home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
CD-ROM Aktiv 1
/
CDA1_96.ISO
/
novell
/
alert.txt
< prev
next >
Wrap
Text File
|
1995-12-30
|
9KB
|
209 lines
SECURITY ALERT
by ALC Press
November 12, 1995
A NetWare feature exists that could compromise NetWare file server
security. The basic problem is that a hacker can write a program to login
to the file server as a print server, attach itself to a print queue,
select a job from the queue and assume the identity and rights of the user
who submitted the job.
While some security experts have known about this potential problem for
some time, ALC Press recently demonstrated a program that actually
exploited the NetWare feature. The program was written by the author of a
book on NetWare security, that ALC Press publishes, while he was doing
research on this problem for the next edition of his book. The program is
NOT available - don't even think about asking for it.
Imagine being logged in as a Supervisor or Admin or equivalent and
printing to a print queue. A hacker breaks in to your file server and
assumes your identity - even if you're logged already. The hacker could
steal or destroy any data from the file server, change anybody's passwords
and anything else that a priviledged user can do.
There are solutions to the problem but the solutions may not be acceptable
to you.
Solution 1
----------
One solution to this problem is to password protect every print server
account. You can do this with Novell's PCONSOLE program. Just select the
print server name and then select the Password menu item. Note that
PCONSOLE does not enforce any password restrictions such as a minimum
password length. You'll just have to be certain you enter a secure
password.
Even if your print server is capable of logging in with a password, make
certain that it can login with an encrypted password. If your print server
requires that you enter the "set allow unencrypted passwords=on" command
at the file server, you have another security problem that won't be
covered here.
Since this solution will not work for print servers that cannot supply a
password when they log in, you'll have to replace these print servers.
Solution 2
----------
The best solution to this problem is to turn off the ability of a print
server to assume the identity and rights of the user who submitted a print
job. Novell recognized this potential security problem and quietly added
the ability to disable this "Change To Client Rights" feature in NetWare
3.12 and NetWare 4.1. You can do this by adding the following statement to
your file server's AUTOEXEC.NCF file.
set allow change to client rights = off
Note that you cannot turn off the Change To Client Rights feature if you
use NetWare 3.11.
The unfortunate thing about this solution is that some products need the
Change To Client Rights feature enabled. Cheyenne's ARCServe is an example
of such a product. ARCServe will not backup your file server if you
disable this feature. This has been confirmed by Cheyenne's technical
support folks.
There are likely to be other products that also require this feature. One
solution to this problem is to stop using these products and instead use a
product that does not require the Change to Client Rights feature of
NetWare.
Other Solutions
---------------
Clearly, the two solutions described above may not be acceptable to you.
You may not wish to bear the expense of converting to another backup
product just because of a potential security problem that may never affect
you. You will also not wish to purchase new print servers just because
your old ones can't specify a password when logging in to your server.
There's hope for a third solution. ALC Press is working on another
solution to this problem that we feel is a good compromise between keeping
your server wide open to this kind of attack and having to replace
existing products.
If the solution we're exploring really works and is effective, we expect
to make it available in a few weeks. If you'd like to be notified when we
make the solution available, just send us your CompuServe or Internet
address along with your company name, city and country. You'll find our
electronic mail addresses at the end of this document. If you don't have
access to electronic mail, you can contact us via fax and we'll notify you
via fax. When you contact us, ask to be put on "LIST C".
More Information
----------------
If you need more information about the technical details of this security
problem as well as many other security-related matters, you can purchase
the book "NetWare Security" written by Ed Sawicki and published by ALC
Press. This book is only available directly from ALC Press and costs $45
(U.S. dollars) plus shipping. Shipping to destinations in the continental
United States is $7. Contact ALC Press for shipping fees to other
locations.
Contacting ALC Press
--------------------
Phone:1.503.635.6370
Fax:1.503.636.9501
CompuServe:75410,1176
Internet:info@alcpress.com
If you've missed the security alerts we've posted in the past, here they
are:
--------------------------------------------------------------------------
SECURITY ALERT
by ALC Press
August 1995
It had to happen. Someone has figured out how to bypass NetWare security
using the server's internal debugger and has published the procedure on
the Internet. The procedure, by now, has been widely distributed to the
better hacker BBS systems. The procedure eliminates having to specify a
password when logging in!
If you're not familiar with the internal debugger, it was placed into the
NetWare operating system as a tool programmers can use when debugging
NLMs. I've long been critical of Novell for including the debugger in
production operating systems. They should have instead included the
debugger in a development version of NetWare and shipped normal production
versions of NetWare without the debugger.
What can you do to protect against this potent security problem? The same
thing you do to protect your server from most other security problems -
physical security. If someone can touch the server's keyboard, they can
invoke the debugger with the not-so-intuitive SHIFT-SHIFT-ALT-ESC key
sequence.
Novell did provide a way to disable the debugger's invocation. When you
enter the command SECURE CONSOLE at the server's keyboard, you can no
longer invoke the debugger from the keyboard. I don't consider this a
robust solution because anyone with physical access to the server can take
the server down and bring it back up without the console secured.
Ed Sawicki
ALC Press
--------------------------------------------------------------------------
*** Security alert ***
by ALC Press
December 1994
As a network administrator or corporate security officer, one of your
more significant fears is likely to be a computer virus attack. If
you've been through a virus attack, you probably had to cleanup
after a single virus. That's bad enough. But suppose the attack came
from hundreds or thousands of viruses - all at once. This is now a
real possibility.
An extensive collection of computer viruses is now available on
CD-ROM for $99.95 (US dollars). It's called "The Collection: Outlaws
from America's Wild, Wild West". The CD-ROM comes from none other
than Mark Ludwig - one of the more controversial figures in the
computer security industry.
Many of those deeply concerned about security were beside themselves
when Mark published his book "The Little Black Book of Computer
Viruses". The book shows you how to create your own virus and gives
you sample source code. At the time, some were calling for
legislative remedies while others were reminding us about free
speech.
Now Ludwig may have gone a bit too far with his CD-ROM virus
collection. While he tells us that the practical purpose for buying
his CD-ROM is to be able to check out how well your virus scanner
finds viruses (a valid point), the CD-ROM's provocative name is
bound to stir things up. I think that above all else, Ludwig likes to
be at the center of controversy and loves the attention.
Armed with the CD-ROM, a disgruntled employee can now launch a
devastating attack that could require a very costly cleanup effort -
the kind of attack that impacts careers.
How concerned should you be about this? This threat is very real. It
would be a good time to review your security procedures. In the
event you have no formal security procedures for dealing with virus
attacks, this most significant threat should give you the incentive
you need to investigate how to put sensible procedures in place in
your company.
More Information
----------------
If you need more information about how to better secure your network from
attack by viruses, Trojan Horse programs, disgruntled employees or
hackers, you can purchase the book "NetWare Security" written by Ed
Sawicki and published by ALC Press. This book is only available directly
from ALC Press and costs $45 (U.S. dollars) plus shipping. Shipping to
destinations in the continental United States is $7. Contact ALC Press for
shipping fees to other locations.
Contacting ALC Press
--------------------
Phone:1.503.635.6370
Fax:1.503.636.9501
CompuServe:75410,1176
Internet:info@alcpress.com