Cisco to Open Source CTA 48
VE3OGG writes "Cisco, the networking Goliath, has decided to release the source code of its NAC (network admission control) client, Cisco Trust Agent (CTA) to the open source community within 'a few months.' This comes hot on the heels of Cisco announcing its plans to redevelop a new breed of network security infrastructure. 'CTA will be something that's open source. That's just logically where it should end up,' Gleichauf told InfoWorld. 'We don't want to be in the CTA business, so we're going to just open it up.'"
ohhh yeah (Score:5, Funny)
Yeah, well they've certainly got a NAC for it.
Re: (Score:2)
VPN (Score:4, Interesting)
The last linux release from cisco's site is a year old and the kernel module doesn't compile against the 2.6.19 kernel. Just to get it to compile against 2.6.18 you had to fake a config.h in your kernel source include folder.
Re:VPN (Score:5, Informative)
I use it to connect to customer's not having set up OpenVPN every day, and it never failed on me yet. Give it a try, you won't regret it.
Re:VPN (Score:4, Informative)
Re: (Score:2)
Thanks for the link. Turns out it's even in the fedora-extras repository. Learn something new everyday
Re: (Score:2)
Re: (Score:2)
I'm more interested in getting Cisco IP-Communicator under Linux since it is the last program I need Windows to run and it doesn't run under any form of emulation.
Re: (Score:3, Informative)
And we care because (Score:3, Interesting)
Re: (Score:3, Informative)
NAC can, pretty reliably if done right, confirm that the machine in question has update services running, has an active antivirus (as opposed to just a process with the same name) and is running proper patch levels and virus definitions. This alone fixes the vast majority of security br
Re: (Score:2)
Problem one is that unfinished frameworks are a dime a dozen -- figuring out which ones are going to get finished is a job for Nostradamus.
Problem two is that most IT organizations don't have the chutzpah to actually implement trusted access. The coordination requirements between different departments are a killer, and
Re: (Score:2)
Re: (Score:3, Insightful)
Re: (Score:3, Interesting)
We care because they are helping to set a precedent, one that I hope becomes the norm for tech and software companies, at end of life... open source!
We care because one of the benefits of open source, is that a particularly well written piece of code can be adapted for a different function while retaining most of what makes it 'goo
Re: (Score:2)
theoretical security: there is now known way to circumvent this (think one-time-pad)
real security: it's possible to circumvent this, but for 99.9% of potential attackers out there, it would take more effort than its worth.
Re: (Score:1)
Re: (Score:2)
Which is exactly why Cisco's Network Access control (NAC) and Microsoft's Network Access Protection (NAP) and the Trusted Computing Group's Trusted Network Connect (TNC) are all actually about cramming Trusted Computing down our throats. All of them do the same thing, and all of them are pretty well pointless without Trusted Computing. If your network connection uses NAC/NAP/TNC, it pretty much requires Trusted Comput
Cisco's table scrap (Score:5, Insightful)
Re:Cisco's table scrap (Score:4, Interesting)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Gift horse (Score:5, Insightful)
Re: (Score:2, Interesting)
Re: (Score:2)
I wouldn't knock NAC just yet, it's rough still, but it has a lot of potential to help people that are not so talented at security keep themselves a bit safer on the 'net (which is good for everyon
Cisco Security Agent (Score:2, Informative)
CSA is a rootkit (Score:2)
CSA is fairly worthless against an expert who designs their programs to get around it.
Re: (Score:1)
CSA is the Host-based Intrustion Prevention software. It stops any anomolous behavior.
CTA is their 'NAC supplicant' that reports back to the querying endpoint (NAC enabled switch, router, etc) about the status of the system (a/v version, is it running?, signature version, etc.)
CSA has CTA built into it, but not vice versa.
It makes sense that Cisco is open-sourcing this - the don't make money on agents, they make money on selling more hardware (NAC
Actually the program is pretty cool... (Score:2, Interesting)
Even if they're not making money off it (no clue tbqh), it probably has some cool tidbits of code...
-Ho
And a good thing, too (Score:3, Funny)
Clever. (Score:3, Funny)
Re: (Score:1)
Can't get partners, so go open source (Score:1)
So now that Cisco has failed to get the community to play in their proprietary communications sandbox (remember
Good for Users (Score:2)
It is even possible that CTA would be developed into a strong player in the market, in which case not only the current users, but the whole world benefits.
I applaud this move, and wish more companies would open source
And wait for the untrusted agent... (Score:2)
But maybe Cisco has taken this into account in their risk analysis and NAC features.
GPL as a hostility tool (Score:2)
Retracted? (Score:1)
Response to Infoworld article about CTA Open Source
Q. What is this document?
A. This document is a response to the Network World article dated Feb 8, 2007 regarding CTA Open Source
Q. What is the article about? Where is it available?
A. Article is available at
http://www.infoworld.com/article/07/02/07/HNciscot ca_1.html [infoworld.com]
http://www.computerworld.com/action/article.do?com mand=viewArticleBasic&taxonomyName=network_securit y&articleId=9010 [computerworld.com]