Quantcast
Channel: SEASnet
Viewing all 20 articles
Browse latest View live

SEASnet System Outage 01/16/2016

$
0
0

On Saturday, January 16th, from 4:30am to 9:00am, SEASnet will be performing urgent datacenter infrastructure maintenance. While most systems (linux servers, remote server, my.engineering, MSOL lectures, etc.) will be down for the duration of the outage, we will try and limit the downtime for networking and email to approximately one hour. Please make sure that you have stopped any running jobs and have saved your work prior to 4:30am on Saturday, January 16th. All services should be restored by 9am.

 


CCLE Outage

4404 BH Lab Procedural Change

$
0
0

Starting summer 2016, this instructional lab will be configured to logout users 10 minutes prior to the start of courses scheduled in the room. A popup message will appear on the desktop giving users a 5 minute warning to logoff before the system restarts. Once the system is restarted, only users officially enrolled in the course will be able to logon to the machines.  All users will be able to logon after the scheduled course time.

SEASnet Network Maintenance 12/17/2016

$
0
0

SEASnet needs to perform work on the School’s main router. This work will be done Saturday (12/17/2016) from 8:00am-10:00am. During this timeframe there may be network outages. We do not expect any outages in excess of 15-20 minutes. Please plan accordingly.

SEASnet Labs will open at a later time 1/23/2017

$
0
0

Today, January 23rd, SEASnet Labs will open at a later time due to emergency maintenance of servers.  Please check again for latest info.

SEASnet Lab Issue – Windows Machines ONLY

$
0
0

SEASnet is currently experiencing a problem with the windows lab machines and remote windows servers. User files are not available. SEASnet staff are working on resolving this issue as soon as possible.

We will continue to keep you updated on this issue.

 

SEASnet Labs are open 1/24/2017

$
0
0

SEASnet Labs are open and operating at regular time schedule.

 

 

SSL certificate update for eduroam wireless on Wednesday, 2/22, at 6:45 AM

$
0
0

IT Services will be updating the SSL certificate that secures wireless authentication for the eduroam wireless SSID on Wednesday, February 22nd, between 8:00AM and 8:30AM. Some wireless devices will detect that the SSL certificate has changed when connecting to the network and will pop up a warning, asking to trust the certificate or not.

The updated certificate can be validated by checking the following information:

  • The new certificate has the subject CN=radius.auth.ucla.edu
  • The new certificate has the serial number 67:d1:09:38:9b:45:83:1a:e0:91:2b:f5:39:b3:0b:56
  • The new certificate has an MD5 fingerprint of B1:94:BC:14:F7:01:91:46:43:79:15:38:55:F5:49:DA
  • The new certificate has a SHA1 fingerprint of FA:1D:18:05:A1:FF:AE:B9:DE:C3:69:D1:01:3E:00:40:0B:00:A9:D7

No announcements at this time

URGENT ANNOUNCEMENT – Campus Network Change

$
0
0

04/27/2017

Campus has notified SEASnet that a large number of machines on the network have  been infected with Double Pulsar. In order to stop the infection campus is planning on immediately blocking ports vulnerable from outside the UCLA network. The following ports/services will be affected:

Port Service
23 Telnet – unsecure text based remote connect
53 DNS – domain name resolution
67,68 DHCP – automatic IP assignment
111 SunRPC – unix service information
135-139 NetBios – network naming system
445 SMB – shared folder
1433 MS-SQL-S – Microsoft SQL database server
3306 MySQL – MySQL database
3389 RDP – windows remote desktop
9100 jetdirect – HP printer

A more detailed email is being sent out about this change.

URGENT ANNOUNCEMENT – Windows Exploit & WannaCry/WanaCrypto Ransomware

$
0
0
Campus security has notifed SEASnet of the proliferation of ransomeware and is recommending that you 
ensure all machines are patched. Please see the specific details below:

Reports are coming in from around the world that a new form of Ransomware called WannaCry/WanaCrypto 2.0 
is being exploited on unpatched machines, using the DoublePulsar vulnerability. This vulnerability was 
part of an exploit dump that occurred a few weeks ago by a group calling themselves "The Shadow Brookers". 
This vulnerability affects SMBv1, SMBv2, SMBv3 in Windows Versions XP, 2003, 7, 2008 and 2008r2. Currently 
the malware is spreading by acting as a worm (a computer worm is a standalone malware computer program 
that replicates itself in order to spread to other computers.  Often, it uses a computer network to spread 
itself, relying on security failures on the target computer).

The campus believes that the network blocks implemented a couple weeks ago have prevented infections on 
campus machines.  However, UCLA IT Security is still advising people to apply the MS17-010 patch ASAP as 
the border blocks will not protect machines that are off campus. In addition, Sophos has released a 
signature that detects the ransomware, so we recommend ensuring Sophos is current on any machines you manage.  
Finally, please be aware that there is no method of decryption publicly available at this time.  Any sites 
offering this service are potential phishing sites for the malware.

