Open Enterprise Server (OES) services security OES NetWare OES

Transcription

Open Enterprise Server (OES) services security OES NetWare OES
Open Enterprise Server (OES) services security
OES NetWare
OES Linux
Thomas Erickson, CISSP
Master CNE, CDE, CLE, LPIC-1, MCSE, and CCNA
tsepop at yahoo.com
1
Table of Contents
Abstract:...............................................................................................................................3
Introduction:.........................................................................................................................3
Assessment tool:.................................................................................................................. 5
OES Linux Services and suggested action...........................................................................6
OES NetWare Services and suggested action....................................................................19
Conclusion:........................................................................................................................ 32
Annotated Bibliography..................................................................................................... 33
Appendix A OES Linux Default Assessment....................................................................36
Appendix B OES NetWare Default assessment................................................................ 71
Appendix C Post Hardening Comparison of OES NetWare and OES Linux..................103
Appendix D Nessus Assessment -- Post hardening of OES Linux..................................103
Appendix E Nessus Assessment -- Post hardening of OES NetWare............................ 107
2
Abstract:
This document will help you recognize and disable services running by default on OES
NetWare and OES Linux. I believe you will be particularly interested in the Nessus
Assessment reports in the appendices. This document also documents each open
service/port and recommendations relating to those services/ports.
Introduction:
This paper and its appendices document and analyze security with respect to
ports/services listening in the default configuration for OES Linux and OES NetWare
(Netware 6.5 sp3). The focus of this document is based on disabling services you do not
need or are not currently using.
There are many other configuration best practices for securing each service. Provided the
service is a needed service by your organization, otherwise disable it.
General security best practices:
1) Disable the service(s) if you are not using them or do not need them. Also keeping
services disabled unless or until they are needed, then enable them temperately.
2) Least privilege – “no more privileges than necessary to be able to fulfill its functions
(Harris, p. 209).”
3) Baseline configuration that is audited (verified) via routine checkups.
4) Defense-in-depth, Security in layers – Layer 1, Layer 2, Layer 3. Multiple
countermeasures and controls to mitigate risk. One application of this principle is
filtering the ports and disabling the ports.
5) Education! From the common worker to the IT professional (of course different
awareness training)
6) Continuous vigilance (process and methods and routines). Do NOT rely on
technology, which is ONLY one piece/layer of security.
7) Availability, Integrity, and Confidentiality (CIA).
7.1) Availability – Is the service available? Denial of Service (DOS, DDOS). Capacity,
reliability, timely?
7.2) Integrity – errors and omissions – accurate? reliability of the system, unauthorized
modification, and mistakes.
7.3) Confidentiality – secrecy/unauthorized disclosure,
(Harris p. 54)
8) “Security is always a balance between risk and function
(Maslowski-Yerges).”
3
Resources that focus more on securing the service (instead of disabling them):
● Google -- I recommend sans.org. I use Google's advanced search
(http://www.google.com/advanced_search) and point to sans.org and search for the
service or application.
● http://www.sans.org/rr/whitepapers/novell/
● “AppNote: Securing a Novell Nterprise Linux Services Server: Step-by-Step (SUSE 8,
NNLS 1.0)
http://www.novell.com/coolsolutions/appnote/1651.html
As a general rule you will want to secure the OES NetWare console at all costs
(physically and remotely). The ICSA Compliance Kit can be found at:
http://support.novell.com/servlet/filefinder?name=*icsa*.exe
Please be advised that this significantly limits the troubleshooting ability of NetWare and
that you must have the ICSA server.exe that matches your current support pack.
4
Assessment tool:
“Nessus is the world's most popular open-source vulnerability scanner used in over
75,000 organizations world-wide. Many of the world's largest organizations are realizing
significant cost savings by using Nessus to audit business-critical enterprise devices and
applications.
The "Nessus" Project was started by Renaud Deraison in 1998 to provide to the internet
community a free, powerful, up-to-date and easy to use remote security scanner. Nessus is
currently rated among the top products of its type throughout the security industry and is
endorsed by professional information security organizations such as the SANS Institute. It
is estimated that the Nessus scanner is used by 75,000 organizations world-wide. “
There are many network scanners and assessment tools. Two of the most popular from
the open source community are widely used for scanning and assessing (NMAP and
NESSUS). I would classify NESSUS as being in the top 5 network security tools
category. Nessus is the most used/popular (http://www.insecure.org/tools.htm). If you are
new to network security and tools, you should spend time reviewing and evaluating these
powerful network security tools.
