|
These are my opinions only. They do not necessarily reflect the opinions of my employer... Just a couple examples of inaccuracies 1. Claim: The LDAP server on OS400 provides information about userIDs on OS400. The LDAP server is started automatically. Both are true. Implied by the posting: OS400 will provide anyone who knows how to talk to an LDAP server information about user profiles on the system. False/wrong/inaccurate. Clarification: OS400 in general -- not LDAP on OS400 -- allows a person to see those user profiles to which they are authorized on a specific system. The LDAP server provides the same information that other OS400 interfaces will provide based on authorization. This is NOT a problem related to LDAP and characterizing it as such is inaccurate. This is an architected and documented behavior of the system -- not for LDAP but for any interface related to list user profiles that exist on the system. Sending people off to look for an LDAP exposure wastes time and energy and takes focus away from things they could be doing to manage the security on their systems better. The LDAP server is started by default, however, unless it has some PUBLIC information stored in it (access allowed to anyone that binds), there is nothing to see. The fact that an authenticated OS400 user can see the same information through LDAP that they could see through any other non-LDAP interface to look at the same type of data does not necessarily constitute a security exposure. The recent public postings implied that not only is the LDAP server started by default, but that somehow the information about other profiles on the system is available to anyone that knows the TCP/IP address of the LDAP server. Only authorized OS400 user profiles are allowed to access the "projected user profile" LDAP back-end. Even when authorized the profiles can only see those other profiles to which they are authorized. If one doesn't agree with the documented behavior, then they should provide the necessary information to the vendor (not to mention read the documentation which is on-line in the information center). I personally do not consider this a security exposure; however, if you believe it is no longer considered appropriate then work to change it through the vendor who is the only one that can. Publishing inaccurate information in a public forum is not an efficient way to influence change. Again, seeing any data to which you are authorized is not considered a security exposure. On OS400, as opposed to those systems you might actually use, user profiles are separate objects (it's an object-based OS). Since a user profile is an object you have a level of authorization control over them that is not typically available on other systems. Because the public announcement only noted the LDAP server, a lot of people went on a hunt to try to find something they were not likely to find. 2. Claim: OS400 has a security exposure because a bad person could use commands on OS400 to do bad things on Windows. Implication: OS400 causes the exposure. Clarification: The fact that you can use information from a connection established by windows to perform windows commands unrelated to the connection is not an exposure of another system that "COULD" take advantage of it. It is a windows exposure. It's something that needs to be managed or fixed in Windows. Announcing it as an OS400 exposure is inaccurate and helps no one address the real "issue." The implementation of commands on OS400 use the same mechanisms on the windows side as could be used from any other system. 3. Claim: IFS is not protected by 3rd party vendor products... Implication: IFS cannot be protected. Whether intended or not, this was the implication, and this is totally false. The short description of IFS implied that by it's mere existence on OS400, that there was some kind of "undesirable" security attribute. It is easy to use OS400 as a file server for windows, but it can just as easily be configured to only share files in a particular part of the IFS file system tree or subdirectory of a particular file system tree. Is it possible to incorrectly file server more files than intended? Yes. Is this a security exposure for the system? No? Is it a security exposure for 3rd-party applications? I don't know, because since I don't own or use those applications, I cannot be certain how they are configured and if they are configured correctly. However, it is not clear that if the observed behavior was related to exposures in 3rd party products or due to the way a particular implementation of one or more of those products. Without a copy of the product and documentation, I don't see how anyone could ascertain whether observed behaviour is an inherent exposure in the product. At best, one should clarify whether they have actually tried each product AND whether the problem was known NOT to be a configuration problem. 4. Claim: "IBM refused several times to answer my queries about some of the issues. I was asked to supply a valid service agreement before anyone would talk to me." Implication: IBM will not accept input related to security exposures Clarification: The IBM support line DOES accept input related to security exposures. If you do not have a support line agreement you can only use the interent interfaces; you are not entitled to phone support. There is no way IBM could provide phone support to customers that actually pay for their systems and presumably understand how their system is configured if they spent time with those people who haven't apparently purchased a system. It is irresponsible, in my opinion, to publicly report a security exposure when one does not totally understand the system or applications for which they are reporting an exposure. It is also irresponsible not to get independent verification of a suspected exposure -- especially if one does not even know how the system being tested is configured with respect to security. I don't see how it is possible to determine whether a security exposure is inherent to a whole class of systems or merely due to the way a particular system is configured or managed if you don't have access to someone who can report an APAR. To not mention in public postings that the vendor was not notified because you are not a customer is also misleading, in my opinion. On 25 Apr 2005 15:59:14 -0000, shalom@xxxxxxxxxx <shalom@xxxxxxxxxx> wrote: > > Michael, > I can live with assumptions, but what in your opinion is inaccurate? > > Shalom Carmel > ------------- > www.venera.com <http://www.venera.com> - Exposing iSeries insecurity > > Michael Crump said: > > Suffice to say, not sure if I would call them lies > > but there are assumptions and inaccuracies. > > -- > This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing > list > To post a message email: MIDRANGE-L@xxxxxxxxxxxx > To subscribe, unsubscribe, or change list options, > visit: http://lists.midrange.com/mailman/listinfo/midrange-l > or email: MIDRANGE-L-request@xxxxxxxxxxxx > Before posting, please take a moment to review the archives > at http://archive.midrange.com/midrange-l. > >
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.