× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.


  • Subject: Re: No single case of hacking...
  • From: Jim Langston <jimlangston@xxxxxxxxxxxxxxxx>
  • Date: Thu, 07 Jun 2001 09:01:32 -0700
  • Organization: Pacer International

Actually, Joe, it does prove something of AS/400 security.

If you were running an NT box and IIS a hacker could get in using one of the
many buffer overrun exploits out there now.  And only on port 80.  Some of the
various http server have directory traversal exploits using ../ and such.  And
there are a lot of other exploits out there for getting to a machine that is
"only" serving web pages.

I do not believe, although am not positive, that the AS/400 is not plagued by
buffer overrun exploits.  It may be possible to overrun a buffer (as we've all
done when we pass the wrong length parameter) but the AS/400 is usually smart
enough not to execute this code.

But... that is not to say that an application on the AS/400 could not have some
exploit of the program was known well.  Okay, maybe your server doesn't execute
a buffer overrun, but it might still be possible to "trick" your AS/400 into
crashing the HTTP CGI program if I knew your program well, what parameters it
is being passed, and if I made the first parameter too long, perhaps it would
take the over run as the second parameter which might give me a different file,
yadda, yadda, yadda.

The AS/400 is fairly secure, yet no machine is 100% secure.  Unless it is not
on the network.  And doesn't have any type of input (such as a keyboard).

I'm sure that with time, and knowledge of your AS/400, and exploit could be
found.

Security by obscurity is the main advantage on the AS/400.

Regards,

Jim Langston

Me transmitte sursum, Caledoni!

Joe Pluta wrote:
> 
> Leif, while I agree my machine doesn't prove much about AS/400 security, it
> does prove a lot about Internet security. <grin>
> 
> My machine is not "locked down too tight".  It is a fully functional web
> server, and can also be used to run web-enabled applications.  What more do
> you think "should" be open?  Certainly not Telnet or FTP.  It just so
> happens that I know full well that the only thing an anonymous user should
> be able to do over the web is access the HTTP server.  Anything more and
> you're an accident waiting to happen.
> 
> On the other hand, if I were to give you the appropriate passwords, etc.,
> you could also access my machine through 5250 - I just don't make that sort
> of information public.  Which is the way it's supposed to be.
> 
> On the third hand, if this were a Microsoft IIS server, you could break
> through one of the many known security holes and get into my server and thus
> my system, even with just port 80 access.  In this regard, the IBM HTTP
> server is a much more secure web server than IIS.
> 
> Joe
> 
> > -----Original Message-----
> > From: owner-mi400@midrange.com [mailto:owner-mi400@midrange.com]On
> > Behalf Of Leif Svalgaard
> > Sent: Thursday, June 07, 2001 9:18 AM
> > To: MI400@midrange.com
> > Subject: Re: No single case of hacking...
> >
> >
> > Joe's machine is locked down too strongly for this.
> > No ping, no ftp, no telnet, only serving webpages.
> > It's like saying: "I'm secure, I allow noone on my machine,
> > no programmers, no signons, no restore, no nothing.
> > sure in this way you can be secure. Also as an additional
> > measure: turn off the machine.
> > So this is an extreme case and therefore does not
> > prove that the AS/400 is vastly ahead re security.


Regards,

Jim Langston
+---
| This is the MI Programmers Mailing List!
| To submit a new message, send your mail to MI400@midrange.com.
| To subscribe to this list send email to MI400-SUB@midrange.com.
| To unsubscribe from this list send email to MI400-UNSUB@midrange.com.
| Questions should be directed to the list owner/operator: dr2@cssas400.com
+---

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.