Berkeley CSUA MOTD:Entry 25591
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/04/07 [General] UID:1000 Activity:popular
4/7     

2002/8/16-18 [Computer/SW/Database, Computer/Networking] UID:25591 Activity:moderate
8/16    I'm not sure i'm clear on the point of an IDS like snort.
        It sits on a box behind your firewall and listens (not very
        well, if you are on a switched network) by running a tcpdumpish
        application and looks for... what?  all non-specified traffic ?!?
        Pointers to (preferably online) overview would be appreciated too.
        \_ IDS can be anomaly-based or pattern-based.  Pattern-based has a
           built-in database of "suspicious" traffic, while anomaly-based
           tries to figure out for itself what's the "norm", and looks
           for deviations.  Neither are very reliable for proactive-type
           suspicious traffic detection.  IDS are very often used for post-
           fuckup forensic analysis, trying to figure out exactly what's gone
           wrong.  I have an excellent paper written by a colleague, if you're
           interested--if you want to know something specific about IDS you
           can also mail me question.  And sign yer fuckin posts.  -John
        \_ http://packetstormsecurity.nl/papers/IDS/lisapaper.ps
           snort looks for whatever its rules say to look for
        \_ are you trying to sound like an idiot?
           \_ I think this was supposed to a classic motd "How to snort net?"
              style question gone wrong.
        \_ Ya stick it on a switch port configured as 'monitor' so it sees all
           the traffic the switch sees.  Then it looks for network patterns
           ('signatures') and alerts you of them.
        \_ For switched networks you need to plug the snort sensor in to a
           tap or mirror/span port.  See:
           http://online.securityfocus.com/infocus/1594
2025/04/07 [General] UID:1000 Activity:popular
4/7     

You may also be interested in these entries...
2011/12/20-2012/2/6 [Politics/Foreign/Asia/China, Computer/Rants] UID:54268 Activity:nil
12/20   A higher percentage of people in China than in Pakintan have an
        unfavorable view of China:
        http://www.pewglobal.org/database/?indicator=24&response=Unfavorable
        Go figure.
        \_ damn these self critical liberals!
	...
2011/11/27-2012/1/10 [Computer/HW/Drives] UID:54244 Activity:nil
11/27   CalMail has been down for a few days (hardware failure and database
        corruption -- sounds like fun!) and is starting to come back online.
        Looks like they're planning to outsource all campus mail to either
        Google Apps or Microsoft 365 as part of Operational Excellence.
        <DEAD>kb.berkeley.edu/jivekb/entry!default.jspa?externalID=2915<DEAD>
        \_ http://ist.berkeley.edu/ciocalmailupdates/november-30-2011
	...
2009/10/27-11/3 [Computer/HW/Drives] UID:53474 Activity:nil
10/27   I just read an article that Facebook had moved their database
        to all SSD to speed throughput, but now I can't find it. Has
        anyone else seen this? Any experience with doing this? -ausman
        \_ I hope you're not running mission critical data:
           http://ask.slashdot.org/story/09/10/27/1559248/Reliability-of-PC-Flash-SSDs?from=rss
        \_ Do you have any idea how much storage space is used by Facebook,
	...
2009/9/23-10/5 [Computer/SW/Database] UID:53392 Activity:nil
9/23    I never took CS188, is there a good book that's an intro to formal
        database theory, normalization, etc.?  I've got experience with SQL
        (MySQL & MSSQL), and understand tables, etc.
        \_ You mean CS186?
           \_ Oops, yah.  188 is AI or something?
              \_ That's right.
	...
2009/9/10-15 [Computer/SW/Database] UID:53357 Activity:moderate
9/9     Larry Ellison is a bigger idiot than I thought:
        http://www.techcrunch.com/2009/09/10/oracle-to-sun-customers-and-ibm-were-in-it-to-win-it
        \_ My company's customers are insurance companies. Non-tech corporates don't
           trust open source. Why risk it. They have tons at stake and are willing
           to spend for solid products, support, and consultants who don't have long
           hair. They're being raped by IBM mainframes for millions. An optimized
	...
2009/7/28-8/6 [Computer/SW/Database] UID:53213 Activity:nil
7/27    I have an actual technical question here. My MySQL DBA tells me
        that I can't expect a MySQL port to be able to run effectively
        on more than a two CPU box, he says that the extra CPUs will
        sit there unused. Is this true? I have a bunch of new quad core
        servers that I would like to use as Database machines. -ausman
   \_ It's not that simple.  If you stress test your new fancy multi core
	...
2009/7/26-29 [Computer/SW/Security] UID:53200 Activity:nil
7/25    so is this a remote ssh exploit ?
        http://users.volja.net/database/matasano.PNG
        \_ No but this is:
           soda> ssh anywhere
	...
2009/5/6-14 [Computer/SW/Languages/Perl, Computer/SW/Languages/Web] UID:52961 Activity:kinda low
5/6     I'm sure you've seen web sites that distribute software by making
        a user fill out a form and then e-mailing the user a randomly
        generate link to the software that works just once. What software
        is used to do this? I'd like to distribute software in such a way.