I chose NESSUS as my security assessment tool because of its power and flexibility.
NESSUS assesses TCP/UDP, OSes, and applications.
Because it runs on Linux the plug-in development is quickly developed as many
organizations use it to assess system wide as well as specific vulnerabilities. When a new
vulnerably is published, this can typically be easily scripted into a NESSUS plug-in (there
are about 6000 scripted vulnerability checks AKA plug-ins see Appendix E for a list of
plug-ins I used to assess OES in this document).
Please note that NESSUS can/has a destructive mode (Denial of Service checks and
attack checks) so be sure you use it on your own equipment and or get written approval
before pointing at network devices. Only use the attack/destructive mode on preproduction devices.
I booted up an old SuSE 8.2 box collecting dust and updated Nessus on it for this project:
nessusd -v
nessusd (Nessus) 2.2.4 for Linux
(C)1998 - 2004 Renaud Deraison <[email protected]>
5
OES Linux Services and suggested action
cat /etc/SuSE-release
SUSE LINUX Enterprise Server 9 (i586)
VERSION = 9
cat /etc/novell-release
Novell Open Enterprise Server Linux (i586)
VERSION = 9
/etc/init.d/ndsd status
Tree Name: OES-LINUX-VM-TREE
Server Name: .CN=oes-linux-vm.O=novell.T=OES-LINUX-VM-TREE.
Binary Version: 10551.95
Root Most Entry Depth: 0
Product Version: eDirectory for Linux v8.7.3.5 [DS]
Port(s): 8028, 8030
Nessus rating: High
Summary of Service: iMonitor/dhost – enables administrators to view and troubleshoot
the health of edirectory including dstrace. https://hostname:8030/
Details of Service: iMonitor is a wonderful web based tool to analyze
NDS/eDirectory/DS. You can compare schema, do health reports, drill down into the
details of DS and objects that other tools do not give you. iMonitor is the preferred tool
used to check the health of DS on NetWare, Linux and other platforms. Having a web
interface is wonderful because it is the same no matter the OS ds is running on.
“Novell® iMonitor provides cross-platform monitoring and diagnostic
capability to all servers in your eDirectoryTM tree. This utility lets you
monitor your servers from any location on your network where a Web
browser is available.
iMonitor lets you look at the eDirectory environment in depth on a
partition, replica, or server basis. You can also examine what tasks are
taking place, when they are happening, what their results are, and how long
they are taking.
6
iMonitor provides a Web-based alternative or replacement for many of
Novell's traditional server-based eDirectory tools such as DSBrowse,
DSTrace, DSDiag, and the diagnostic features available in DSRepair.
Because of this, iMonitor's features are primarily server focused, meaning
that they focus on the health of individual eDirectory agents (running
instances of the directory service) rather than the entire eDirectory tree
(http://www.novell.com/documentation/edir87/index.html?page=/documen
tation/edir87/edir87/data/agwkqvb.html).”
Action Suggested: Disable on Internet facing machines until/unless you need to use this
service. Also filter the ports from external networks.
To Disable this Service:
Follow document http://support.novell.com/cgi-bin/search/searchtid.cgi?/10089098.htm
Following the above TID failed to stop 8030 from listening. This has been duplicated by
Novell and a defect/rfe has been created. Until this issue is resolved you may need to
rename /usr/lib/nds-modules/libhttpstk.so to stop 8028 and 8030 from listening.
Nessus reports:
CAN-2003-0543: “Integer overflow in OpenSSL 0.9.6 and 0.9.7 allows remote attackers
to cause a denial of service (crash) via an SSL client certificate with certain ASN.1 tag
values (nessus.org).”
CAN-2003-0544: “OpenSSL 0.9.6 and 0.9.7 does not properly track the number of
characters in certain ASN.1 inputs, which allows remote attackers to cause a denial of
service (crash) via an SSL client certificate that causes OpenSSL to read past the end of a
buffer when the long form is used(nessus.org).”
