The Yaj Computers Portal

Post Top Ad

Post Top Ad

Showing posts with label Philippines. Show all posts
Showing posts with label Philippines. Show all posts

Saturday, July 12, 2014

5:36 PM

BABY LEARNING CARD


The Baby Learning Card can help your baby learning things with enjoyable way.
The Baby Learning Card can help your baby learning animals,fruits,vegetables,sports and vehicles with enjoyable way.

1. Manual mode - Need your baby touch the screen and play himself, single click the screen will play the sound again.
2. Auto play mode - Father/Mother can set the sound play interval and play times. The Baby Learning Card will auto show the cards to the child with the setting times and interval.
Others:
1. Support select play favorite cards.
2. It support English,Spanish and Chinese. 
3. It suitable for 0 - 5 years old baby.
BABY LEARNING CARD_OS 2.1

Click Here l Mirror 
5:36 PM

Animal Book



Let's Learn About Animals.
Animal Book is an app that helps your kid to recognize animals, know their names and the sounds they make.
It has lots of beautiful animal illustrations, clear pronunciations and animals sounds. It is very easy and simple to use. It will provide hours of fun and learning for your kids. There is also a quiz section where the kid has to identify the animal based on animal name pronunciation and animal sound.

Features: OS 2.1 up
- 39 beautiful animal illustrations, animals sounds and animal name pronunciations.
- Quiz to recognize the animals from their name and sounds.
What the reviewers are saying:
Click Here l Mirror 

Friday, July 11, 2014

5:34 PM

KIDS SHAPE


The game is from Intellijoy, where we specialize in educational games with the fun built right into them.
Your child will love playing Kids Shapes, and you'll be able to relax, knowing your child is learning while having great fun.
Let's do the rest of the description in a question-and-answer form.

 What activities are included?
 Learning shapes using real-life objects
 Recognizing shapes in their real-life settings
 What will my children learn?
Your child will learn to recognize shapes in their real-life context. The shapes currently included are circle, rectangle, triangle, square, rhombus and oval.
KIDS SHAPE_OS 1.6 up
Click Here l Mirror 
5:32 PM

Kids ABC Letters Lite Intellijoy


A fun way way to learn the ABCs 
This free version is fully featured but stops at the letter H. To get the rest of the letters,★ Followed by Kids ABC Phonics Lite and Kids Reading (Preschool) FREE, Kids ABC Letters FREE is the first app in our Reading Curriculum Series.★ Intended for:
Kids ages 2-7

✔ Naming Letters. A delightfully distraction-free way for kids to learn the name and the appearance of each ABC alphabet letter. Kids can tap on the letters to verify that they’ve learned the names correctly.
✔ Forming Letters. Kids get to practice remembering what the letters look like by sliding colorful puzzle pieces into place that make up the shapes of the letters.
✔ Recognizing Letters. Children get to play a fun game where they help the cat catch fish with alphabet letters on their sides as they swim by. By the time kids are done, they know the appearance and pronunciation of the letters by heart.
Kids ABC Letters Lite Intellijoy_OS 2.1 up
Click Here l Mirror 

Thursday, July 10, 2014

5:20 PM

KIDS CONNECT THE DOTS




Millions of kids already connect with this dot-to-dot game.
This app is now optimized for both phones and tablets.
Keep your preschoolers occupied while they gain and improve their number and letter recognition skills with Kids Connect the Dots, the acclaimed digital version of the classic game.

Millions of children have already enjoyed the friendly themes, bright illustrations, and encouraging vocal cues of its lite version. While the free version contains 25 puzzles, this paid app features more than a 100 simple connect-the-dot puzzles and promises to keep your little one enthralled.