For more details on the vulnerability visit:
 https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

 

No announcements at this time

4404 BH Lab Procedural Change

$
0
0

Starting summer 2016, this instructional lab will be configured to logout users 10 minutes prior to the start of courses scheduled in the room. A popup message will appear on the desktop giving users a 5 minute warning to logoff before the system restarts. Once the system is restarted, only users officially enrolled in the course will be able to logon to the machines.  All users will be able to logon after the scheduled course time.

SSL certificate update for eduroam wireless on Wednesday, 2/22, at 6:45 AM

$
0
0

IT Services will be updating the SSL certificate that secures wireless authentication for the eduroam wireless SSID on Wednesday, February 22nd, between 8:00AM and 8:30AM. Some wireless devices will detect that the SSL certificate has changed when connecting to the network and will pop up a warning, asking to trust the certificate or not.

The updated certificate can be validated by checking the following information:

  • The new certificate has the subject CN=radius.auth.ucla.edu
  • The new certificate has the serial number 67:d1:09:38:9b:45:83:1a:e0:91:2b:f5:39:b3:0b:56
  • The new certificate has an MD5 fingerprint of B1:94:BC:14:F7:01:91:46:43:79:15:38:55:F5:49:DA
  • The new certificate has a SHA1 fingerprint of FA:1D:18:05:A1:FF:AE:B9:DE:C3:69:D1:01:3E:00:40:0B:00:A9:D7

Campus Network Change

$
0
0

04/27/2017

Campus has notified SEASnet that a large number of machines on the network have  been infected with Double Pulsar. In order to stop the infection campus is planning on immediately blocking ports vulnerable from outside the UCLA network. The following ports/services will be affected:

Port Service
23 Telnet – unsecure text based remote connect
53 DNS – domain name resolution
67,68 DHCP – automatic IP assignment
111 SunRPC – unix service information
135-139 NetBios – network naming system
445 SMB – shared folder
1433 MS-SQL-S – Microsoft SQL database server
3306 MySQL – MySQL database
3389 RDP – windows remote desktop
9100 jetdirect – HP printer

A more detailed email is being sent out about this change.


Windows Exploit & WannaCry/WanaCrypto Ransomware

$
0
0
Campus security has notifed SEASnet of the proliferation of ransomeware and is recommending that you 
ensure all machines are patched. Please see the specific details below:

Reports are coming in from around the world that a new form of Ransomware called WannaCry/WanaCrypto 2.0 
is being exploited on unpatched machines, using the DoublePulsar vulnerability. This vulnerability was 
part of an exploit dump that occurred a few weeks ago by a group calling themselves "The Shadow Brookers". 
This vulnerability affects SMBv1, SMBv2, SMBv3 in Windows Versions XP, 2003, 7, 2008 and 2008r2. Currently 
the malware is spreading by acting as a worm (a computer worm is a standalone malware computer program 
that replicates itself in order to spread to other computers.  Often, it uses a computer network to spread 
itself, relying on security failures on the target computer).

The campus believes that the network blocks implemented a couple weeks ago have prevented infections on 
campus machines.  However, UCLA IT Security is still advising people to apply the MS17-010 patch ASAP as 
the border blocks will not protect machines that are off campus. In addition, Sophos has released a 
signature that detects the ransomware, so we recommend ensuring Sophos is current on any machines you manage.  
Finally, please be aware that there is no method of decryption publicly available at this time.  Any sites 
offering this service are potential phishing sites for the malware.

For more details on the vulnerability visit:
 https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

 

No announcements at this time

Multi-Factor Authentication (MFA) Requirement for All Students starting April 17, 2018

$
0
0

Beginning April 17, 2018, UCLA will be enforcing mandatory participation in the multi-factor authentication (MFA) program on all students. Please see https://www.it.ucla.edu/iamucla for details.

Here are some events and resources available to support you as you enroll in MFA:

April 6, 10am – 2pm at Bruin Plaza: Coke, Jersey Mike’s, and Kettle Corn with provide free refreshments to those who have enrolled (while supplies last)
April 11, 5pm – 8pm at the Sproul Hall turnaround area: the TLT food truck will provide free taco samples to those who have enrolled (while supplies last)
April 13, 10am – 2pm in front of the Young Research Library: Hubert’s Lemonade will provide free drinks to those who have enrolled (while supplies last)

Bruin OnLine staff will be on-hand at the following ASK a Counselor tables:

April 4, 10am – 2pm between Royce Hall and Powell Library
April 5, 11am – 2pm in the Court of Sciences
April 11, 11am – 2pm in the Court of Sciences
April 12, 10am – 2pm between Royce Hall and Powell Library
April 9/10/11 – Tabling Outside of Residential Restaurants (one location per night)

 

Technical support is available from Bruin OnLine, (310) 267-4357 (HELP) or email *protected email*

UCLA VPN required for all Remote Desktop Sessions as of 04-26-2018

$
0
0

REMOTE DESKTOP will require VPN

As of April 26, 2018 ALL Remote Desktop sessions initiated from outside the UCLA Campus network will require connection to the UCLA VPN network first.

Please see the below webpage for information on setting up the UCLA VPN Connection (Authenticate using your UCLA Login / password)

UCLA VPN (Click Here)

CCLE Updates

Viewing all 20 articles
Browse latest View live




Latest Images