New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 991
Comments: 20
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image ntwrk: Vulnerabilities: Worming out the truth image
Networks
Worming out the truth
In the face of vendor denials, it pays to stick to your hunches.
By Vanessa Watkins

We had been, in the main, happy with our ATM network, with its 155Mbps backbone and its mixture of 10/100Mbps switches and 10Mbps hub-stacks. It had been in operation for some years. Now, for the reasons acknowledged by the rest of the planet, it was time to upgrade to Gigabit Ethernet.




We spent 18 months arguing, rationalising and begging for money to overhaul the network. We finally managed to convince the powers that be to part with a not inconsiderable amount of money. Following a complex tendering process we finally selected an equipment vendor and a reseller.


We planned a staged migration. In the first phase we would build a new core and also migrate more than twenty departments onto it. We would have preferred to undertake this exercise early in the summer vacation but, naturally, by the time we had obtained the money and purchased the equipment we were into August with ‘clearing’ looming on the horizon.


Assisted by an able engineer from ADA networks we built the new core. All appeared to go well – extremely well. We named our core switches after the Simpson family - Homer, Marge, Bart and Lisa. We now had a super-fast performance core.


Busy on the border
It all went without hitch in the way that network migrations usually don’t. It came as rather a shock when, three days later, there appeared to be a module failure on one of the core routers; on a module that provided routing to many of our departmental subnets. Quick examination of the equipment indicated that there was a hardware failure. We quickly replaced the module and all appeared to be well… except that it wasn’t; we started getting complaints about the network being slow. Frantic phone calls were made to the reseller and to the vendor; diagnostic procedures were initiated.


At the same time we noticed that our border firewall was rather busy, as opposed to sitting there filing its nails as it usually does. The firewall is a big powerful Netscreen – but it was suddenly working overtime. Closer inspection revealed that we were experiencing ‘wormage’. Earlier in the summer we thought we had escaped an influx of Blaster, but now we were being nobbled, at the most inopportune moment, by Welchia and Nachi. Over the course of the next few hours it became evident that numerous machines on the campus had been infected.


Our equipment vendor swore that their kit would be unaffected by the worm. We had no choice but to embark on days of pulling the network apart and rebuilding it. I am sure that every network ‘techie’ has experienced this kind of scenario; you start with a lovely resilient ring topology, and then gradually strip it down to a bare minimum ‘twig’ architecture in a vain attempt to isolate the problem. No matter what we did, we couldn’t isolate it.


What worm?
“Is it the worm?” we would ask periodically. “No!” The vendor was convinced that there was no problem; no one else on the planet had reported anything. Obviously we were jinxed. Hours turned into days of going round in circles and achieving nothing. ADA networks were exceptionally helpful, supplying spare equipment, expertise and support.


Finally - after more than a week - the vendor admitted that its equipment was after all affected by the worms. We were exhausted and flat. It was, however, good to know that we had been right all along, because this sort of occurrence makes you start to question your technical ability and kills your confidence.


We finally had a meeting with the vendor and our reseller. The vendor kindly offered to provide us with some high-end kit, which was not subject to the same problem, until they could fix the routers we had purchased. We gladly accepted. They have since released a patch for our kit which is currently under test.


We seem to have been terribly unlucky with our timing. Looking on the bright side, we have learnt a lot about the equipment and are now confident that problems will be solved.


Vanessa is a network manager at Royal Holloway College.




TechNewsWorld ( requires login )
Posted on Sunday, 09 November 2003 @ 04:45:00 EST by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· HotScripts
· W3 Consortium
· More about Networks
· News by phoenix22


Most read story about Networks:
D-Link DSL-300G/DSL-300G+ Default Password Vulnerability

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register