segunda-feira, 24 de maio de 2010

Masters of Unified Communications: Sponsored by Avaya Previous Article Next Article Is IPv6 in your future?

As I write this I’m returning from this year’s FutureNet conference in Boston where much of the discussion centered around the twin challenges of dealing with depletion of the IPv4 address space and the growing concern that IPv6 adoption will exacerbate scalability issues within Internet routers. While there was much disagreement about the best way to address these issues, the majority of speakers agreed that despite longer-term route scalability concerns, a migration to IPv6, whether we like or not, is in our immediate future.
Why? Quite simply because the immediate concern among Internet architects is that we’re running out of addresses. Depending on whose estimate you believe, we’ve got another one to two years before Internet service providers have no more addresses to assign, meaning that if you want a new block to support a new facility, or your provider wants to expand its mobile offerings, you, and they, will find that they lack the IPv4 addresses to meet demand.
There are a few options for short-term fixes. One is to create a market for excess IPv4 address space to enable those who have extra space and who today have no incentive to give to sell it to whoever needs it. Another is to increase the use of network address translation to hide private networks behind small numbers of shared public addresses. Both of these create additional concerns: who would manage the market to ensure that large entities don’t gobble up all available address space? And, there is the potential for carrier-grade NAT to disrupt the Internet architecture that’s based on smart end-points and a dumb core.
Meanwhile, most major Internet service providers have begun to implement IPv6 within their networks to solve the address shortage problem. But IPv6 migration creates new and possibly more severe problems as Internet routers already taxed with maintaining rapidly growing route tables now must cope with the addition of IPv6 routes (most providers are using a “dual-stack” approach of running both IPv6 and IPv4 at the same time), and inevitable continued fractioning of the IPv4 address space. Both of these issues point to a future where Internet reachability issues will increase, regardless of available bandwidth. Unfortunately, the topic of Internet scalability is receiving scant attention in the media. Enterprise IT architects still don’t see any business case compelling them to adopt IPv6 internally, or lean on their providers to address route table scalability. For most the Internet continues to operate as a black box that has always worked, always scaled, and always grown to meet emerging application demands.
But that perceived reality is poised to change. Enterprises will run into address shortages as their providers run out of IPv4 space, then they’ll deal with reachability and performance issues as route scalability problems become pervasive. As UC increasingly crosses company boundaries, addressing and routing issues could threaten the ability to reliably deliver such services as inter-company video, voice, or presence federation.
In the short term it’s incumbent on any IT manager to get up to speed on Internet scalability issues and prepare for the potential for IPv6 adoption at least at the service provider edge in the next few years. IT leaders should begin to evaluate internal applications to determine options for delivering IPv6 support, and they should work with their service providers to understand their own approaches for meeting addressing and routing challenges going forward.

quinta-feira, 13 de maio de 2010

Vulnerabilidade Microsoft

Prezados,

A Microsoft publicou 02 boletins de segurança em 11 de Maio que abordam ao
todo 02 vulnerabilidades em produtos da empresa. A exploração destas
vulnerabilidades permitem execução remota de código.

No momento da publicação deste resumo não há informações sobre códigos
maliciosos (exploits) disponíveis publicamente que exploram as
vulnerabilidades relacionadas aos boletins MS10-030 e MS10-031.


SEVERIDADE

. Crítica

 - MS10-030: Vulnerabilidade no Microsoft Outlook Express e Windows Mail
   Vulnerabilidade que permite a execução remota de código

 - MS10-031: Vulnerabilidade no Microsoft Visual Basic para aplicações
   Vulnerabilidade que permite a execução remota de código


. Importante

 - Nenhum boletim


. Moderada

 - Nenhum boletim


. Baixa

 - Nenhum boletim


O sistema de classificação de severidade das vulnerabilidades adotado pelo
CAIS neste resumo é o da própria Microsoft. O CAIS recomenda que se
aplique, minimamente, as correções para vulnerabilidades classificadas
como crítica e importante. No caso de correções para vulnerabilidades
classificadas como moderadas o CAIS recomenda que ao menos as
recomendações de mitigação sejam seguidas.

. Crítica - Vulnerabilidades cuja exploração possa permitir a propagação
 de um worm sem a necessidade de interação com o usuário.

. Importante - Vulnerabilidades cuja exploração possa resultar no
 comprometimento de confidencialidade, integridade ou disponibilidade de
 dados de usuários ou a integridade ou disponibilidade de recursos de
 processamento.

. Moderada - exploração é mitigada significativamente por fatores como
 configuração padrão, auditoria ou dificuldade de exploração.

. Baixa - uma vulnerabilidade cuja exploração seja extremamente difícil
 ou cujo impacto seja mínimo.


CORREÇÕES DISPONÍVEIS

Recomenda-se atualizar os sistemas para as versões disponíveis em:

. Microsoft Update
 https://www.update.microsoft.com/microsoftupdate/

. Windows Server Update Services
 http://www.microsoft.com/windowsserversystem/updateservices/default.mspx


MAIS INFORMAÇÕES

. Microsoft Security Bulletin Summary for May 2010
 http://www.microsoft.com/technet/security/bulletin/ms10-may.mspx

. SANS ISC Handler's Diary 2010-05-11 - Microsoft May 2010 Patch
 Tuesday
 http://isc.sans.org/diary.html?storyid=8776

. MS10-030: Vulnerability in Outlook Express and Windows Mail Could Allow
 Remote Code Execution (978542)
 http://www.microsoft.com/technet/security/bulletin/MS10-030.mspx

. MS10-031: Vulnerability in Microsoft Visual Basic for Applications Could
 Allow Remote Code Execution (978213)
 http://www.microsoft.com/technet/security/bulletin/MS10-031.mspx

. Microsoft TechCenter de Segurança
 http://technet.microsoft.com/pt-br/security/

. Microsoft Security Response Center - MSRC
 http://www.microsoft.com/security/msrc/

. Microsoft Security Research & Defense - MSRD
 http://blogs.technet.com/srd/

. Segurança Microsoft
 http://www.microsoft.com/brasil/security/


Identificador CVE (http://cve.mitre.org):
CVE-2010-0815, CVE-2010-0816


O CAIS recomenda que os administradores mantenham seus sistemas e
aplicativos sempre atualizados, de acordo com as últimas versões e
correções oferecidas pelos fabricantes.

Os Alertas do CAIS também são oferecidos no formato RSS/RDF:
http://www.rnp.br/cais/alertas/rss.xml


Atenciosamente,

##############################
##################################
#   CENTRO DE ATENDIMENTO A INCIDENTES DE SEGURANCA (CAIS)     #
#       Rede Nacional de Ensino e Pesquisa (RNP)               #
#                                                              #
# cais@cais.rnp.br       http://www.cais.rnp.br                #
# Tel. 019-37873300      Fax. 019-37873301                     #
# Chave PGP disponivel   http://www.rnp.br/cais/cais-pgp.key   #
################################################################
-----BEGIN PGP SIGNATURE-----