You want to enable or disable router services such as finger, echo, and chargen.
The finger application provides a remote way of seeing who is logged into the router. You can enable it with the ip finger global configuration command:
Router1#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router1(config)#ip finger Router1#
Every Cisco router also has a set of small TCP and UDP server applications that are sometimes useful for testing purposes:
Router1#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router1(config)#service tcp-small-servers Router1(config)#service udp-small-servers Router1(config)#end Router1#
The finger command is a simple utility that allows you to do the equivalent of a show users command on a remote router. Unix computers generally have a standard finger program that you can run as follows:
Freebsd% finger @Router1
[Router1]
Line User Host(s) Idle Location
66 vty 0 kdooley idle 00:22:47 freebsd
67 vty 1 ijbrown idle 1d07h freebsd
* 68 vty 2 idle 00:00:00 freebsd
Interface User Mode Idle Peer Address
Freebsd%
You can also access the finger server by using the Telnet program to connect to TCP port 79. You can even do this from another router:
Router2#telnet 10.1.1.2 finger
Trying 10.1.1.2, 79 ... Open
Line User Host(s) Idle Location
66 vty 0 kdooley idle 00:24:14 freebsd
67 vty 1 ijbrown idle 1d07h freebsd
* 67 vty 1 idle 00:00:00 10.2.2.2
Interface User Mode Idle Peer Address
[Connection to 10.1.1.2 closed by foreign host]
Router2#
Notice in both of these cases that the output includes not only the active users, but the finger process itself, which is indicated by an asterisk.
The finger protocol is defined in RFC 1288. It is disabled by default on Cisco routers. While finger is a convenient way to see who is logged in to a remote router without having to log in yourself to check, it can also represent a serious security problem. Not only does it display a set of valid login IDs that can be used to focus an attack, but it consumes a VTY line on the router, which can prevent legitimate access if done persistently. The finger protocol also has a checkered history—one of the first viral attacks to shut down large sections of the Internet (the infamous Morris Worm) exploited a bug in the original finger implementation.
For all of these reasons, we strongly recommend that you keep this protocol disabled on all of your routers. If it has been enabled for any reason, you can disable it as follows:
Router1(config)#no ip finger
Note that the ip finger command replaces the earlier service finger command found in many references:
Router1(config)#service finger
If you use this deprecated version of the command, the router automatically replaces it with the newer command.
Cisco routers also support a set of simple TCP and UDP applications that are relatively common standards for IP devices. In IOS levels 12.0 and higher, the TCP and UDP small servers are disabled by default. In earlier IOS levels, they are enabled by default.
In general, we find that the small servers are only marginally useful, and recommend disabling them when you are not actively using them for testing purposes. These servers listen for incoming packets from any source, which makes them vulnerable to network DoS attacks. Usually, the attacks simply exploit the fact that the TCP servers will accept a connection from any device that requests one. If a hostile user sends a stream of TCP SYN packets to one of these ports, the router must respond to it and devote internal resources to keeping the session active. This can use up router resources.
The UDP servers are also potentially dangerous because a hostile user can spoof the source address in the packet to force your router to send a barrage of response packets to a third party. A similar attack could potentially be launched using the TCP servers, because the router will respond to any TCP SYN packet with a SYN ACK. Another network device could find itself unable to cope with receiving a barrage of unsolicited SYN ACK packets.
Therefore, we recommend disabling these services except when you specifically need to use one of them:
Router1(config)#no service tcp-small-servers Router1(config)#no service udp-small-servers
However, with these cautions, the small servers do have legitimate uses.
The TCP and UDP small servers are shown in Table 2-2. The router implements both TCP- and UDP-based versions of each of these server functions, on the same port numbers. These are all well-known ports and commonly implemented applications. They are usually used for testing purposes.
Port number |
Common name |
RFC |
Description |
---|---|---|---|
7 |
echo |
RFC 862 |
The server process responds to any client input by sending back the identical data. |
9 |
discard |
RFC 863 |
The server process discards any data sent by the client. |
13 |
daytime |
RFC 867 |
The server responds with the current time and date, then closes the session. |
19 |
chargen |
RFC 864 |
The server sends a constant stream of ASCII characters to the client. |
The easiest way to see what these functions do is to simply try them. The TCP versions are easier to demonstrate because you can use the standard Telnet application: just tell it to connect to a different TCP port number.
The echo function responds to whatever you type by sending back the same data:
Freebsd% telnet Router1 echo Trying 172.25.25.1... Connected to Router1. Escape character is '^]'. It gives a very echo to the seat where love is thron'd It gives a very echo to the seat where love is thron'd ^] telnet> quit Connection closed. Freebsd%
In its UDP version, the echo function merely copies the data segment of the packet and returns it to the sender.
The discard function is considerably less useful. The TCP version allows the client to establish a TCP session with the server, then ignores everything sent to it:
Freebsd% telnet Router1 discard Trying 172.25.25.1... Connected to Router1. Escape character is '^]'. Go off; I discard you: let me enjoy my private; go off. ^] telnet> quit Connection closed. Freebsd%
The UDP version of this application listens for packets on UDP port number 9, but doesn't respond to them in any way.
The TCP version of the daytime server accepts a connection request, immediately sends a packet containing the current time and date in ASCII format, then disconnects the session:
Freebsd% telnet Router1 daytime
Trying 172.25.25.1...
Connected to Router1.
Escape character is '^]'.
Sunday, January 5, 2003 17:41:21-EST
Connection closed by foreign host.
Freebsd%
The UDP daytime server listens on UDP port number 13, and responds with a single packet containing the same ASCII time data as the TCP version. The daytime server is marginally useful for checking a clock, but other applications such as NTP are much more robust if you actually want to configure a reliable time service. We discuss NTP in Chapter 14.
The character generation (chargen) function is probably the most useful of the TCP small servers. As soon as you make a connection to this port number, the router will start sending a continuous stream of data back to the client. We have often used this feature as a sort of poor-man's traffic generator to investigate network loading issues:
Freebsd% telnet Router1 chargen
Trying 172.25.25.1...
Connected to Router1.
Escape character is '^]'.
!"#$%&'( )*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefg
!"#$%&'( )*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgh
"#$%&'( )*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghi
#$%&'( )*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghij
$%&'( )*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijk
%&'( )*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijkl
<similar lines deleted>
^]
telnet> quit
Connection closed.
Freebsd%
The UDP version of the chargen server listens for a UDP packet on the well-known port number 19, then generates a single response packet back to the sender. This response packet contains a random number between 0 and 512 bytes of arbitrary character data.
Chapter 14; RFC 1288, RFC 862, RFC 863, RFC 864, and RFC 867; Twelfth Night: Or, What You Will by William Shakespeare
Top |