KIDS CONNECT THE DOTS_OS 1.6 up
Click Here l Mirror 

Wednesday, July 9, 2014

11:20 PM

SMART KID GAMES (15 games in one)


Fun learning program for children of all ages.
Smart Kids Games is a fun learning program for children of all ages.
Contains 15 games in one:
- Learning of letters and numbers, sound animated with translation from English / Spanish.
- Learn to recognize more than 100 animals including their sounds, categorized as pets, farm animals and marine wildlife.
- Distinguish shapes and colors and match the pieces. 
- Distinguish between colors and show your ability to move animated balls around the screen. 
- Practice your memory with "Simon evolution" and "Match the cards"
- Play with fireworks and try to catch the ball.
- Learn the sound of musical instruments and play their music.
- Play puzzles with pictures of your environment.
- Skilled puzzle with pictures of the most important places in the world.
- Flash cards with letters of the alphabet illustrated with drawings in various languages.
- Listen and learn the funny sound of the most familiar vehicles.
Children can have fun playing for a long time.
You will also acquire the following skills by playing:
SMART KID GAMES LITE_OS 2.1 up
Click Here l Mirror 
1:00 AM

KIDS CONNECT THE DOTS



Millions of kids already connect with this dot-to-dot game.
This app is now optimized for both phones and tablets.
Keep your preschoolers occupied while they gain and improve their number and letter recognition skills with Kids Connect the Dots, the acclaimed digital version of the classic game.

Millions of children have already enjoyed the friendly themes, bright illustrations, and encouraging vocal cues of its lite version. While the free version contains 25 puzzles, this paid app features more than a 100 simple connect-the-dot puzzles and promises to keep your little one enthralled.

KIDS CONNECT THE DOTS_OS 1.6 up
Click Here l Mirror 

Tuesday, July 8, 2014

11:16 PM

Alphabet Car



* Fun Edutainment – learn letters, words and spelling through fun play
* Stage and Level Design – From Preschool to Advanced for various stages of your child's development
* Colorful and entertaining environment with beautiful 3D graphics and music
* Car Customization
* Hours of fun edutainment and rich content over 40 stages/levels
The suggested environment for this app is
 Android 2.2/2.3
Click Here l Mirror 

Thursday, July 3, 2014

11:14 PM

Education Pack Kids 1.0's OS 2.2 up









Education Pack Kids 1.0's OS 2.2 up
A free, effective, and fun way of learning & spellings to build English Words for all ages of Toddlers, 
Kids and Children up to the age of 10!The game improves kids hand-eye co-ordination as they 
collect and jump to get the letter balloons in sequence to complete a word.Features:- 
Beautiful colour backgrounds- Option to change the backgrounds- There are 26 alphabetical levels
Collect coins to increase scores- Alphabetic sound plays when collect any letter balloon accordingly.
How to Play:1. Select a level from a level menu.2. There are 26... ...
More A free, effective, and fun way of learning & spellings to build English Words for all ages of Toddlers,
Kids and Children up to the age of 10!The game improves kids hand-eye co-ordination as they collect 
and jump to get the letter balloons in sequence to complete a word.Features:- Beautiful colour backgrounds-
Option to change the backgrounds- There are 26 alphabetical levels- 
Collect coins to increase scores- Alphabetic sound plays when collect any letter balloon accordingly.
Click Here l Mirror

Tuesday, July 1, 2014

11:12 PM

Android Educational Games (17 games in one)







Have fun and teach your children with amazing and educational games (0-6)
Baby explorer is a fun learning program for children of all ages.
Contains 17 games in one:
- Sound animated learning of letters and numbers.
- Learn to recognize animals and their sounds.
- Distinguish shapes and colors and match the pieces.
- Distinguish between colors and show your ability to move animated balls around the screen.
- Practice your memory with fruits learning mode.
- Match the pictures and play with wooden pieces.
- Learn the sound of musical instruments and play their music.
- Create your first musical melodies playing the xylophone.
- Play puzzles with pictures of your environment.
- Play with butterflies, fishes and other animals.
- Discover amazing fun with soap bubbles and balloons.
- Draw funny pictures with a lot of pencils and colors.
- Listen and learn the funny sound of the most familiar vehicles.
- Improve reflexes flying a toy plane.
Children can have fun playing for a long time.
you can also acquire the following skills by playing this game:
OS 2.1 up
Click Here l Mirror

Monday, April 14, 2014

Friday, June 21, 2013

5:06 PM

CREATION OF THE MUNICIPALITY:

History has it that in 1903, Tadian was just a barrio with a recorded population of 56. It functioned as a barrio or barangay of Kayan, which was at that time the seat of the municipal government for a long time. On March 29, 1959, Congressman Luis Hora authored a bill which became Republic Act 2101, transferring the site of the “municipio” from Kayan to Tadian. This pave the way to Tadian in becoming a regular municipality on June 25, 1963 under Executive Order (E.O.) No, 42. Kayan became a barangay of Tadian and at present, was divided into two barangays, namely; Kayan East & Kayan west.
5:04 PM