        \_ "Software"?  What web server/web application environment
           are you using?
	...
2009/5/5-6 [Computer/HW/Laptop] UID:52950 Activity:moderate
5/5     Is there a good (or standard) way to make an offline copy of a w
        ordpress blog (mine, not someone else's)? tia.
        \_ oh man.
           \_ I could cobble something together with curl / wget, but I'd
              rather not if there is a standard way of doing this.  I'm
              pretty new to wordpress / blogging and I just want to keep
	...
2009/3/30-4/3 [Computer/HW/Memory, Computer/HW/Drives] UID:52772 Activity:nil
3/30    CF/SD Disk database:
        http://robgalbraith.com/bins/multi_page.asp?cid=6007
	...
2012/3/29-6/4 [Computer/HW/Memory, Computer/HW/CPU, Computer/HW/Drives] UID:54351 Activity:nil
3/29    A friend wants a PC (no mac). She doesn't want Dell. Is there a
        good place that can custom build for you (SSD, large RAM, cheap video
        card--no game)?
        \_ As a side note: back in my Cal days more than two decades ago when
           having a 387SX made me the only person with floating-point hardware,
           most machines were custom built.
	...
2012/1/19-3/3 [Computer/Networking, Politics/Foreign/Europe, Computer/SW] UID:54294 Activity:nil
1/19    Transcript between the Italian cruise ship captain and the Port
        Authority
        http://www.csua.org/u/v9i (abcnews.go.com)
        This captain is amazing.
	...
2011/11/8-30 [Computer/SW/Security, Computer/SW/OS/Windows] UID:54218 Activity:nil
11/8    ObM$Sucks
        http://technet.microsoft.com/en-us/security/bulletin/ms11-083
        \_ How is this different from the hundreds of other M$ security
           vulnerabilities that people have been finding?
           \_ "The vulnerability could allow remote code execution if an
               attacker sends a continuous flow of specially crafted UDP
	...
2009/11/4-17 [Computer/SW/P2P, Computer/Networking, Computer/SW/Security] UID:53495 Activity:nil
11/4    Holy cow, I got a warning from my ISP that they were notified
        by BSA/baytsp.com that I was copying music/video/software.
        Do they do port scan or something? That's a first for me.
        \_ They hang out on P2P networks and track IP addresses.  -tom
           \_ I believe they are paid by content providers to perform this
              monitoring service, so you should only run this risk with content
	...
2009/10/1-21 [Computer/SW/WWW/Browsers] UID:53417 Activity:moderate
10/1    I am thinking of installing firefox on soda under my home directory.
        Will this make me a hozer?
        \_ Possibly. I wonder if we should have another VM for that...btw,
           I remember someone saying they're glad we're not on FreeBSD
           anymore, but last I checked, a bunch of our stuff is on FreeBSD,
           but our login server is not.
	...
2009/9/10-15 [Computer/SW/Mail] UID:53353 Activity:nil
9/9     What should outbound mail server be when reading mail from soda
        with IMAP? Is there a FAQ?
        \_ It's <DEAD>mail.csua.berkeley.edu<DEAD> (same as for incoming mail).
           \_ "The message could not be sent because connecting to SMTP
               server <DEAD>mail.csua.berkeley.edu<DEAD> failed. The server may
               be unavailable or is refusing SMTP connections."
	...
2009/7/2-16 [Computer/SW/Mail, Computer/SW/Security, Computer/SW/WWW/Server] UID:53106 Activity:nil
7/2     Is imaps working?  What are the hostnames of the "incoming and
        outgoing mail servers" for CSUA email, and what kind of options
        should one set?
        I also noticed that we seem
        \_ Setup yer .forward or .procmailrc for now. I'm at a loss, too.
        \_ <DEAD>mail.csua.berkeley.edu<DEAD>. Using SSH (on default port 993) like before.
	...
