[55284] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: management interface accessability (was Re: Worm / UDP1434)

daemon@ATHENA.MIT.EDU (Paul Vixie)
Sun Jan 26 13:57:27 2003

To: nanog@merit.edu
From: Paul Vixie <vixie@vix.com>
Date: 26 Jan 2003 18:56:48 +0000
In-Reply-To: <20030126172907.GA31694@f00f.org>
Errors-To: owner-nanog-outgoing@merit.edu


> > ... If you are relying on their ACL's to protect your telnet and
> > snmp access, but are otherwise allowing their management interfaces
> > to hear traffic from the whole Internet, then you should turn in
> > your badge and go back to bagging groceries or whatever it is you
> > used to do.
> 
> Some would argue this should apply to those exposing MSSQL to the
> outside world such that it could even receive malicious port 1434
> packets...

in fairness to microsoft, there have been worms based on apache and bind
and popper and fingerd (buffer overruns) and even sendmail (wizard password)
so the wide scale code review one gets from open source software engineering
is only a marginal solution to monocultural weakness vectors.
-- 
Paul Vixie

home help back first fref pref prev next nref lref last post