[55284] in North American Network Operators' Group
Re: management interface accessability (was Re: Worm / UDP1434)
daemon@ATHENA.MIT.EDU (Paul Vixie)
Sun Jan 26 13:57:27 2003
To: nanog@merit.edu
From: Paul Vixie <vixie@vix.com>
Date: 26 Jan 2003 18:56:48 +0000
In-Reply-To: <20030126172907.GA31694@f00f.org>
Errors-To: owner-nanog-outgoing@merit.edu
> > ... If you are relying on their ACL's to protect your telnet and
> > snmp access, but are otherwise allowing their management interfaces
> > to hear traffic from the whole Internet, then you should turn in
> > your badge and go back to bagging groceries or whatever it is you
> > used to do.
>
> Some would argue this should apply to those exposing MSSQL to the
> outside world such that it could even receive malicious port 1434
> packets...
in fairness to microsoft, there have been worms based on apache and bind
and popper and fingerd (buffer overruns) and even sendmail (wizard password)
so the wide scale code review one gets from open source software engineering
is only a marginal solution to monocultural weakness vectors.
--
Paul Vixie