|
We have been going back and forth for over a week on the parts of the system where we know we have the tools to secure the i. It's been more a problem of the will to make system management and application changes to lock down a system. What scares me more is other bolted on functions, like ldap, dns, Apache, Websphere, Netserver, smtp, and more(like the whole list of tcp applications). jim franz----- Original Message ----- From: <rob@xxxxxxxxx>
To: "Midrange Systems Technical Discussion" <midrange-l@xxxxxxxxxxxx> Sent: Friday, January 05, 2007 8:08 AM Subject: RE: How Secure is Windows, Really?
Funny thing about that hacking into LDAP... Bet there's a way to hack the DNS hosted by the iSeries. Why do I think so? Because we contract with IBM to do benevolent hacking. They keep telling us that we have to upgrade our DNS to a newer BIND level. Kept having to resubmit the DCR to the iSeries people to get them to agree to upgrade it. Before they kept telling me it wasn't necessary. Kicking ... and taking names helped get them to cooperate. Rob Berendt -- Group Dekko Services, LLC Dept 01.073 PO Box 2000 Dock 108 6928N 400E Kendallville, IN 46755 http://www.dekko.com "Cassidy, Alan" <CassidyA@xxxxxxxxxx> Sent by: midrange-l-bounces+rob=dekko.com@xxxxxxxxxxxx 01/04/2007 02:32 PM Please respond to Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxx> To "Midrange Systems Technical Discussion" <midrange-l@xxxxxxxxxxxx> cc Subject RE: How Secure is Windows, Really? About that "level of ethics" statement, didn't someone observe that certain South American drug cartels have been known to use iSeries because of it's security, etc? I am sure those lads have a good "level of ethics".Rob Berendt -- Maybe we don't see the bad guys in the "i5 world" because we get the smarter bad guys! :) But I have seen some real bad behavior and heard of much more. I saw one link just yesterday to apparently some Bl*ck H*t group in Europe about hacking into the LDAP on the iseries. The security in LDAP has its own TCPIP standards and is completely independent of its host systems (unless you coordinate it yourself..). Although if you use LDAP on the i5, there are a number of possible uses for it in which you would want to provide some anonymous access. --Alan -- This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/midrange-l or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/midrange-l. --This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing listTo post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/midrange-l or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/midrange-l.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.