CAN-2003-0545: “Double-free vulnerability in OpenSSL 0.9.7 allows remote attackers to
cause a denial of service (crash) and possibly execute arbitrary code via an SSL client
certificate with a certain invalid ASN.1 encoding (nessus.org).”
Why should I disable this port? Although this specific vulnerability has been fixed via a
patch from Novell, as a general rule disable services unless/until you need them (or
uninstall the service).
“Novell has reported a vulnerability in the eDirectory server. DHost contains a buffer
overflow vulnerability that could potentially be exploited by an attacker. This could result
in code execution, and privilege escalation. This vulnerability could potentially be a
remote issue, though this is unconfirmed
(http://www.securityfocus.com/bid/6900/discussion/).”
Details on iMonitor:
“1 (Default) Before iMonitor processes URLs, require successful
authentication as some eDirectory identity. In this case, the eDirectory
rights of that identity are applied to any request and are, therefore,
7
restricted by those rights. The same DoS vulnerability as level 0 exists,
except the attack must be launched by someone who has actually
authenticated to the server. Until a successful authentication occurs, the
response to any iMonitor URL request is a login dialog box, so iMonitor
should be impervious to attacks
by unauthenticated users when it is configured in this state.
2 Before iMonitor processes URLs, require successful authentication as an
eDirectory identity that has supervisor equivalency on the server that
iMonitor is authenticating to. The same DoS vulnerability as level 1 exists,
except the attack must now be launched by someone who has actually
authenticated as a supervisor of the server. Until a successful
authentication occurs, the response to any iMonitor URL request is a login
dialog box, so iMonitor should be impervious to attacks by
unauthenticated users and non-supervisor authenticated users when it is
configured in this state.
http://www.novell.com/documentation/edir873/pdfdoc/edir873/edir873.pdf
(page 184).”
Port(s): 80, 631, 443
Nessus rating: High
Summary of Service: apache2 – core webserver that other services depend on. For
example iPrint (631) and ifolder.
Details of Service: Apache is the framework/foundation of many services that rely on it.
Obviously apache is a web server (the most popular web server – open source and very
secure when properly configured).
iPrint is an Apache 'include', which means iPrint rides on top of Apache. With iPrint you
can find and install your printer based on a building map or list on a website. This allows
users that move or travel to be able to self service their own printer with logging a help
desk call. Also, one can securly print over the Internet with iPrint eliminating the need to
fax or ship many print outs.
iFolder also relies on Apache. iFolder securely synchronizes local files on multiple
workstations to a server via http/https. The traffic is encrypted as well as the files stored
on the file system of the server.
“Novell iFolder® lets your files follow you, everywhere. iFolder allows
you to access, organize, and manage your files from anywhere, anytime.
iFolder also provides worry-free security, ensuring that all your files are
always safe, secure and up to date. Now your files can be as mobile as you
are — at work, home or on the go
(http://www.novell.com/products/ifolder/).”
Also, iManager depends on Apache.
8
“Novell iManager is a state-of-the-art Web-based administration console that provides
customized access to network administration utilities and content from any location in the
world, whether inside or outside the firewall
(http://www.novell.com/products/consoles/imanager/).”
Action Suggested: This depends on your environment. Not all servers need to run
iMonitor, iPrint, nor iManager. Consider running these services on only a few servers.
Follow the documentation on hardening theses services on a few servers.
To disable this service:
/etc/init.d/apache2 stop
chkconfig apache2 off
Nessus Reports:
“CAN-2004-0786: The IPv6 URI parsing routines in the apr-util library for Apache
2.0.50 and earlier allow remote attackers to cause a denial of service (child process crash)
via a certain URI, as demonstrated using the Codenomicon HTTP Test Tool.
CAN-2004-0747: Buffer overflow in Apache 2.0.50 and earlier allows local users to gain
apache privileges via a .htaccess file that causes the overflow during expansion of
environment variables.
CAN-2004-0751: The char_buffer_read function in the mod_ssl module for Apache 2.x,
when using reverse proxying to an SSL server, allows remote attackers to cause a denial
of service (segmentation fault).