ETYMOLOGY:

The name of the municipality, Tadian, is basically derived from the Ilocano word “Tadi” meaning the spur-like projection that grows at the hind of each foot of a matured cock which it uses as a weapon during combat with another cock. This modern time of “tadi” has come to refer also to a razor sharp piece of 5 inches metal attached to a game cock’s foot for it to use in cock fight. With the affix “an”, Tadian literally means to fix a “tadi” to the cock’s feet.
5:03 PM

POLITICAL/ADMINISTRATIVE/FISCAL DEVELOPMENT:

As per record, the municipality has the following list of leaders and their leadership tenure. These leaders however starts from Kayan District to the transfer of the Municipality to Tadian up to present.
1. Don Camso 1904 -1906
2. Atanacio San Jose 1907 - 1910
3. Lino Cardenas 1911 - 1913
4. Regidor (Bantew) Bernardez 1914 -1915
5. Panoten Calomba 1917 - 1919
6. Jose Marrero 1920 - 1922
7. Calvo Caligtan 1923 - 1925
8. Juan Bernardez 1926 - 1928
9. Marcelino Gaqui 1929 - 1931
10. Martial Mutiac 1932 - 1935
11. Luis Lamnao 1936 - 1940
12. Dagiw-a Angaga 1941 - 1942
13. Faustino Bay-asen 1943 - 1944
14. Luis Hora 1945 - 1946
15. Celestino Opig 1946 - 1947
16. Don Keeg 1948 - 1950
17. Tomas Benafin 1951 - 1955
18. Raymundo Martin 1955 - 1956
19. Daniel Perez 1957 - 1960
20. Honorio Dominguez 1966 - 1966
21. Faustino Wali 1966 - 1968
22. Delfin Ting 1969 - 1980
23. Harry Dominguez 1980 - 1986
24. Benjamin Sabling 1986 - 1987
25. Ernesto Maguen 1987 - 1987
26, Saturnino Uyod 1987 - 1988
27. Antonio Sudaypan 1988 - 1991
28. John Malamnao 1991 - 1998
29. Evelyn Taclobao 1998
30. Sorero A Gullod 1998 - 2001
31. Constito S. Masweng 2001 – 2011
32. Anthony Wooden 2011 - present
As per existing sources, it is the time of Raymundo Martin from 1955 – 1956 that the transition of transferring the seat of municipal government from Kayan to Tadian. It is also Daniel Perez who first occupied the new constructed municipal building, which is the present Municipal Capital now. Mayor Harry Dominguez set the fire burning on the desire of the construction of road in zone III which eventually realized during the time of Mayor Antonio Sudaypan. The time of Mayor Malamnao also saw the concreting of the main roads in Kayan and Tadian and the opening of Nacawang–Mabalite road and Masla –Duagan road as well as the establishment of Mountain Province State Polythecnic College.
There are 19 barangays comprising the municipality that are divided into three zones, namely;
Zone 1 – The central part, consist of barangays Poblacion , Kayan East,
Kayan West, Bunga, Balaoa and Tue.
Zone 11 – Called the “Sulumabado” derived its name from barangays
Sumadel, Lubon, and Masla. Other barangays are Duagan, Mabalite, Bantey and Batayan.
Zone III – Called the “Sunnyside” or Demang in the local vernacular is famous
of its Gawaan lake, which is situated near the foot of Mt. Clitoris or the
so-called Mogaw hill. Barangays consisting this zones are Banaao,
Pandayan, Cadad-anan, Lenga, Dacudac and Cagubatan, where the
famous enchanted eel is found.
The municipal public market of Tadian is located at the Poblacion.
5:02 PM

THE HISTORICAL ROLES OF TADIAN MUNICIPALITY: ECONOMIC

Tadian is the gateway to the Ilocos provinces. While it is the education center of the west, it plays also the role as the market place of the people of the nearby towns of the Ilocos Provinces such as the municipality of Cervantes and Quirino municipality of Ilocos Sur. Tadian also is fast rising as banana supplier of the municipality of Bauko and Buguias, Benguet while not declining on its livestock and vegetables supplies.
5:01 PM

