× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.
--
[ Picked text/plain from multipart/alternative ]
One of our network people came over today, and asked me about this issue.  I
was wondering where I could get IBM's response about this problem... Does
anybody have a link, or more information so I can check to see if we need to
be concerend...

Thanks, tim


> -----Original Message-----
> From: RayPeterson [SMTP:RayPeterson@gmx.co.uk]
> Sent: Wednesday, February 13, 2002 10:38 PM
> To:   midrange-l@midrange.com
> Subject:      RE: SNMP Security flaw-and IBM response
>
> Jim...
>
> I think the issue for all of us is broader that just our potential iSeries
> vulnerabilities.  We do though still need a clear response from IBM on
> iSeries and other servers beyond the unix base they've talked about so
> far.
>
> SNMPv2 is not supported by Cisco, but for many of us snmp on Cisco is
> strategic and cannot just be turned off.  We use both Cisco routers and
> switches.  Then again, I'd bet we have snmp running on some systems where
> we
> aren't even using it.
>
> Today's SANS NewsBites (see below) suggests many organizations are
> following
> a four-step action plan to improve security.  This is an opportunity for
> SANS to encourage us to improve security generally by promoting the SANS
> "top twenty".  I did the top 20 review during the NIMDA chaos but I'm
> going
> to review it again, especially looking at the new servers we've added
> since
> then.
>
> They are also making available a tool to help find the Cisco
> vulnerabilities.  There is a webcast next Wednesday to introduce that
> tool.
>
> Ray
>
>
> From: Alan for the SANS NewsBites service
> Re:   February 13 SANS NewsBites
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
>
> The widespread SNMP vulnerabilities appear to be a wake-up call. Many
> organizations are following a four-step action plan to fix more than
> just the immediate problem:
> 1.Patch the systems on which you have to run SNMP
> 2.Turn off SNMP on the systems where you don't.
> 3.See which of the other "Top Twenty Internet Security Vulnerabilities"
> (www.sans.org/top20.htm) your organization has not protected against,
> and make it right.
> 4.Check your Cisco routers for the other important vulnerabilities
> uncovered by the NSA and SANS, and correct those flaws.
>
> SANS and the Center for Internet Security are making available a
> new free tool to help you find the Cisco vulnerabilities.  We have
> rescheduled the web broadcast, in which the tool's main authors will
> show you what the tool does and how it works, for next Wednesday,
> February 20 at 1:00 PM EST (1800 GMT). The change in date is to give
> you time to get all your SNMP problems solved before you move on to
> the other Cisco security issues.
>
>
>                                   Alan
>
> **********************************************************************
>
> -----Original Message-----
> From: midrange-l-admin@midrange.com
> [mailto:midrange-l-admin@midrange.com]On Behalf Of Jim Franz
> Sent: Wednesday, February 13, 2002 9:31 PM
> To: midrange-l@midrange.com
> Subject: Re: SNMP Security flaw-and IBM response
>
>
> can anyone identify the snmp version on the iSeries?
> We have read in prev posts that IBM say's generically" it is unaffected
> but I have people asking for more detail. Some news stories have
> said get to level 2, other level 3 of the snmp protocol.
>
> btw - some have complained (both to CERT.org & IBM) that the iSeries
> is never mentioned or referenced. To IBM i would say "you keep telling
> us we've got a great server & can play in the "real" world with a
> standards
> based system", yet you leave us in the dark in the security area. I see
> the
> protocols I use every day (http, telnet, ftp, pop, snmp, etc) listed in
> CERTS
> and all I can do is pray you've got it covered. (took years to get the old
> security flawed DNS updated!) CERT answered me back and said it's up to
> the vendor to participate. How about it ???
> Went to the iSereis support site - searched "snmp AND security" - nothing
> relevent. The rest of the world is paying attention to this!
> jim franz
>
> _______________________________________________
> This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
> list
> To post a message email: MIDRANGE-L@midrange.com
> To subscribe, unsubscribe, or change list options,
> visit: http://lists.midrange.com/cgi-bin/listinfo/midrange-l
> or email: MIDRANGE-L-request@midrange.com
> Before posting, please take a moment to review the archives
> at http://archive.midrange.com/midrange-l.


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.