ISOC Paper Targeting Border Gateway Protocl Routing And Trust

via Ryan Polk – policy advisor at the Internet Society (ISOC), comes this outstanding paper displaying admirably clear thinking applied to the challenge of security-in-internetwork-routing (especially when that security is encapsulated in BGP Routing)… Continue reading ISOC Paper Targeting Border Gateway Protocl Routing And Trust

MicroTik For Tat, Flawed Routers Join Proxy Army

Sean Gallagher, plying his trade at Ars Technica, regales us with the very bad news of MictoTik (a Latvian network electronics firm) manufactured (and – of course – deeply flawed) network routers. Read it and weep, my friends, for evil proxy conflati… Continue reading MicroTik For Tat, Flawed Routers Join Proxy Army

MicroTik For Tat, Flawed Routers Join Proxy Army

Sean Gallagher, plying his trade at Ars Technica, regales us with the very bad news of MictoTik (a Latvian network electronics firm) manufactured (and – of course – deeply flawed) network routers. Read it and weep, my friends, for evil proxy conflati… Continue reading MicroTik For Tat, Flawed Routers Join Proxy Army

Mutually Agreed Norms for Routing Security (MANRS)

The beginning of May 2018 saw problematic internetworking operational issues revolving around the notion of robust router security (in reality, the lack thereof…). Today’s Must Read comes from ISOC personnel Megan Kruse and Aftab Siddiqui, and ligh… Continue reading Mutually Agreed Norms for Routing Security (MANRS)

Cisco fixes critical ‘DNA’ software flaws

IT giant Cisco this week released patches for three critical vulnerabilities in its enterprise networking software, two of which could allow an attacker to bypass authentication measures and access data deep into the network. The affected software, known as the Digital Network Architecture (DNA) Center, serves as a hub for configuring devices across an IT network, allowing administrators to track networking flaws. Each of the vulnerabilities is fixed in more recent versions of the software. One of the vulnerabilities stems from an insecure configuration of a DNA Center management system, Cisco said in an advisory. An attacker with the ability to access the management system’s service port “could execute commands with elevated privileges within provisioned containers,” the company said, potentially resulting in the complete compromise of a container. The San Jose, California-based company said it found two of the three software bugs in internal testing (the third was discovered in […]

The post Cisco fixes critical ‘DNA’ software flaws appeared first on Cyberscoop.

Continue reading Cisco fixes critical ‘DNA’ software flaws