what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

b-15.ciac-tcpip-decnet-x25

b-15.ciac-tcpip-decnet-x25
Posted Sep 23, 1999

b-15.ciac-tcpip-decnet-x25

SHA-256 | ce36aa242d280338248d84229dde950bc639d39d94619588d71737d2a659935c

b-15.ciac-tcpip-decnet-x25

Change Mirror Download

FOR OFFICIAL DEPARTMENT OF ENERGY USE ONLY
_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
Information Bulletin

Network Intrusions through TCP/IP and DECnet Gateways

February 28, 1991, 1600 PST Number B-15
________________________________________________________________________
PROBLEM: The use of multiple network protocol computers (gateways)
can allow an intruder to gain unauthorized access to critical system
files.
PLATFORM: Multiple platforms, including DEC, VMS, ULTRIX, and
Sun computers. Attacks involve X.25 networks as well as networks
supporting TCP/IP and DECnet protocols.
DAMAGE: Possible compromise of user accounts and other system files
SOLUTIONS: Varied (depending on system configuration and required
functionality). See appendix for details.
________________________________________________________________________
Critical Network Intrusion Facts

CIAC has learned of a new series of attacks on computers connected to a
variety of networks. The common element in these attacks is the use of
computers supporting multiple network protocols, especially TCP/IP and
DECnet protocols. These multi-protocol (gateway) computers can enable
intruders on TCP/IP networks to obtain unauthorized access to files
using DECnetUs default FAL1 account. Some attacks have resulted in
attackers obtaining unauthorized copies of the UNIX password file and
the VMS RIGHTSLIST.DAT2 file.

CIAC recommends that during this time of increased threat you pay
special attention to VAX/VMS computers offering ANONYMOUS FTP service
and ULTRIX computers offering the DECnet-Internet Gateway services.
These services have been exploited by intruders on TCP/IP networks to
gain unauthorized access to remote files via DECnet. Some DECnet
networks have been configured to a lower level of DECnet security in
order to provide increased network functionality and ease of use. This
configuration often used under the assumption that access to DECnet is
limited to local users on the local DECnet network. However, the
existence of TCP/IP-DECnet gateway computers connected to both the
Internet and the local DECnet results in an increased risk of external,
unauthorized access to computers on the DECnet network. This includes
systems running VMS DECnet, ULTRIX DECnet, and Sunlink DNI DECnet.

CIAC recommends that you follow appropriate procedures to secure your
system(s) against this current threat. Possible actions are described
in the appendix to this notice. The actions you should take depend on
the type of system (VMS or UNIX) and tradeoffs between your security
needs and your functionality requirements.

For additional information or assistance, please contact CIAC

Hal R. Brand
(415) 422-6312 or (FTS) 532-6312

Call CIAC at (415) 422-8193 or (FTS) 532-8193.

send FAX messages to: (415) 423-0913 or (FTS) 543-0913

Neither the United States Government nor the University of California
nor any of their employees, makes any warranty, expressed or implied,
or assumes any legal liability or responsibility for the accuracy,
completeness, or usefulness of any information, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation, or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government nor the University of California, and shall not be used for
advertising or product endorsement purposes. Appendix

I. SECURING ANONYMOUS FTP ON VAX/VMS COMPUTERS

Procedure:
(login as SYSTEM)
$ set def sys$system
$ run authorize
UAF> mod anonymous/defpriv=nonetmbx/priv=nonetmbx
UAF> show anonymous
(Inspect the anonymous account to be sure that: )
( * The only privilege is TMPMBX )
( * Only NETWORK access is allowed )
UAF> exit
$ logout

Positive Impacts:
DECNet network security is greatly improved by preventing FTP users of
the ANONYMOUS account from accessing files via DECNET. Security of the
VAX/VMS computer is also improved by preventing DECNET access to the
ANONYMOUS account.

Negative Impacts:
Anonymous FTP users will no longer be able to access remote files via
DECNET.

