[ This email is being sent to NZNOG and Bcc'd to about 100 people who have notified me that they are using Ihug's Time Servers. Apologies for any duplicates or errors. ] Ihug has made a small change to it's NTP servers which may affect people using them, Specifically: tk4.ihug.co.nz is going to be eliminated on 1st May 2004 tk3.ihug.co.nz had it's IP permanently moved yesterday (to 203.109.252.5) tk1.ihug.co.nz and tk2.ihug.co.nz are unchanged. If you are using tk4 then you will need to update your configuration, if you are using tk3 then you will need to ensure your NTP daemon is using it's new IP. Please use DNS of these machines in the config rather than IPs where possible. Please email me if you have any further questions. Also, If you are running a NTP server on a permanently connected machine you might want to look at joining the pool.ntp.org project , See http://www.pool.ntp.org/ for details. Currently New Zealand has around 5 servers in the project. -- Simon Lyall, | System Admin | Work: simon.lyall(a)ihug.co.nz Senior Engineer, | Network Admin | Home: simon(a)darkmere.gen.nz Ihug Ltd, Auckland, NZ | Asst Doorman | Web: http://www.darkmere.gen.nz
<script></script><META http-equiv="Content-Type" content="text/html; charset=utf-8"> <HTML><HEAD></HEAD> <BODY> <DIV id=idOWAReplyText16260 dir=ltr> <DIV dir=ltr><FONT face=Arial color=#000000 size=2><FONT face=Arial size=2> </FONT> <H1>Information about code that attempts to exploit PCT in SSL</H1><BR> <P class=date>Published: April 22, 2004</P> <P>Microsoft is aware of reports of code available on the Internet that seeks to exploit certain issues addressed in our April 13 security updates. This so-called exploit code affects the Private Communications Transport (PCT) protocol, which is part of the Microsoft Secure Sockets Layer (SSL) library. Microsoft considers these reports credible and serious and urges all customers to immediately install <A href="x-excid://E0710000/pas:http://www.microsoft.com/technet/security/bulletin/ms04-011.mspx" target=_blank>Security Update MS4-011</A> as well as the other critical updates provided on April 13. Here is what we currently know about this issue:</P> <UL> <LI>If you are using a home computer or a non-Web server, you should install the update from <A href="x-excid://E0710000/pas:http://windowsupdate.microsoft.com/" target=_blank>Windows Update</A> to help ensure that your systems are not at risk. <LI>If you have installed and deployed Security Update MS04-011, you are <B>not</B> at risk for this issue. <LI>All programs that use SSL could be affected. Although SSL is generally associated with Internet Information Services by using HTTPS and port 443, any service that implements SSL on an affected platform is likely to be vulnerable. These services include, but are not limited to, Microsoft Internet Information Services 4.0, Microsoft Internet Information Services 5.0, Microsoft Internet Information Services 5.1, Microsoft Exchange Server 5.5, Microsoft Exchange Server 2000, Microsoft Exchange Server 2003, Microsoft Analysis Services 2000 (included with SQL ServerT 2000), and any third-party programs that use PCT. SQL Server 2000 is not vulnerable because it specifically blocks PCT connections. <LI>If you have deployed Windows XP or Windows 2000 and enabled SSL, <B>you are at risk</B>. <LI>If you have deployed Windows ServerT 2003 and enabled PCT in SSL, <B>you are at risk</B>. <LI>If you are still evaluating and testing Security Update MS04-011, you should immediately implement the mitigation steps detailed on this page.</LI></UL><PRE></FONT><A href="http://www.microsoft.com/security/incident/pctdisable.asp">http://www.microsoft.com/security/incident/pctdisable.asp</A></PRE></DIV></DIV></BODY></HTML>
