From: "Petr Vandrovec" <VANDROVE@vc.cvut.cz>
To: "Jeff V. Merkey" <jmerkey@timpanogas.org>
Cc: linux-kernel@vger.kernel.org, linware@sh.cvut.cz
Subject: Re: NetWare Changing IP Port 524
Date: Tue, 14 Nov 2000 20:48:30 MET-1 [thread overview]
Message-ID: <CDB246E6CB3@vcnet.vc.cvut.cz> (raw)
On 14 Nov 00 at 12:11, Jeff V. Merkey wrote:
> If you are relying on port 524 to get SAP information for NCPFS over
> TCPIP, you may want to track this since it appears Novell will be
> patching this port to close a security flaw. I
> added the tracking URL so you can review what changes they are
> proposing. I think what they
> are proposing as an immediate patch may break NCPFS -- you will need to
> check.
I think that it is unavoidable. Either you can browse network resources,
through SAP, NDS, DNS, SLP, bindery - and you also disclose
informations - or you cannot browse network and users will get angry
from typing 80 characters FQDN names...
You can limit it by removing [Search] right for [Public] from your NDS -
and I believe that it is only correct solution. Of course every NDS server
must be able to tell to [public] address of at least one other server
nearest to [root], as client must be able to find where r/w replica
resides - and because of you know that there is [root] object in every
tree, you can find also [root] owner IP/IPX address. But if even knowing
of address of server can kill your network, you should already firewall
everything out.
> Novell's NetWare operating system contains a flaw that allows
> system information to be leaked via TCP port 524 in pure IP
> configurations. When NetWare is used in a mix Microsoft
> environment, the Novell operating system leaks data via Service
> Advertising Protocol (SAP). Other third-party applications
> compound the problem as well. A hacker can use the data to gain
> knowledge on the inner workings of the affected system. It is
> recommended that port 524 be blocked to prevent any leaks.
Yeah. They forgot to note that after blocking port 524 nobody
can connect to server from outer world. They could say in less
words that Netware and IP are not on same boat ;-) I think they
should fix buffer overflows and possible abends in their NCP engine,
and issue warnings about not giving [Search] rights to [Public]
instead of blocking whole world from Netware servers.
BTW, in our tree not-logged-in object does not see anything, except
few objects which have explicitly granted visibility for [public].
But maybe that I misunderstood their information... If they are
talking about that information learned through SLP/SAP/NDS are
available through SLP/SAP/NDS, I do not see anything wrong with it.
If hacker can ask this server, it could also ask directly to source
of that information, unless your server is also serving as firewall
(and if it is, you should visit filtering section in FILTCFG.NLM...)
Best regards,
Petr Vandrovec
vandrove@vc.cvut.cz
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
Please read the FAQ at http://www.tux.org/lkml/
next reply other threads:[~2000-11-14 20:19 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2000-11-14 20:48 Petr Vandrovec [this message]
2000-11-14 20:29 ` NetWare Changing IP Port 524 Jeff V. Merkey
2000-11-15 1:56 ` Gregory Maxwell
2000-11-15 2:03 ` Jeff V. Merkey
2000-11-15 10:33 ` Olaf Titz
-- strict thread matches above, loose matches on Subject: below --
2000-11-14 19:11 Jeff V. Merkey
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=CDB246E6CB3@vcnet.vc.cvut.cz \
--to=vandrove@vc.cvut.cz \
--cc=jmerkey@timpanogas.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linware@sh.cvut.cz \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox