[12524] in bugtraq

home help back first fref pref prev next nref lref last post

Re: F5 Networks Security Advisory (fwd)

daemon@ATHENA.MIT.EDU (pedward@WEBCOM.COM)
Thu Nov 11 12:27:47 1999

Content-Type: text
Message-Id:  <199911110619.WAA14731@eris.webcom.com>
Date:         Wed, 10 Nov 1999 22:18:54 -0800
Reply-To: pedward@WEBCOM.COM
From: pedward@WEBCOM.COM
X-To:         gwen@reptiles.org
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.BSF.3.96.991110215347.12485v-100000@komodo.reptiles.org>
              from "Gwendolynn ferch Elydyr" at Nov 10, 99 09:54:17 pm

I am upset about the recent thread about the Big/ip support account on Bugtraq.

First of all, it's just stupid to sit here and say "They ship a product with
a security hole, because it has a support password that is root priv'd".

I have known about this for nearly 2 years, questioned them initially, but wrote
it off as non-consequential.

First of all, the default config is very restrictive, and they don't recommend
the contrary.

The Big/ip products ship with the F5 labs firewall IP COMMENTED OUT of the sshd
config.

They assured me that they rotate the passwords on a regular basis to ensure that
accountability is retained internally.

If the device shipped with a password that was obtained via a hex dump of a ROM,
I could understand, but we're talking about a password that requires many hours
of CPU time, or hundreds of thousands of dollars of hardware.

I don't like good people like F5 getting grilled, and sending me a stupid advisory,
because someone cried the equivelent of 'Y2K bug'.

When will the discussion of real security threats, return to Bugtraq?

Hey everybody, <insert fav dist> ships with a UID 0 account, it's password is probably
guessable.

Grr, this just makes me mad that we're discussing this.

--Perry

--
Perry Harrington                 Director of                   zelur xuniL  ()
perry@webcom.com             System Architecture               Think Blue.  /\

home help back first fref pref prev next nref lref last post