THE HISTORICAL ROLES OF TADIAN MUNICIPALITY: EDUCATION

Tadian is the center of high school education of western Mountain Province from the pre-war times up to the present. History tells that the Holy Rosary High School in Kayan is among the first established high school in the province where its first graduates came from the different municipalities of Bontoc namely: Tadian, Bauko, Sabangan, Besao and Sagada. The establishment of Tadian School of Art and Trades, the first trade school established in the province saw the presence of enrollees from the different municipalities.
At present, Tadian still enjoys its role as the center of education of the west, because of the presence of College in the locality, the Engineering Department of Mountain Province State Polytechnic College that offers engineering courses, education and Masteral courses.
5:01 PM

THE PEOPLE: Socio-cultural development

Socio-cultural development:
The inhabitants of Tadian municipality came from different places of origin. The early settlers that inhabited the barangays of Zone III or Demang in the local vernacular that covers the barangays of Bana-ao, Cadad-anan, Cagubatan, Dacudac, Lenga and Pandayan came from Miligan or Namiligan. A place just below the Inodey falls and Lesseb, Bauko. The people here are now called to belong to the Kankanaey Tribe. The early settlers that inhabited the rest of the barangays of Tadian that covers the central part (Zone I) and Sulumaside(Zone II) were believed to have came from Dallican and Cayos of the Ilocos Coast and are now called to belong to the Applai tribe.
The Socio-cultural characteristics of these two tribes of Tadian can be traced back to the early ages. As in the past, they still have common cultural practices such as conducting yearly begnas or festivals (before planting and before harvesting) and other form of kanao or sida. At present, they wear no more their G-string and tapis as their main clothing, they wear these clothings during special occasions and festivals as their special clothings.
It is said that the dead remains as their spiritual adviser in such a way that the family should leave their place when the crop is not bountiful, or when a member feels ill or when bad luck besets them. It is their belief that the spirit of the dead does not want to stay there anymore and not blame on any outside circumstances. Thus, explains their being migratory or nomadic.
At present, most people of the municipality are christianized which saw the declined of conduct of the so many cultural practices in the past. People already are selective, only the goods ones are continued while the considered hindrances to their growth economically and spiritually are being left and sometimes forgotten by this generation.
Mother Tongue
there are 16,165 or 98.40% of the total population in 1995 speaks kankanaey followed by Ilocano at 0.60% or 98 persons and the rest are distributed to the different dialect found in the locality. Kankana-ey is the commonly spoken dialect in the municipality, the tone however differ from different locations.
5:00 PM

TOPOGRAPHY AND CLIMATE

Tadian municipality is generally mountainous with general slopes of over 18 percent. Its elevation ranges from 440 m to 2113m above sea level. Poblacion, the seat of the municipal government has general elevation of 1,340 m above sea level. It has 2 major rivers that both drain to the Abra River, namely: Abit River that drains the southeastern portion and Decapeo River that drain the northwest portion.
Tadian is considered as the temperate zone of Mountain Province where the cool breeze of Benguet meets with the warm air of the lowland Ilocos. It has two pronounced season, the wet season, which starts from the month of May to November and dry season that covers the rest of the months.
Zone I & II
1. Ub-ubanan pool and falls – This place is best suited for picnic area and bathing due to the cleanliness of its free flowing water. People are coming to this place especially during summer time. It is located in Sumadel, Tadian, 13 kms away from the Poblacion.
2. Foot prints of Cabunyan and his dog, his backpack and spear. – the footprints of Cabunyan and his dog can be found in Sumadel, Tadian, while his backpack and spear can be found in Gayang, Bunga, Tadian. The word gayang is the local term for spear. It can be recounted according to old folks of this place that once Cabunyan the local term for God came to earth and off these traces of his existence to this place including the rice field in Kayan East which believed to be built by him.
3. Singing Jar – This jar can be found in Kayan West, Tadian presently owned by Mr. Resurrecsion Wanget Sr. The jar will sing while rubbing its mouth. The only one of its kind in the locality.
4. Rice Terraces of all the places of Tadian.
5.Tadian mountain ranges where one can see Tirad pass and Bessang Pas
and other panoramic view of the place.
Tadian municipality in itself is a tourist spot with all its beautiful rice terraces and mountains are at stake.
Tadian municipality celebrated its Town Fiesta every first Friday and Saturday of March every year. It is on this occasion that most people from its barangay come to the Poblacion to attend the said fiesta and at the same time purchase items from kitchen wares, carpentry to garment which are necessary to them. In the occasion, the fiesta is started with a parade which is participated by all agencies and barangays followed by an opening program, ground demonstration and ball games. The search for Miss Tadian is done before this occasion or it is a pre-fiesta activity. Market activity is at its peak on this occasion.

