Think IPM

Friday, March 6, 2015

Is your Citrix Netscaler vulnerable to the FREAK Attack?

Man in the MiddleI have heard this asked before and thought it would make a good post to get some information out.

The FREAK (Factoring RSA Export Keys) attack is the latest threat to exploit vulnerabilities in the OpenSSL libraries. You might remember the HeartBleed bug from last year.

FREAK (formally known as CVE-2015-0204) affects versions of OpenSSL prior to 1.0.1i (released January 15, 2015).  It’s a man in the middle type of attack and affects a lot of different devices.  The official description is here and a good editorialized version here.

I searched and searched but couldn't really find anything official from Citrix on the KBs.  I did run across an old Citrix Forum post related to the Heartbleed bug that stated Netscalers do not use OpenSSL on the internet facing side and therefore would not be affected by internet based OpenSSL attacks.  They actually use an internal SSL stack that they privately test against any known SSL threats.  OpenSSL is only used for connections to the management side.  The information is from a Netscaler Product Manager and can be found here.

It’s a good bet that Citrix engineers are busy testing the internal code stack against the new CVE-2015-0204 vulnerability. Once complete, I am sure will release a KB article like they did with Heartbleed but until then, this will have to do. :) 

Click Here to Continue Reading >>

Friday, February 20, 2015

PSA: SuperFish Malware Threat

Just a quick note with some good information on the newest Malware threat to be in the news.

Image result for friday fish fry
Some background information on the whole story (if you haven’t heard of it) can be found here, there and also over here.

Aaron Silber sent over some useful links to test if you have been infected and some instructions on removing it if you have been compromised.  Be sure to test all installed browsers on your machine.

Microsoft updated Windows Defender to catch the malware and remove it.

You can also go to this website to see if you have been infected:

Click Here to Continue Reading >>

Tuesday, February 17, 2015

Lock-Blocked by vSphere Lockdown mode.

I was doing some routine upgrades this past night when I ran into a strange issue that I figured I would make a note of.  While using VMware’s Update Manager to upgrade an ESXi host from 5.1 to 5.5, I ended up getting a pretty cryptic error message from Update Manager letting me know I couldn’t proceed.

The details complained about not having enough memory to create a scratch space partition to store the upgrade image.  Weird.  My host had plenty of free space on the drive and tons of memory – All the VMs were evacuated and I had all the host memory to myself.


Fast forward after a bit of Googling and I ran across this blog post.  The alert message was exact but the resolution wasn’t correct for my situation.  Luckily someone had posted another resolution in the comments. (Side Note: Even if you don’t have the time or desire to run a blog, just adding comments to existing blog posts is a great way to contribute back to the virtualization community.)

The hosts I was working on were in a DMZ and had Lockdown Mode enabled.  The commenter had mentioned disabling Lockdown mode as the answer.  Worth trying!


I made the quick modification in vCenter to the DMZ host, reran the Update Scan and successfully upgraded the host to 5.5.  Just had to remember to re-enable lockdown mode after the reboot.  Lockdown mode only affected the actual upgrade and not the patches.  Patching a lockdown host presented no issues at all.

Click Here to Continue Reading >>

Thursday, December 25, 2014

Happy Holidays from vCloudInfo!

The holidays are upon us.  The year is almost over.  Another one in the books.

imageThank you for readership, support and encouragement in my personal and professional life this year.

Just a quick note to wish my friends, family, colleagues and clients a happy holiday season and prosperous 2015!

Click Here to Continue Reading >>

Wednesday, December 17, 2014

PSA: Watch out for CryptoLocker / CryptoWall emails

With the holiday season here, your users will be getting plenty of packages and tracking emails.  They will also be getting more than their share of malware infested scam emails.  Be a good IT Admin and remind them that vendors do not send attachments with tracking information inside for them to click. 

Curious where your package is?  Visit FedEx, UPS or USPS websites directly.  Or better yet, just paste your tracking number right into Google.

We’ve had a few clients recently where some gullible users have clicked through on these attachments and were hit with encrypted files and ransom notes.  Keeping your antivirus and anti-malware DAT files up to date is a great start but a little education and subtle reminders to the user community will provide a good last defense.

Happy Virus Free Holidays! :)

Click Here to Continue Reading >>