CAN-2004-0748: mod_ssl in Apache 2.0.50 and earlier allows remote attackers to cause
a denial of service (CPU consumption) by aborting an SSL connection in a way that
causes an Apache child process to enter an infinite loop.
CAN-2004-0809: The mod_dav module in Apache 2.0.50 and earlier allows remote
attackers to cause a denial of service (child process crash) via a certain sequence of
LOCK requests for a location that allows WebDAV authoring access (nessus.org).”
Port(s): 389 and 636
Summary of Service: LDAP (light weight directory protocol) nldap.nlm
Action Suggested: Disable this service if it is not needed.
By default, Novell's ldap does NOT allow clear text ldap (389). The administrator must
allow clear text (which is NOT recommended).
Details of Service: LDAP is a wonderful service for cross application authentication.
Many many applications can authenticate via ldap including firewalls, proxies, and web
servers/clients. LDAP is also a wonderful tool for administrators to do bulk directory
operations. Adding, modifying, deleting users, objects and even schema. All major
directory services providers use ldap (Novell, Microsoft, and Sun). LDAP can be used to
batch updates between many different systems like Mainframes and DS (from many
vendors). For real time event driven integration look at Identity Manager (IDM 2) which
has over 60 default connectors to many databases (CRM, email, Oracle, etc etc)
http://www.novell.com/products/nsureidentitymanager/.
9
If this service is not used on a day to day bases, you should disable it until/unless you
need it.
To disable:
To disable this service modify the /usr/lib/nds-modules/ndsmodules.conf and remark out
the nldap. Then restart ndsd: /etc/init.d/ndsd restart
Port(s): 9005, 9009, 8180
Summary of Service: novell-tomcat4 which is required for iManager (web based
administration tool for managing Novell services, and objects).
iManager can be accessed by https://hostname/nps/servlet/webacc
/var/opt/novell/tomcat4/conf/server.xml
Details of Service:
“...Tomcat 4 Servlet/JSP container. Tomcat 4 implements the Servlet 2.3
and JavaServer Pages 1.2 specifications from Java Software, and includes
many additional features that make it a useful platform for developing and
deploying web applications and web services
(http://jakarta.apache.org/tomcat/tomcat-4.1-doc/).”
Action Suggested: This depends on your environment, if this is an Internet facing box,
consider disabling it until you need to use it. Then ssh into the box and enable it by typing
/etc/init.d/novell-tomcat4 start
To disable this service:
/etc/init.d/novell-tomcat4 stop
chkconfig novell-tomcat4 off
Methods: netstat -na > tcbefore.txt before and after stopping the tomcat service.
confirming with:
grep -r "9005" /var/opt/novell/tomcat4/conf/
grep -r "9009" /var/opt/novell/tomcat4/conf/
grep -r "8180" /var/opt/novell/tomcat4/conf/
Which outputted xml files that contain these three ports (9005, 9009, and 8180).
Port(s): 8008, 8009
Summary of Service: novell-httpstkd Novell Remote Manager (NRM) AKA portal.
Primarily used for server health and statistics and troubleshooting.
10
Details of Service:
“Novell® Remote Manager for Linux is a browser-based utility that you can use to
manage one or more Linux servers from a remote location.
You can use Novell Remote Manager to monitor your server's health, change the
configuration of your server, or perform diagnostic and debugging tasks.
The advantages of using Novell Remote Manager for server management are that:
●
●
●
It does not require a special client.
It provides a graphical interface that makes interpreting diagnostic information
much more comprehensive and easier to manage.
It provides added functionality that is not available in the other management
utilities
(http://www.novell.com/documentation/oes/index.html?page=/documentation/oes/
remotemgr_lx/data/front.html#bktitle).”
Action Suggested: This depends on your environment. Consider enabling this service
when you need it.
To disable this service:
/etc/init.d/novell-httpstkd stop
chkconfig novell-httpstkd off
Nessus Reports:
See appendix A under ports 8008 and 8009.
Port(s): 631
Nessus rating: High
Summary of Service: novell-idsd (Novell iPrint DriverStore) and novell-ipsmd (Novell
iPrint Manager)
Details of Service:
“iPrint is a printing solution that enables you to send documents to printers
located throughout the Net. Using Internet technologies—including the
industry-standard Internet Printing Protocol (IPP)—iPrint provides you
with global access to printers, customizable views of any print
environment, flexible print deployment configurations, and secure printing.
iPrint is based on Novell Distributed Print Services™ (NDPS®), a timetested print solution known for its manageability, scalability, reliability,
11
and ease of use.
“Features
The iPrint component of Novell Open Enterprise Server includes several
new features:
●
●
●
●
●
●
●
●
●
●
●
●
●
iPrint client for Linux
iPrint client for Macintosh
Printer Profiles (pre-set printer driver defaults)*
NDPS-to-iPrint client migration tools
Queue-based printing-to-iPrint migration tool
Custom banner pages
Auditing
Command-line management**
Printer consolidation tool
Support for Port 9100
Hosting of iPrint services on a Linux server
*Available only on the Novell NetWare kernel of Open Enterprise
Server
**Available only on SUSE LINUX kernel of Open Enterprise
Server
(http://www.novell.com/products/netware/printing/index.html).”
Action Suggested: Disable if you do not need this service.
To disable this service:
/etc/init.d/novell-idsd stop
chkconfig novell-idsd off
/etc/init.d/novell-ipsmd stop
chkconfig novell-ipsmd off
Nessus Reports:
Port(s): varies
Summary of Service: novell-smdrd -- Novell Storage Management Data Requester
daemon. AKA backup/restore frame work.
Details of Service: SMDR is part of SMS. “NetWare® Storage Management ServicesTM
(SMS) is a collection of software programs that provides backup, restore, and data
migration services.
SMS allows you to backup targets such as the file system, Novell® eDirectoryTM, and the
GroupWise® on NetWare, to a removable tape media for off-site storage. SMS is clusterenabled and supports failover or failback of cluster-enabled resources. The backup
12
engines use this infrastructure to provide a complete backup solution
(http://www.novell.com/documentation/nw65/index.html?page=/documentation/nw65/sm
sadmin/data/hut0i3h5.html).”
Action Suggested: Disable if you do not need this service.
Methods: netstat -na > nssmdr.txt before and after stopping the daemon multiple times.
Each time the high ports (above 1024) changes.
Port(s): 7966, 9225, 9203, 9181, 9159, 9112, 9071, 9049, 9027, 9005, and 8391
Summary of Service: novell-xregd – This is an xtier daemon. xtier is AKA Middle Tier,
which translates http to NCP for netstorage, and ZENworks.
“The Middle Tier server communicates with the NetWare or Linux servers in the network
and provides secure authentication using eDirectory and the users’ usernames and
passwords. NetStorage also provides secure access to files that users have located on
Novell iFolder servers
(http://www.novell.com/documentation/oes/pdfdoc/netstor_lx/netstor_lx.pdf).”
Action Suggested: Disable if you do not need this service.
Methods: netstat -na before and after stopping novell-xregd
To disable this service:
/etc/init.d/novell-xregd stop
chkconfig novell-xregd off
Port(s): 8047, 8060, 8063, 8066, 8069, 8072 , 8089 , 8092 , 8095 , and 8098
Summary of Service: novell-xsrvd another piece of xtier
Action Suggested: Disable if you do not need this service.
Methods: netstat -na before and after stopping novell-xsrvd
To disable this service:
/etc/init.d/novell-xsrvd stop
chkconfig novell-xsrvd off
Port(s): 137,138, 139, and 445
Summary of Service: smb (Server message block) AKA samba or Microsoft file sharing
Details of Service: “Samba is an Open Source/Free Software suite that has, since 1992,
provided file and print services to all manner of SMB/CIFS clients, including the
numerous versions of Microsoft Windows operating systems. Samba is freely available
under the GNU General Public License (http://us3.samba.org/samba/).”
13
“What is Samba?
As the front page at samba.org says, "Samba is an Open Source/Free Software suite that
provides seamless file and print services to SMB/CIFS clients." Samba is freely available,
unlike other SMB/CIFS implementations, and allows for interoperability between
Linux/Unix servers and Windows-based clients.
Samba-3 by Example explains further, saying:
Samba is software that can be run on a platform other than Microsoft Windows, for
example, UNIX, Linux, IBM System 390, OpenVMS, and other operating systems.
Samba uses the TCP/IP protocol that is installed on the host server. When correctly
configured, it allows that host to interact with a Microsoft Windows client or server as if
it is a Windows file and print server (http://us3.samba.org/samba/what_is_samba.html).”
Action Suggested: Disable if you do not need this service.
Methods: netstat -na before and after stopping daemon
To disable this service:
/etc/init.d/smb stop
/etc/init.d/smbfs stop
chkconfig smb off
chkconfig smbfs off
rcnmb stop (stops 137 and 138)
rcsmb stop (stops 139 and 445)
:/etc/rc.d # grep -r 'rcnmb' /etc/rc.d
lsof -i tcp:631
/etc/rc.d/nmb:# /usr/sbin/rcnmb
/etc/rc.d/rc3.d/K15nmb:# /usr/sbin/rcnmb
/etc/rc.d/rc3.d/S07nmb:# /usr/sbin/rcnmb
/etc/rc.d/rc5.d/K15nmb:# /usr/sbin/rcnmb
/etc/rc.d/rc5.d/S07nmb:# /usr/sbin/rcnmb
Port(s): 111
Summary of Service: sunrpc AKA nfs
Details of Service: “NFS: The abbreviation for Network File System, NFS is a protocol
suite developed and licensed by Sun Microsystems that allows different makes of
computers running different operating systems to share files and disk storage
(http://www.webmage.com/support/glossary.asp).”
Action Suggested: Disable if you do not need this service.
Methods: lsof -i tcp:111
If you need this service running, consider increasing the security per this document.
14
http://www.puschitz.com/SecuringLinux.shtml
To disable this service:
/etc/init.d/portmap stop
chkconfig portmap off
Port(s): 524
Summary of Service: NDS AKA eDirectory, Directory Services
This is the core Novell service for authenticating NCP clients and directory access.
Action Suggested: Leave this service running as it is critical for Novell directory
services (it is DS!).
To disable this service:
/etc/init.d/ndsd stop
chkconfig ndsd off
Port(s): tcp 427 udp 427
Summary of Service: SLP (service location protocol)
Action Suggested: Leave this service running as it is critical for Novell name resolution.
To disable this service:
/etc/init.d/slpd stop
chkconfig slpd off
Port(s): 22
Summary of Service: SSH AKA remote secure telnet
Action Suggested: Leave this service running if you want/need to remote shell into your
Linux box.
To disable this service:
/etc/init.d/sshd status
chkconfig sshd off
Port(s): 505
Summary of Service: RCD (red carpet daemon). This is used to update systems/patches
and to install and keep packages up-to-date.
Details of Service: “What's Red Carpet?
15
Red Carpet is the leading software management solution for Linux. The intuitive Red
Carpet channel organization and automatic dependency and conflict resolution make it
easy to install, update and manage software on Linux workstations and servers. New Red
Carpet Services support allows users to manage software from Ximian/Novell, leading
Linux distribution providers and a variety of open-source projects. Red Carpet makes it
easy to update and manage Linux desktops with improved package inventory, update
history, and remote operation. Red Carpet now offers a choice of client interfaces: the
redesigned graphical interface, and the "rug" command line interface, which provides
simple, powerful commands and easy scriptability
(http://www.spikesource.com/docs/cs_1.4linux/doc/redcarpet/redcarpet_release_notes.html).”
Action Suggested: Disable if you do not need this service.
To disable this service:
/etc/init.d/rcd stop
chkconfig rcd off
Methods:
netstat -na | grep 505
lsof -i tcp:505
Port(s): 5801, 5901, 6001, 6002
Summary of Service: VNC (Virtual Network Computing). A remote control utility for
displaying desktop.
Action Suggested: Disable this service unless or until you need to use it (only enable it
temporarily).