Monday, June 4, 2012

8:44 PM

A Small Guide to Hacking HOTMAIL

HOTMAIL HACKING INFO.


I_1_I  - Brute force hacking
a. Use telnet to connect to port 110 (Hotmail´s pop-server)
b. Type USER and then the victim´s username
c. Type PASS and then the guess a password
d. Repeat that until U have found the correct password.
!. This is called brute force hacking and requires patience.
It´s better than trying to guess the victims password on
hotmail homepage only because it´s faster.
____
I_2_I  - The Best way
a. Get the username of the victim (It usually stands in the adress-field
)
b. Then type " www.hotmail.com/cgi-bin/start/victimsusername "
c. U´re in!
!. This hack only work if U are on the same network or computer as the
victim and if he don´t log out.
____
I_3_I  - The old way
a. Go to http://www.hotmail/proxy.html
b. Now type the victims username. (press login)
c. Look at the source code.
d. On the fifth row U should find "action=someadress"
e. Copy that adress and paste it into the adress-field
f. You are in...
!. As you can see it´s a long procedure and the victim have
plenty of time to log out.
____
I_4_I  - Another...
a. Go to hotmail´s homepage
b. Copy the source code.
c. Make a new html file with the same code but change method=post to
method=enter
d. "view" the page
e. Change the adress to www.hotmail.com/ (don´t press enter!)
f. Make the victim type in his username and password
g. Look in the adress-field. There you´ll see ...&password:something...
!. This is the way I use, because it lets you know the password.
(If he exits the browser U can see the password in the History folder!)

READ!
Hotmail´s sysops have changed the "system" so that the victim may log
out even
if U are inside his/her account. So don´t waste U´r time!

---

So you want to get some hotmail passwords? 
This is pretty easy to do once you have got the hang of it. 
If you are a beginner, I wouldn't make this your first attempt at
hacking.  When you need to do is use a port surfer and surf over to
port 80.  While there, you have to try and mail the user that you
want the password from.  It is best to mail them using the words
"We" and "Here at Hotmail..."  Most suckers fall for this and end
up giving out their password.  There is another way to also, you can
get an anon mailer, and forge the addres as staff@hotmail.com.  But
you have to change the reply address to go to a different addres
like user@host.com.  The person that you are trying to get the pass
from MUST respond to that letter for the mail to be forwarded to you.
Have text like "Please reply to this letter with the subject "PASSWORD"
and underneith please include your user name and password. 
If you have trouble Loging in withing the next few days, this is
only because we are updating our mail servers but no need to worry,
your mail will still be there.  Even though the server may be down
for an hour.  From the staff at Hotmail, Thank You."



8:43 PM

A simple TCP spoofing attack


               


Over the past few years TCP sequence number prediction attacks have become a
real threat against unprotected networks, taking advantage of the inherent
trust relationships present in many network installations.  TCP sequence
number prediction attacks have most commonly been implemented by opening a
series of connections to the target host, and attempting to predict the
sequence number which will be used next.  Many operating systems have
therefore attempted to solve this problem by implementing a method of
generating sequence numbers in unpredictable fashions.  This method does
not solve the problem.

This advisory introduces an alternative method of obtaining the initial
sequence number from some common trusted services.  The attack presented here
does not require the attacker to open multiple connections, or flood a port
on the trusted host to complete the attack.  The only requirement is that
source routed packets can be injected into the target network with fake
source addresses.

This advisory assumes that the reader already has an understanding of how
TCP sequence number prediction attacks are implemented.

The impact of this advisory is greatly diminished due to the large number of
organizations which block source routed packets and packets with addresses
inside of their networks.  Therefore we present the information as more of
a 'heads up' message for the technically inclined, and to re-iterate that
the randomization of TCP sequence numbers is not an effective solution
against this attack.