Mitigation of Negative Impacts:
FTP users requiring access to remote files via DECNET can be given
accounts on the VAX/VMS system. If necessary, these accounts can be
configured to permit only NETWORK access with only TMPMBX and NETMBX
privileges.

Alternate Strategies:
Some TCP/IP implementations (notably MultiNet) provide a mechanism to
lock ANONYMOUS users into a directory tree. CIAC strongly recommends use
of this feature where possible.


II. SECURING ULTRIX COMPUTERS RUNNING THE DECNET-INTERNET GATEWAY SOFTWARE

Procedure:
(login as root)
# cd /etc
# cp inetd.conf inetd.conf-saved
(edit the file inetd.conf)
( place the "#" character in from of the line: )
( ftp stream tcp nowait /usr/etc/ftpd.gw ftpd.gw )
( add this line just after the line just modified: )
( ftp stream tcp nowait /usr/etc/ftpd ftpd )
( save the file and exit the editor )
(Restart the inetd daemon. For example: )
( # ps -ax | grep inetd )
( Look at the output and find the process number of /etc/inetd )
( # kill -9 <process-number> )
( # /etc/inetd )
# exit

Positive Impacts:
DECNet network security is greatly improved by preventing FTP access to
remote files via DECNET through the ULTRIX computer.

Negative Impacts:
Loss of access to remote files via DECNet to FTP users.

Mitigation of Negative Impacts:
FTP users requiring access to remote files via DECNET can be given
accounts on the ULTRIX computer from which they can copy the remote
files via DECNet, and then FTP those files to/from the ULTRIX
computer.

III. SECURING DEFAULT FAL ACCESS

Procedure (On VAX/VMS computers):
(login as SYSTEM)
$ mcr ncp set object fal username illegal
$ mcr ncp define object fal username illegal
(Make sure you don't have an account named "illegal".)
$ logout

Procedure (On ULTRIX computers):
(login as root)
# /etc/ncp set object fal default user illegal
# /etc/ncp define object fal default user illegal
(Make sure you don't have an account named "illegal".)
# exit

Procedure (On Sun computers):
(login as root)
# cd /etc
(edit /etc/passwd to remove (or comment-out) the "dni" account)
( A typical dni account entry line looks like:)
( dni:*:376:376:default DNI account:/tmp: )
( and should be deleted or modified to: )
( #dni:*:376:376:default DNI account:/tmp: )
# exit

Positive Impacts:
Local security is greatly improved by preventing DECNet access to local
files without specific authorization in the form of a local account or
DECNet proxy login. Note that DECNet proxy logins are not supported by
Sun's Sunlink DNI product.

Negative Impacts:
Loss of legitimate DECNet access to remote files by users not
possessing an account on the local computer. Under Sunlink DNI, default
access to the NML (Network Management Layer) server will also be lost.

Mitigation of Negative Impacts:
The use of DECNet proxy logins can provide access to legitimate users.
Alternatively, legitimate users cna be given accounts. Under VAX/VMS,
these accounts can be restricted to only NETWORK access and only NETMBX
and TMPMBX privileges. Note that DECNet proxy logins are not supported
by Sun's Sunlink DNI product.

Alternate Strategies:
For VAX/VMS computers, default FAL access to RIGHTSLIST.DAT can be
disabled with an ACL (Access Control List) entry. To do this:
(Login as SYSTEM) $ mcr ncp show object fal char (Locate the
"User id" from the output of the previous command ) ( and
substitute appropriately below for <userid>) $ set acl
sys$system:rightslist.dat/acl=(id=<userid>,access=none) ( for
example: ) ( $ set acl
sys$system:rightslist.dat/acl=(id=fal$server,access=none)) $
dir/full sys$system:rightslist.dat ( Verify that the ACL is
properly set. ) (CIAC strongly suggests you also add this ACL
setting command to ) ( sys$manager:systartup_v5.com so that it
will not be lost in case ) ( a new RIGHTSLIST.DAT file is
created. )

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close