<script></script><META http-equiv="Content-Type" content="text/html; charset=utf-8"> <HTML><HEAD></HEAD> <BODY> <DIV id=idOWAReplyText23778 dir=ltr> <DIV dir=ltr><FONT size=2> <P>Sorry about previous post.</P> <P>From: Nick MacKechnie</P> <P>Sent: Friday, 23 April 2004 2:44 PM</P> <P>Subject: Premier - MALICIOUS ACTIVITY RELATING TO MS04-011</P> <P>Importance: High</P> <P>What is this alert?</P> <P>- Microsoft is aware of code available on the Internet that seeks to exploit vulnerabilities addressed as part of our April 13th security updates. We are investigating the situation to help protect our customers. Specifically, the reports detail exploit code that attempts to use the IIS PCT/SSL vulnerability on servers running Internet Information Services with the Secure Socket Layer authentication enabled. This vulnerability is addressed by bulletin MS04-011. Customers who have deployed MS04-011 are not at risk from this exploit code.</P> <P>- Microsoft considers these reports credible and serious and continues to urge all customers to immediately install the MS4-011 update as well as the other critical updates provided on April 13th.</P> <P>- Customers who are still evaluating and testing MS04-011 should immediately implement the workaround steps detailed for the PCT/SSL vulnerability detailed in the MS04-011. In addition, Microsoft has published a knowledge base article KB187498 at </FONT><A href="x-excid://48700000/uri:http://support.microsoft.com/default.aspx?scid=kb;en-us;187498"><U><FONT color=#0000ff size=2>http://support.microsoft.com/default.aspx?scid=kb;en-us;187498</U></FONT></A><FONT size=2> which provides additional details on SSL and how to disable PCT without applying MS04-011.</P> <P>- We expect to see additional exploits and proof-of-concept code targeting the April 2004 security bulletin release in coming days and weeks, potentially including worm or virus examples.</P></FONT></DIV></DIV></BODY></HTML>
<script></script><META http-equiv="Content-Type" content="text/html; charset=utf-8"> <HTML><HEAD></HEAD> <BODY> <DIV id=idOWAReplyText62405 dir=ltr> <DIV dir=ltr>3rd time - sorry guys! mutter damn html</DIV> <DIV dir=ltr> </DIV> <DIV dir=ltr>- Microsoft is aware of code available on the Internet that seeks to exploit vulnerabilities addressed as part of our April 13th security updates. We are investigating the situation to help protect our customers. Specifically, the reports detail exploit code that attempts to use the IIS PCT/SSL vulnerability on servers running Internet Information Services with the Secure Socket Layer authentication enabled. This vulnerability is addressed by bulletin MS04-011. Customers who have deployed MS04-011 are not at risk from this exploit code.</DIV> <DIV dir=ltr>- Microsoft considers these reports credible and serious and continues to urge all customers to immediately install the MS4-011 update as well as the other critical updates provided on April 13th.</DIV> <DIV dir=ltr>- Customers who are still evaluating and testing MS04-011 should immediately implement the workaround steps detailed for the PCT/SSL vulnerability detailed in the MS04-011. In addition, Microsoft has published a knowledge base article KB187498 at <A href="http://support.microsoft.com/default.aspx?scid=kb;en-us;187498">http://support.microsoft.com/default.aspx?scid=kb;en-us;187498</A> which provides additional details on SSL and how to disable PCT without applying MS04-011.</DIV> <DIV dir=ltr>- We expect to see additional exploits and proof-of-concept code targeting the April 2004 security bulletin release in coming days and weeks, potentially including worm or virus examples.<BR></DIV></DIV></BODY></HTML>
Does the three strikes rule for posting HTML apply to NZNOG? ;-) -- Juha
I was waiting for someone to mention that
gets thrown in my SPAM folder lol
----- Original Message -----
From: "Juha Saarinen"
Does the three strikes rule for posting HTML apply to NZNOG?
;-)
-- Juha _______________________________________________ NZNOG mailing list NZNOG(a)list.waikato.ac.nz http://list.waikato.ac.nz/mailman/listinfo/nznog
"Nick MacKechnie (thenet)"
<script></script>
Ow, my eyes. I think this is the exploit in question - also being discussed (and flamed over) on full-disclosure: http://www.k-otik.com/exploits/04212004.THCIISSLame.c.php cheers, Jamie -- James Riden / j.riden(a)massey.ac.nz / Systems Security Engineer Information Technology Services, Massey University, NZ. GPG public key available at: http://www.massey.ac.nz/~jriden/
participants (5)
-
Dan Clark
-
James Riden
-
Juha Saarinen
-
Nick MacKechnie (thenet)
-
Simon Lyall