To disable this service:
Start YAST: Start | system | Yast | Network Services | Remote Administration | chose 'Do
not allow remote administration'
Methods:
netstat -na | grep 5801
lsof -i tcp:5801
lsof -i tcp:6001
COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME
Xvnc 27731 nobody 0u IPv6 88773
TCP *:6001 (LISTEN)
Xvnc 27731 nobody 1u IPv4 88774
TCP *:6001 (LISTEN)
16
Port(s): 5989
Summary of Service: wbem (Web Based Enterprise Management)
To read more about this service see:
http://www.novell.com/coolsolutions/feature/14625.html
Details of Service: “DMTF, developer of the Common Information Model (CIM), is the
technology industry organization leading the development, adoption and interoperability
of management standards and initiatives for enterprise and Internet environments. CIM is
the breakthrough standard for the exchange of management information in a platformindependent and technology-neutral way, streamlining integration and reducing costs by
enabling end-to-end multi-vendor interoperability in management systems.
Key technology vendors and affiliated standards groups that implement CIM deliver a
more integrated, costeffective and less crisis-driven approach to management
(http://www.dmtf.org/newsroom/presskit/DMTF_backgrounder.pdf).”
“About the DMTF
With more than 3,000 active participants, the Distributed Management Task Force, Inc.
(DMTF) is the industry organization leading the development of management standards
and integration technology for enterprise and Internet environments. DMTF standards
provide common management infrastructure components for instrumentation, control and
communication in a platform-independent and technology neutral way. DMTF
technologies include information models (CIM), communication/control protocols
(WBEM), and core management services/utilities (http://www.dmtf.org/about).”
Action Suggested: Disable this service if you don't need it.
To disable this service:
/etc/init.d/owcimomd stop
chkconfig owcimomd off
Methods:
oes-linux-vm:~ # lsof -i tcp:5989
COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME
owcimomd 2611 root 21u IPv4 4454
TCP *:wbem-https (LISTEN)
oes-linux-vm:~ # netstat -na | grep 5989
17
tcp
0
0 0.0.0.0:5989
0.0.0.0:*
LISTEN
Port(s): udp 177
Summary of Service: xdm (“xdm is a graphical login screen”)
Details of Service: XDM (X Display Manager) “X display manager. A front-end utility
present on many Unix/Linux desktops that functions as a "login" window. "xdm" presents
a prompt for both usernames and passwords
(http://www.scd.ucar.edu/docs/ssh/guide/node32.html).”
Action Suggested: Disable this service if you don't need it.
To disable this service:
/etc/init.d/xdm stop
chkconfig xdm off
Methods:
lsof -i udp:177
COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME
kdm 4238 root 4u IPv4 7603
UDP *:xdmcp
chkconfig | grep dm
xdm
on
Port(s): 123
Summary of Service: NTP (Network Time Protocol). This is a critical service for
eDirectory. eDirectory must maintain current time. Time must be in sync!
Action Suggested: Leave the service running, but block this port at the firewall inbound.
To disable this service:
/etc/init.d/xntpd stop
chkconfig xntpd off
18
OES NetWare Services and suggested action
NW65-FS1:version
Novell Open Enterprise Server, NetWare 6.5
Support Pack Revision 03
(C) Copyright 1983-2005 Novell Inc. All Rights Reserved. Patent Pending.
Server Version 5.70.03 January 20, 2005
Novell eDirectory Version 8.7.3.5 SMP
NDS Version 10551.78 January 22, 2005
Server License: Novell NetWare 6 Server 650 SN:
User Licenses: Audited
Port(s): 21
Summary of Service: nwftpd.nlm AKA File Transfer Protocol (FTP).
Action Suggested: Disable this service if possible, at least disable anonymous via /
etc\ftpserv.cfg
#To Allow or Deny Access to Anonymous Users. Default value is NO
ANONYMOUS_ACCESS=NO
To disable this service:
unload nwftpd
modify sys:\system\autoexec.ncf and remark out nwftpd.nlm
#Added By FTP Server
#ftpstart.ncf
or nwftpd.nlm
Port(s): 80 and 443
Nessus rating: High
Summary of Service: http via Apache. Apache is needed for iManager, and iFolder.
Action Suggested: Disable this service if you do not need it.
To disable this service:
ap2webdn.ncf
Modify the sys:\system\autoexec.ncf and remark out the following lines:
#AP2WEBUP
#Apache2 is now the admin server
#ADMSRVUP
19
Methods:
NW65-FS1:m apache2
APACHE2.NLM
Loaded from [SYS:\APACHE2\]
(Address Space = OS)
Apache Web Server 2.0.52
Version 2.00.52 November 3, 2004
Copyright (c) 2000-2004 The Apache Software Foundation. All rights reserved.
