT, "J. Oquendo" said:
their equipment. If it's IPv6 based only, and not that big of a threat, then they should see no problem with the information being released.
The specific exploit was IPv6 only. The concept that IOS is a sane operating system, and that given a vulnerability, you just need to do X and Y and Z in a fairly mechanical fashion to make a full blown exploit, is IOS-only. Cisco is just busy having the same cow that everybody else had on the x86 platform when Solar Designer wrote "Smashing the Stack for fun and profit", because this is basically "Smashing the IOS stack for fun and profit"....
Valdis.Kletnieks@vt.edu wrote:
On Fri, 12 Aug 2005 12:33:40 EDT, "J. Oquendo" said:
their equipment. If it's IPv6 based only, and not that big of a threat, then they should see no problem with the information being released.
The specific exploit was IPv6 only. The concept that IOS is a sane operating system, and that given a vulnerability, you just need to do X and Y and Z in a fairly mechanical fashion to make a full blown exploit, is IOS-only.
Cisco is just busy having the same cow that everybody else had on the x86 platform when Solar Designer wrote "Smashing the Stack for fun and profit", because this is basically "Smashing the IOS stack for fun and profit"....
Wasn't that Aleph1?
On Fri, 12 Aug 2005 19:57:35 +0200, Gadi Evron said:
Cisco is just busy having the same cow that everybody else had on the x86 platform when Solar Designer wrote "Smashing the Stack for fun and profit", because this is basically "Smashing the IOS stack for fun and profit"....
Wasn't that Aleph1?
It was so long ago that history became legend, and legend became myth, and Cisco is just now catching up.. ;)
participants (4)
-
Gadi Evron
-
J. Oquendo
-
John Kinsella
-
Valdis.Kletnieks@vt.edu