× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Jim...

I think the issue for all of us is broader that just our potential iSeries
vulnerabilities.  We do though still need a clear response from IBM on
iSeries and other servers beyond the unix base they've talked about so far.

SNMPv2 is not supported by Cisco, but for many of us snmp on Cisco is
strategic and cannot just be turned off.  We use both Cisco routers and
switches.  Then again, I'd bet we have snmp running on some systems where we
aren't even using it.

Today's SANS NewsBites (see below) suggests many organizations are following
a four-step action plan to improve security.  This is an opportunity for
SANS to encourage us to improve security generally by promoting the SANS
"top twenty".  I did the top 20 review during the NIMDA chaos but I'm going
to review it again, especially looking at the new servers we've added since
then.

They are also making available a tool to help find the Cisco
vulnerabilities.  There is a webcast next Wednesday to introduce that tool.

Ray


From: Alan for the SANS NewsBites service
Re:   February 13 SANS NewsBites

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


The widespread SNMP vulnerabilities appear to be a wake-up call. Many
organizations are following a four-step action plan to fix more than
just the immediate problem:
1.Patch the systems on which you have to run SNMP
2.Turn off SNMP on the systems where you don't.
3.See which of the other "Top Twenty Internet Security Vulnerabilities"
(www.sans.org/top20.htm) your organization has not protected against,
and make it right.
4.Check your Cisco routers for the other important vulnerabilities
uncovered by the NSA and SANS, and correct those flaws.

SANS and the Center for Internet Security are making available a
new free tool to help you find the Cisco vulnerabilities.  We have
rescheduled the web broadcast, in which the tool's main authors will
show you what the tool does and how it works, for next Wednesday,
February 20 at 1:00 PM EST (1800 GMT). The change in date is to give
you time to get all your SNMP problems solved before you move on to
the other Cisco security issues.


                                  Alan

**********************************************************************

-----Original Message-----
From: midrange-l-admin@midrange.com
[mailto:midrange-l-admin@midrange.com]On Behalf Of Jim Franz
Sent: Wednesday, February 13, 2002 9:31 PM
To: midrange-l@midrange.com
Subject: Re: SNMP Security flaw-and IBM response


can anyone identify the snmp version on the iSeries?
We have read in prev posts that IBM say's generically" it is unaffected
but I have people asking for more detail. Some news stories have
said get to level 2, other level 3 of the snmp protocol.

btw - some have complained (both to CERT.org & IBM) that the iSeries
is never mentioned or referenced. To IBM i would say "you keep telling
us we've got a great server & can play in the "real" world with a standards
based system", yet you leave us in the dark in the security area. I see the
protocols I use every day (http, telnet, ftp, pop, snmp, etc) listed in
CERTS
and all I can do is pray you've got it covered. (took years to get the old
security flawed DNS updated!) CERT answered me back and said it's up to
the vendor to participate. How about it ???
Went to the iSereis support site - searched "snmp AND security" - nothing
relevent. The rest of the world is paying attention to this!
jim franz



As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:
Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.