Technical Details
~~~~~~~~~~~~~~~~~

The problem occurs when particular network daemons accept connections
with source routing enabled, and proceed to disable any source routing
options on the connection.  The connection is allowed to continue, however
the reverse route is no longer used.  An example attack can launched against
the in.rshd daemon, which on most systems will retrieve the socket options
via getsockopt() and then turn off any dangerous options via setsockopt().

An example attack follows.

Host A is the trusted host
Host B is the target host
Host C is the attacker

Host C initiates a source routed connection to in.rshd on host B, pretending
to be host A.

Host C spoofing Host A         <SYN>    -->  Host B in.rshd

Host B receives the initial SYN packet, creates a new PCB (protocol
control block) and associates the route with the PCB.  Host B responds,
using the reverse route, sending back a SYN/ACK with the sequence number.

Host C spoofing Host A  <--  <SYN/ACK>       Host B in.rshd

Host C responds, still spoofing host A, acknowledging the sequence number.
Source routing options are not required on this packet.

Host C spoofing Host A         <ACK>    -->  Host B in.rshd

We now have an established connection, the accept() call completes, and
control is now passed to the in.rshd daemon.  The daemon now does IP
options checking and determines that we have initiated a source routed
connection.  The daemon now turns off this option, and any packets sent
thereafter will be sent to the real host A, no longer using the reverse
route which we have specified.  Normally this would be safe, however the
attacking host now knows what the next sequence number will be.  Knowing
this sequence number, we can now send a spoofed packet without the source
routing options enabled, pretending to originate from Host A, and our
command will be executed.

In some conditions the flooding of a port on the real host A is required
if larger ammounts of data are sent, to prevent the real host A from
responding with an RST.  This is not required in most cases when performing
this attack against in.rshd due to the small ammount of data transmitted.

It should be noted that the sequence number is obtained before accept()
has returned and that this cannot be prevented without turning off source
routing in the kernel.

As a side note, we're very lucky that TCP only associates a source route with
a PCB when the initial SYN is received.  If it accepted and changed the ip
options at any point during a connection, more exotic attacks may be possible.
These could include hijacking connections across the internet without playing
a man in the middle attack and being able to bypass IP options checking
imposed by daemons using getsockopt().  Luckily *BSD based TCP/IP stacks will
not do this, however it would be interesting to examine other implementations.

Impact
~~~~~~

The impact of this attack is similar to the more complex TCP sequence
number prediction attack, yet it involves fewer steps, and does not require
us to 'guess' the sequence number.  This allows an attacker to execute
arbitrary commands as root, depending on the configuration of the target
system.  It is required that trust is present here, as an example, the use
of .rhosts or hosts.equiv files.


Solutions
~~~~~~~~~

The ideal solution to this problem is to have any services which rely on
IP based authentication drop the connection completely when initially
detecting that source routed options are present.  Network administrators
and users can take precautions to prevent users outside of their network
from taking advantage of this problem.  The solutions are hopefully already
either implemented or being implemented.

1. Block any source routed connections into your networks
2. Block any packets with internal based address from entering your network.

Network administrators should be aware that these attacks can easily be
launched from behind filtering routers and firewalls.  Internet service
providers and corporations should ensure that internal users cannot launch
the described attacks.  The precautions suggested above should be implemented
to protect internal networks.

Example code to correctly process source routed packets is presented here
as an example.  Please let us know if there are any problems with it.
This code has been tested on BSD based operating systems.

        u_char optbuf[BUFSIZ/3];
        int optsize = sizeof(optbuf), ipproto, i;
        struct protoent *ip;

        if ((ip = getprotobyname("ip")) != NULL)
                ipproto = ip->p_proto;
        else
                ipproto = IPPROTO_IP;
        if (!getsockopt(0, ipproto, IP_OPTIONS, (char *)optbuf, &optsize) &&
            optsize != 0) {
                for (i = 0; i < optsize; ) {
                        u_char c = optbuf[i];
                        if (c == IPOPT_LSRR || c == IPOPT_SSRR)
                                exit(1);
                        if (c == IPOPT_EOL)
                                break;
                        i += (c == IPOPT_NOP) ? 1 : optbuf[i+1];
                }
        }


One critical concern is in the case where TCP wrappers are being used.  If
a user is relying on TCP wrappers, the above fix should be incorporated into
fix_options.c.  The problem being that TCP wrappers itself does not close
the connection, however removes the options via setsockopt().  In this case
when control is passed to in.rshd, it will never see any options present,
and the connection will remain open (even if in.rshd has the above patch
incorporated).  An option to completely drop source routed connections will
hopefully be provided in the next release of TCP wrappers.  The other option
is to undefine KILL_IP_OPTIONS, which appears to be undefined by default.
This passes through IP options and allows the called daemon to handle them
accordingly.


Disabling Source Routing
~~~~~~~~~~~~~~~~~~~~~~~~

We believe the following information to be accurate, however it is not
guaranteed.

