Archive

Category Archives for "Networking"

LDAP Search Active Directory

I recently had to migrate authentication for a service from FIPA to Active Directory. It was a bit of fluffing around because the directory structure in FIPA did not exactly align with the directory structure in AD. In this post I will demonstrate how to use the ldapsearch command to search...

VPC native GKE clusters – Container native LB

This blog is last in the series on VPC native GKE clusters. In this blog, I will cover Network endpoint groups(NEG) and Container native load balancing. For the first part on GKE ip addressing, please refer here and the second part on VPC native clusters, please refer here. Container load balancing and Network endpoint groups(NEG) … Continue reading VPC native GKE clusters – Container native LB

A10 Networks ACOS Critical Insecure Cookie Vulnerability 1 of 2

The following summarizes an HTTP persistence cookie vulnerability that I identified in A10’s ACOS ADC software. This issue was disclosed to A10 Networks in June 2016 and has since been resolved.

A10 Networks Cookie Vulnerability

This vulnerability results in information disclosure about names of service-groups and IPs of real servers, as well as the ability to manipulate the content of the cookies.

SUMMARY OF VULNERABILITY

The ACOS documentation for HTTP persistence cookies notes that “For security, address information in the persistence cookies is encrypted.” However, the address information is not “encrypted”; rather, the real server IP and port information is weakly obfuscated and is easily decoded, exposing information about the internal network. The simplicity of the obfuscation also makes it trivial to manually create a cookie which ACOS would decode and honor.

Additionally, cookies configured using the service-group command option have the service-group’s full name included in the persistence cookie as plain text. This vulnerability applies to HTTP/HTTPS VIP types that have been configured to use a cookie-based persistence template.

SOFTWARE VERSIONS TESTED

This vulnerability was discovered and validated initially in ACOS 2.7.2-P4-SP2 and reconfirmed most recently in ACOS 4.1.1-P3.

VULNERABLE VERSIONS

This behavior has been core to Continue reading

IPv6 Buzz 027: Making The Leap To Enterprise IPv6

Today's IPv6 Buzz podcast discusses key approaches to getting IPv6 deployed in the enterprise. Guest Enno Rey talks about how to identify quick wins, being liberal and flexible as you deploy, and more. The IPv6 crew also talks about IPv6 security, and Enno shares highlights from his recent RIPE78 presentation.

The post IPv6 Buzz 027: Making The Leap To Enterprise IPv6 appeared first on Packet Pushers.

Growing an Internet Exchange Point in Burkina Faso

BFIX, the Burkina Faso Internet exchange point, was established as an association in Burkina on February 19, 2015 by Internet Service Providers (ISP), mobile telecommunication operators, and some public institutions such as the University of Ouagadougou and the government agency in charge of promoting information and communication technologies (“Agence de Promotion des Technologies de l’Information et de la Communication – ANPTIC”).

BFIX started exchanging the first bits of data among peers on June 26, 2015, during the 11th edition of the national “Internet Week.” BFIX’s service was officially launched on July 10, 2018 as part of the West Africa Regional Communication Infrastructure Project (WARCIP) – Burkina, among other projects.

Despite the launch and the operationalization of BFIX, a number of challenges remained, mainly attributed to the implementation of IXP best practices. In particular the network design was not optimal. Moving forward, the local community, through the voice of its executive director, Millogo Jean Baptiste, reached out to the Internet Society Africa Regional Bureau for technical assistance. A training session was planned and carried out between the 14th and 18th of January 2019 in Ouagadougou under the Internet Society and Facebook IXP Partnership project.

The one-week training had two Continue reading

Cloudflare Repositories FTW

Cloudflare Repositories FTW

This is a guest post by Jim “Elwood” O’Gorman, one of the maintainers of Kali Linux. Kali Linux is a Debian based GNU/Linux distribution popular amongst the security research communities.

Cloudflare Repositories FTW

Kali Linux turned six years old this year!

In this time, Kali has established itself as the de-facto standard open source penetration testing platform. On a quarterly basis, we release updated ISOs for multiple platforms, pre-configured virtual machines, Kali Docker, WSL, Azure, AWS images, tons of ARM devices, Kali NetHunter, and on and on and on. This has lead to Kali being trusted and relied on to always being there for both security professionals and enthusiasts alike.

But that popularity has always led to one complication: How to get Kali to people?

With so many different downloads plus the apt repository, we have to move a lot of data. To accomplish this, we have always relied on our network of first- and third-party mirrors.

The way this works is, we run a master server that pushes out to a number of mirrors. We then pay to host a number of servers that are geographically dispersed and use them as our first-party mirrors. Then, a number of third parties donate Continue reading