RE: Software vendor clueless

From: Jeff Peterson (jpetersonat_private)
Date: Sun Aug 24 2003 - 14:36:00 PDT

  • Next message: Toh Hong Kuan: "RE: lots of sobig virus emails."

    I am indeed a very busy man.  I apologize for not expounding at length over
    every detail.  Given the apparent level of the list, I would think that some
    things could be taken for granted, such as the FACT that the server was
    relaying mail at an alarming rate, logging had been turned off, and that by
    physical security, I meant "Locked Door".
    
    As for spoofing IP addresses:  It IS a pretty trivial hack.  See: Source
    Routing.
    
    Unlike the old days, where university researchers and government offices
    ruled the network, many LANs these days have NO administrator on site.  This
    is the case here.  They only call for expert advice when something goes
    terribly wrong.  This is a function of the ease and efficiency of a network
    operating system allowing the masses to obtain computational powers at an
    attractive price.  The tide will not be turned back, so it is incumbent upon
    the knowledge worker to help the masses enjoy their newfound power, even if
    they don't have the budget to hire someone to look out for them full-time.
    
    -----Original Message-----
    From: Harlan Carvey [mailto:keydet89at_private]
    Sent: Thursday, August 21, 2003 6:00 AM
    To: incidentsat_private
    Subject: RE: Software vendor clueless
    
    
     
    > Again, not "acting" as an open relay, or did you
    > actually test to
    > determine whether it was configured to refuse
    > attempts to relay.
    
    This is one of the things about public lists such as
    this...getting clarification on issues.  Whether the
    original poster (OP) refrains from posting the
    specifics due to time/space issues, or due to not
    knowing, the fact remains that a lot of really useful
    information is never passed onto the community as a
    whole.
     
    > Another question is how you determined that the
    > server is actually being used as an open relay.  
    
    Exactly.  For example, my Exchange server is
    configured to NOT allow relaying.  When an attempt
    occurs, it's logged to the Event Log.  From there, I
    can collect and parse all of these attempts.
      
    > > Given the physical security, I can only deduce
    > that someone 
    > > else took advantage of the weak password security,
    > and helped 
    > > themselves.
    > 
    > I assume you meant "given the NETWORK security" as
    > "PHYSICAL" security
    > is something completely different.
    
    I think that in this case, physical security would
    apply just as well, particularly in the context. 
    However, you do bring up a good point.  Are Event Logs
    configured to audit failed logon attempts?  If so,
    were there any attempts to login?  Explore other
    avenues by which the relay setting could have been
    changed.
     
    > If, in fact, the firewall is configured as
    > indicated, and that only
    > authorized IP addresses from the software vendor's
    > IP space is permitted
    > to access pcAnywhere, then it is NOT a trivial hack
    > to gain access to
    > pcAnywhere in order to exploit the weak passwords.
    
    True.  Which is why I suggested that this be verified.
     Since the client is paying for the management
    service, they should be able to get a copy of the
    firewall rulesets for verification.
     
    > IMHO, if you are confident that neither the software
    > vendor nor the
    > customer made the change (if, indeed, a change was
    > actually made) then I
    > would be more concerned about how the intruder
    > gained access to server in the first place.  
    
    Good point.  Which is why a root cause analysis (RCA),
    based on *facts*, must be conducted.  Far too often,
    such things are not done, largely due to time
    constraints.  However, back in the "old days" of the
    Internet, Unix admins took pride in knowing their
    systems.  For whatever reason, it seems to be
    different with Windows admins (this is NOT a dig at
    Windows admins, simply an observation from working
    with them and performing many, many vulnerability
    assessments).  
    
    Anyway, just some thoughts...perhaps a bit tangential
    to the subject.
    
    Harlan
    
    __________________________________
    Do you Yahoo!?
    Yahoo! SiteBuilder - Free, easy-to-use web site design software
    http://sitebuilder.yahoo.com
    
    ---------------------------------------------------------------------------
    Attend Black Hat Briefings & Training Federal, September 29-30 (Training), 
    October 1-2 (Briefings) in Tysons Corner, VA; the world's premier 
    technical IT security event.  Modeled after the famous Black Hat event in 
    Las Vegas! 6 tracks, 12 training sessions, top speakers and sponsors.  
    Symantec is the Diamond sponsor.  Early-bird registration ends September
    6.Visit us: www.blackhat.com
    ----------------------------------------------------------------------------
    
    ---------------------------------------------------------------------------
    Attend Black Hat Briefings & Training Federal, September 29-30 (Training), 
    October 1-2 (Briefings) in Tysons Corner, VA; the world's premier 
    technical IT security event.  Modeled after the famous Black Hat event in 
    Las Vegas! 6 tracks, 12 training sessions, top speakers and sponsors.  
    Symantec is the Diamond sponsor.  Early-bird registration ends September 6.Visit us: www.blackhat.com
    ----------------------------------------------------------------------------
    



    This archive was generated by hypermail 2b30 : Tue Aug 26 2003 - 08:23:18 PDT