--- Cisco

To have the router discard any datagram containing an IP source route option
issue the following command:

no ip source-route

This is a global configuration option.


--- NetBSD

Versions of NetBSD prior to 1.2 did not provide the capability for disabling
source routing.  Other versions ship with source routing ENABLED by default.
We do not know of a way to prevent NetBSD from accepting source routed packets.
NetBSD systems, however, can be configured to prevent the forwarding of packets
when acting as a gateway.

To determine whether forwarding of source routed packets is enabled,
issue the following command:

# sysctl net.inet.ip.forwarding
# sysctl net.inet.ip.forwsrcrt

The response will be either 0 or 1, 0 meaning off, and 1 meaning it is on.

Forwarding of source routed packets can be turned off via:

# sysctl -w net.inet.ip.forwsrcrt=0

Forwarding of all packets in general can turned off via:

# sysctl -w net.inet.ip.forwarding=0


--- BSD/OS

BSDI has made a patch availible for rshd, rlogind, tcpd and nfsd.  This
patch is availible at:

ftp://ftp.bsdi.com/bsdi/patches/patches-2.1

OR via their patches email server <patches@bsdi.com>

The patch number is
U210-037 (normal version)
D210-037 (domestic version for sites running kerberized version)


BSD/OS 2.1 has source routing disabled by default

Previous versions ship with source routing ENABLED by default.  As far as
we know, BSD/OS cannot be configured to drop source routed packets destined
for itself, however can be configured to prevent the forwarding of such
packets when acting as a gateway.

To determine whether forwarding of source routed packets is enabled,
issue the following command:

# sysctl net.inet.ip.forwarding
# sysctl net.inet.ip.forwsrcrt

The response will be either 0 or 1, 0 meaning off, and 1 meaning it is on.

Forwarding of source routed packets can be turned off via:

# sysctl -w net.inet.ip.forwsrcrt=0

Forwarding of all packets in general can turned off via:

# sysctl -w net.inet.ip.forwarding=0


--- OpenBSD

Ships with source routing turned off by default.  To determine whether source
routing is enabled, the following command can be issued:

# sysctl net.inet.ip.sourceroute

The response will be either 0 or 1, 0 meaning that source routing is off,
and 1 meaning it is on.  If source routing has been turned on, turn off via:

# sysctl -w net.inet.ip.sourceroute=0

This will prevent OpenBSD from forwarding and accepting any source routed
packets.


--- FreeBSD

Ships with source routing turned off by default.  To determine whether source
routing is enabled, the following command can be issued:

# sysctl net.inet.ip.sourceroute

The response will be either 0 or 1, 0 meaning that source routing is off,
and 1 meaning it is on.  If source routing has been turned on, turn off via:

# sysctl -w net.inet.ip.sourceroute=0


--- Linux

Linux by default has source routing disabled in the kernel.


--- Solaris 2.x

Ships with source routing enabled by default.  Solaris 2.5.1 is one of the
few commercial operating systems that does have unpredictable sequence
numbers, which does not help in this attack.

We know of no method to prevent Solaris from accepting source routed
connections, however, Solaris systems acting as gateways can be prevented
from forwarding any source routed packets via the following commands:

# ndd -set /dev/ip ip_forward_src_routed 0

You can prevent forwarding of all packets via:

# ndd -set /dev/ip ip_forwarding 0

These commands can be added to /etc/rc2.d/S69inet to take effect at bootup.


--- SunOS 4.x

We know of no method to prevent SunOS from accepting source routed
connections, however a patch is availible to prevent SunOS systems from
forwarding source routed packets.

