Having gone back to check the research*, I think there are some misunderstandings, some of which may contribute substantially incorrect conclusions and recommendations. Let's try to correct these. Reading some of your other posts to this thread (e.g. "Windows is for games, and if you can play games on it, it shouldn't be in the datacenter. Explain to your manager that he can have his nice game systems, and when he wants to grow up and do real computing, hope to god that someone out there has kept the last strictly Serious Computing platform alive and well."), perhaps you didn't expect to be taken so seriously in the first place.

I'm not sure that the sadmind worm is a richly rewarding case to study, but since I've read the notes, I'll provide a crib sheet in the name of the understanding you've invoked (ironically one way or the other, it would seem): the worm was transmitted not from NT 4.0 and Win2k IIS servers to Solaris 7 and earlier boxes but from Solaris machines to IIS servers, where you seem to have got the premise backwards. Moreover, just about every piece of software involved is for products at or past end of support life, so the sadmind worm's relevance to designing an environment these days is conceptual. The sadmind facility itself hasn't been shipped at all since Solaris 9, so you don't have to worry about it at all if you're running Solaris 10 or OpenSolaris. If you're running Solaris 9, you should follow Sun's guidelines for the several vulnerabilities that have emerged since worm, which is either to disable it completely or to deploy it with stronger security modes which aren't set by default. If, however, you're still running legacy operating systems for which there is no ongoing patch support (IIRC that's anything pre-Solaris 9) or for which there is effectively no ongoing security research to feed patches that are available only through supplemental support contracts (I believe Sun offered this to Solaris 7 customers who signed up for it before EOSL), reducing network attack surface is absolutely critical, and you'll want to consider radical steps such as running these boxes on separate network infrastructure, with access to your environment's network services, particularly file services and remote execution (including sadmind), kept to an absolute minimum and enforced by measures such as packet filters, preferably supplemented by additional transport security, something to which I'll return. Additional caveat: because the sadmind bug in question was in releases that are no longer shipping or supported, exploit code and documentation isn't available from sources such as Metasploit, so I'm that much more reliant on the account of it from the research previously cited, all of which documents behaviour saying that sadmind's network scanning was not limited to subnets but to anything under the last two octets of an address space of a randomly selected first two octets.

What I proposed previously was more or less the application of techniques from RFC3013 within enterprises rather than at ISP perimeters. This technique has ample limitations (it's relatively expensive to do this with hardware, and it doesn't scale well with dynamic deployments), but enterprises have employed it where they've not been as aggressive in implementing secure network protocols as, for example Bellovin suggested nearly fifteen years ago (see the overview to RFC1948, where, whatever his intentions at the time, "strong authentication" should at this point be understood to include not just initial authentication but session integrity). I suggested ssh port forwarding because it's something of a reasonable middle ground as far as shims go, even if it can get ugly for something like RPC services (better to implement ONC+ functionality for strong authentication and session integrity using GSSAPI with something like Kerberos).

I've tried to make as much sense of your posts as possible, but it's not clear why people should either still be worrying about the sadmind worm per se today or drawing the conclusion that there are any reasons specific to or generaliseable from it to run Windows and *nix boxes on separate subnets or for that matter to consider subnet segregation a security practise at all. In light of amply documented and long- standing exploits available through a wealth of tools, subnets protect against datalink, transport, and session layer attacks about as well as silk purses protect the contents of your wallet from pickpockets: they shouldn't even give you the slightest sense of confidence that you've undertaken adequate security measures.

* I read the following and a bit more:

http://www.sophos.com/security/analyses/viruses-and-spyware/unixsadmind.html
http://www.f-secure.com/v-descs/sadmind.shtml
http://www.noh.ro/craiu.com/papers/papers/sadmind.html
http://www.cert.org/advisories/CA-2001-11.html
http://www.cert.org/advisories/CA-1999-16.html
http://www.securityfocus.com/advisories/2016
http://www.securityfocus.com/infocus/1291

Am 29 Jan 2010 um 16:26 schrieb john g4lt:

Your best protection is knowledge of how things broke in the past to prevent future occurences, not in whiz-bang hardware

On Fri, Jan 29, 2010 at 9:01 AM, Bayard Bell <[email protected] > wrote: Running exploitable code with a wide-open listener is bad, so if you don't want chained attacks from one exploitable service to the other, you're going to need a better protection baseline than subnet segregation (which shouldn't be mistaken for a form of security domain, certainly not if you're running on the same switch domain without at least a packet filter, preferably stateful, between domains), to deal with older attack patterns. Better yet would be to disable or patch exploitable services or limit accessibility of the service via firewalling and secured port forwarding (e.g. ssh for protection against address spoofing and session hijacking).

Am 29 Jan 2010 um 14:33 schrieb john g4lt:


IIS with Solaris boxes in the same subnet is Bad. ever hear of the sadmind worm? it infected via a IIS host and ran the sadmind exploit on all Solaris boxes in its subnet



_______________________________________________
opensolaris-discuss mailing list
[email protected]

Reply via email to