Cache (8192 bytes)
online.securityfocus.com/infocus/1594 -> www.securityfocus.com/infocus/1594
This is largely due to the increased size of networks, and the requirement for increasingly faster and more efficient networks. On most networks, the data must now be dependable and timely. This transition from hubs to switches, however, has generated a conflict with already deployed and designed network intrusion detection systems. To combat design conflicts between network intrusion detection systems (NIDS) and switches, network taps were created. Network taps essentially allow all traffic on a network device to be monitored. Network taps are also very useful for passive network troubleshooting and analysis. Further, the tap makes the related NIDS system more secure, preventing attackers from being able to directly attack the NIDS system. This article will offer an introductory overview of taps, including: what taps are, why they should be implemented, their role in improving network security, how they should be implemented, and the economic benefits of taps. To understand why and how to use network taps, the design conflicts between NIDS and switches must also be understood. They differ in how they transmit data from port to port. To demonstrate this, imagine a 4-port hub in which each port has a distinct letter associated with it (A, B, C, D). A computer connected to port A wants to send information to a computer on port C. The packet is sent, the hub receives it, and sends the packet out to all the ports on the hub (A, B, C, D). Implementing Networks Taps with Network Intrusion Detection Systems Figure 1 Figure 1 In this situation, the NIDS systems have no problem. Since all traffic is sent to every port, a NIDS can detect traffic no matter where it is being sent across the hub. Switches, however, send data in a completely different way. Instead of sending data destined for port C to every port on the device, the switch sends this data only to port C. This increases efficiency by reducing packet collision, and optimizes bandwidth by reducing unnecessary transmissions. Implementing Networks Taps with Network Intrusion Detection Systems Figure 2 Figure 2 This diagram clearly demonstrates where the problem occurs. Absolutely no data is sent to the NIDS system (Port D), thus no event detection can take place. The only time the NIDS could detect an attack is if the attack were to be directed to the NIDS itself. This is, obviously, unacceptable as it completely defeats the purpose of having a NIDS on the network in the first place. Network taps allow all traffic on a network device (such as a switch) to be passively monitored. They are relatively inexpensive, reliable, and provide permanent access ports to monitor traffic through. Taps are usually separate devices, but can also be built into a switch itself. Two common tap solutions are offered by 22 NetOptics and 23 Finisar. There are taps for just about any type of network in use today. This includes GigaBit SX, LX or ZX, ATM, DS3, T1, Fast Ethernet copper, and GigaBit TX to SX. This means that our NIDS can be deployed using a tap on basically any type of network setup imaginable. Further, taps are completely passive which means they will not disrupt your current network configuration, and are easily implemented within any existing network set-up. Network taps are an ideal way to implement IDS into a switched and high-speed environment. To understand why taps should be used in these situations, it may be helpful to look at some other option for implementing an IDS into a switched environment. The most commonly used alternative is port spanning, also known as port mirroring. This option, although used often, has inherent flaws that create problems in implementing IDS systems with it. Port spanning or mirroring forces the switch to either send all packets from across the switch, or packets from a specified port, to a specific span/monitoring port in addition to delivering it to its intended recipient. This raises a few issues, the most obvious of which is that of packet loss to the mirror/span port. When utilizing such a port, it is much like a port on a hub. This means that there will be a higher rate of packet collisions, as the twenty other ports on the switch continually send packets to the mirror/span port. Furthermore, since this mirror/span port usually has the same amount of bandwidth as every other single port has, the packet loss is significantly increased again. Port mirroring also presents problems in that it does not receive error packets or VLAN information, and only presents one side of a full-duplex connection. Thus, the IDS sitting on a mirror is severely limited by increased packet loss, and a complete blindness to half of the traffic on a link. What good is an IDS that can only see half the traffic at best, and less than that under most circumstances? The workings of port mirroring are demonstrated in figure 3. Implementing Networks Taps with Network Intrusion Detection Systems Figure 3 Figure 3 Note that half of the session is not being sent to the Mirror/Span Port; The tap is able to give IDSs the ability to view both sides of a full duplex conversation, reduce packet loss due to network hardware completely, and view all packets that are transmitted across the line. It is able to accomplish all of this in a passive mode that does not affect the network structure as a whole. The Role of Taps in Increasing IDS Security As mentioned in the introduction, taps can actually increase the security of an intrusion detection system installation. The reason for this is quite simple: IDSs behind taps do not require an address because the tap takes any and all data off the line and throws it directly to the IDS interface, thus eliminating the need for addressing. This prevents directed attacks against the IDS system, and can actually make attackers believe that no IDS is present to identify and track their attacks. By preventing the detection of the IDS by attackers, the survivability of the system is significantly increased. After all, what good is an IDS if it can be attacked and disabled? Explanation of Implementation The installation and implementation of taps can be quite easy if you plan the set-up ahead of time, and if you have the right hardware. Most of the time, the tap will come off an expansion port that is commonly found on many newer switches, hubs, and routers. Often this is done through the utilization of data terminal equipment (DTE) and/or data communication equipment (DCE) interface. These interfaces will be discussed in greater depth later on. This allows the tap to be completely passive to the network, thus reducing the chances of the network disruption that many monitoring devices may cause. These lines also allow the high speeds required to permit tapping an entire device while keeping packet loss to an absolute minimum. The DTE/DCE interfaces are then fed directly to the fiber tapping panel that is stored on a server rack, which contains the tap monitoring port. Attached to the monitoring port is the NIDS we have decided to use. Implementing Networks Taps with Network Intrusion Detection Systems Figure 4 Figure 4 This is the most common type of set-up. Most network taps can be deployed on multiple devices across the network and then be interfaced together and with other systems at the server rack (as illustrated in figure 5). Implementing Networks Taps with Network Intrusion Detection Systems Figure 5 Figure 5 The monitoring racks (tap panels) are usually designed for high speed (gigabit and better) systems to allow for all of this traffic to be collected at this central point with the minimum possible amount of packet loss. Due to the extremely high speeds these monitoring racks can stand, it is often necessary to use multiple IDS systems and load balance between them, as very few IDSs are currently able to handle these types of speeds. If multiple IDSs are used, then one may consider the idea of aggregating this data together on an analysis machine for further viewing and event detection at a later date. Jeff Nathan's 24 Gigabit Tap IDS illustration gives a good demonstration of how this type of system would be set up and operated. Data Terminal Equip...