This patch is availible at:

ftp://ftp.secnet.com/pub/patches/source-routing-patch.tar.gz

To configure SunOS to prevent forwarding of all packets, the following
command can be issued:

# echo "ip_forwarding/w 0" | adb -k -w /vmunix /dev/mem
# echo "ip_forwarding?w 0" | adb -k -w /vmunix /dev/mem

The first command turns off packet forwarding in /dev/mem, the second in
/vmunix.


--- HP-UX

HP-UX does not appear to have options for configuring an HP-UX system to
prevent accepting or forwarding of source routed packets.  HP-UX has IP
forwarding turned on by default and should be turned off if acting as a
firewall.  To determine whether IP forwarding is currently on, the following
command can be issued:

# adb /hp-ux
ipforwarding?X      <- user input
ipforwarding:
ipforwarding: 1
#

A response of 1 indicates IP forwarding is ON, 0 indicates off.  HP-UX can
be configured to prevent the forwarding of any packets via the following
commands:

# adb -w /hp-ux /dev/kmem
ipforwarding/W 0
ipforwarding?W 0
^D
#

--- AIX

AIX cannot be configured to discard source routed packets destined for itself,
however can be configured to prevent the forwarding of source routed packets.
IP forwarding and forwarding of source routed packets specifically can be
turned off under AIX via the following commands:

To turn off forwarding of all packets:

# /usr/sbin/no -o ipforwarding=0

To turn off forwarding of source routed packets:

# /usr/sbin/no -o nonlocsrcroute=0

Note that these commands should be added to /etc/rc.net



If shutting off source routing is not possible and you are still using
services which rely on IP address authentication, they should be disabled
immediately (in.rshd, in.rlogind).  in.rlogind is safe if .rhosts and
/etc/hosts.equiv are not used.


Attributions
~~~~~~~~~~~~

Thanks to Niels Provos <provos@physnet.uni-hamburg.de> for providing
the information and details of this attack.  You can view his web
site at http://www.physnet.uni-hamburg.de/provos

Thanks to Theo de Raadt, the maintainer of OpenBSD for forwarding this
information to us.  More information on OpenBSD can be found at
http://www.openbsd.org

Thanks to Keith Bostic <bostic@bsdi.com> for discussion and a quick
solution for BSD/OS.

Thanks to Brad Powell <brad.powell@west.sun.com> for providing information
for Solaris 2.x and SunOS 4.x operating systems.

Thanks go to CERT and AUSCERT for recommendations in this advisory.

You can contact the author of this advisory at oliver@secnet.com



-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3ia

mQCNAzJATn0AAAEEAJeGbZyoCw14fCoAMeBRKiZ3L6JMbd9f4BtwdtYTwD42/Uz1
A/4UiRJzRLGhARpt1J06NVQEKXQDbejxGIGzAGTcyqUCKH6yNAncqoep3+PKIQJd
Kd23buvbk7yUgyVlqQHDDsW0zMKdlSO7rYByT6zsW0Rv5JmHJh/bLKAOe7p9AAUR
tCVPbGl2ZXIgRnJpZWRyaWNocyA8b2xpdmVyQHNlY25ldC5jb20+iQCVAwUQMkBO
fR/bLKAOe7p9AQEBOAQAkTXiBzf4a31cYYDFmiLWgXq0amQ2lsamdrQohIMEDXe8
45SoGwBzXHVh+gnXCQF2zLxaucKLG3SXPIg+nJWhFczX2Fo97HqdtFmx0Y5IyMgU
qRgK/j8KyJRdVliM1IkX8rf3Bn+ha3xn0yrWlTZMF9nL7iVPBsmgyMOuXwZ7ZB8=
=xq4f
-----END PGP PUBLIC KEY BLOCK-----

Copyright Notice
~~~~~~~~~~~~~~~~
The contents of this advisory are Copyright (C) 1997 Secure Networks Inc,
and may be distributed freely provided that no fee is charged for
distribution, and that proper credit is given.

 You can find Secure Networks papers at ftp://ftp.secnet.com/pub/papers
 and advisories at ftp://ftp.secnet.com/advisories

 You can browse our web site at http://www.secnet.com

 You can subscribe to our security advisory mailing list by sending mail to
 majordomo@secnet.com with the line "subscribe sni-advisories"

You May Like to Read:

You May Like to Read:

Popular Posts