[8578] in bugtraq

home help back first fref pref prev next nref lref last post

Re: ISS Security Advisory: Hidden community string in SNMP

daemon@ATHENA.MIT.EDU (sugarat)
Mon Nov 16 23:58:04 1998

Date: 	Mon, 16 Nov 1998 16:49:58 -0500
Reply-To: sugarat <sugarat@THUNDERHOLD.SUGARAT.NET>
From: sugarat <sugarat@THUNDERHOLD.SUGARAT.NET>
X-To:         "Matt M. Morris" <mmorris@ops.com>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  Message from "Matt M. Morris" <mmorris@ops.com> of "Mon, 16 Nov
              1998 15:25:28 EST." <3.0.5.32.19981116152528.00895920@ops.com>

>
>
> I am seeing the same results on a 2.6 and a 2.5.1 system with B.5.01 NNM
> installed.
>
> matt

Do you only see the output when you are on the local machine?
How about from spoofed 127.0.0.1 packets?  Is sending a reset from 127.0.0.1
enough to make hte host think it is the local machine?
If so, then a local firewall, not permitting 127 packets from outside the
machine is necessary, and even then you better trust the people who have
access to the box itself.

We have tried a box, Solaris 2.6 patched to current (current as of september),
that is running the default Sun snmpd binary.  The hidden community
"all private" worked from local and remote machines.

I'm not quite sure what we're going to do about this, but on non critical
boxes, ie: the ones we watch only for cold start traps, we have turned of
snmpd and use shell scripts that call snmptrap to send the traps we need to
receive.

If anybody else has any solutions, I'm sure we'd all love to hear them.

-Tim
--
Timothy Kennedy                 |       Erol's Internet Service
Network Administrator           |       1-703-321-8000 ext. 2224
sugarat@erols.com               |       http://www.erols.com

home help back first fref pref prev next nref lref last post