APACHE2.NLM
Loaded from [SYS:\APACHE2\]
(Address Space = ADMINSRV)
Apache Web Server 2.0.52
Version 2.00.52 November 3, 2004
Copyright (c) 2000-2004 The Apache Software Foundation. All rights reserved.
NW65-FS1:
Port(s): 81
Summary of Service: Novell Remote Manager (NRM) AKA portal. Primarily used for
server health and statistics and troubleshooting. Sometimes netmail may listen for port 81
instead of NRM.
Details of Service: “Novell® Remote Manager for NetWare® (portal.nlm) is a browserbased utility that you can use to manage one or more NetWare servers from a remote
location.
Novell Remote Manager provides all the functionality of Monitor, along with some
functionality of other utilities available at the server console; however, Novell Remote
Manager makes this functionality available from a Web browser. You can use Novell
Remote Manager to monitor your server's health, change the configuration of your server,
or perform diagnostic and debugging tasks.
The advantages of using Novell Remote Manager rather than Monitor or RConsolej for
server management are:
●
●
●
●
●
It accesses information much more quickly than other remote management tools.
It is installed by default on all NetWare servers and requires no special
configuration for most operations.
It does not require a special client.
It provides a graphical interface that makes interpreting diagnostic information
much more comprehensible and easier to manage.
It provides added functionality that is not available in the other management
utilities
(http://www.novell.com/documentation/nw65/remotemgr/data/a7m35he.html).”
20
Action Suggested: Disable if this service is not needed.
To disable this service:
unload portal (and supporting modules for example nfsstop.ncf)
unload httpstk (and supporting modules) or remark out httpstk.nlm and portal in the
sys:\system\autoexec.ncf and reboot.
Methods:
https://hostname:81 redirects to https://hostname:8009
Port(s): 111 (TCP/UDP), 731 (TCP), 846 (TCP), 847 (TCP), 2049 (TCP), 32779 (udp),
32778(udp), 2049 (udp), 32779(tcp), and 32778(tcp).
Summary of Service: NFS via Native File Access Pack (NFAP). Allows native NFS
clients (Linux and Unix) to mount a Novell volume natively as an NFS mount point.
Details of this Service: “NFS (Network File System) can be called a true distributed file
system, and came from "the network is the computer" people at Sun. Technically a
client/server application, NFS allows remote clients to "mount" a local file system at
designated mount points. To the remote client, the mounted file system looks exactly like
a subdirectory branch structure of the local file system. Sun released the specifications for
NFS to allow other vendors to get involved, but they remain in control
(http://www.novell.com/info/collateral/docs/4621202.01/4621202.html).”
Action Suggested: Disable this service if it is not needed.
To disable this service:
nfsstop.ncf
Modify the sys:\system\autoexec.ncf and remark out the nfsstart.ncf
Methods: telnet hostname:port with nfsstart.ncf and without (nfsstop.ncf)
Port(s): 137, and 139
Summary of Service: CIFS AKA Microsoft shares. This allows native MS clients to
map a drive to a Novell server.
Details of Service: “CIFS comes from Microsoft's mediocre MS-NET networking
technology using SMB (Server Message Block) from back in the DOS days. SMB
21
technology still powers Windows 95/98 peer-to-peer networking, and the security level,
poor early on, deserves a failing mark today.
Trying to update SMB to something more open and reliable, Microsoft sent CIFS to the
standards committees. The good news about CIFS over SMB comes from the protocol
support: TCP/IP rather than NetBIOS. If nothing else, be thankful that Microsoft finally
purged NetBIOS from (most of) their systems, eliminating the need to try and manage a
weak, local, insecure communication pseudo-protocol.
When you notice a Linux server includes a SAMBA server, that's an open-systems
solution to emulate a Windows server. Handy, but insecure. Novell File Access Protocols
for CIFS goes far beyond the standard SAMBA emulation server software
(http://www.novell.com/info/collateral/docs/4621202.01/4621202.html).”
Action Suggested: Disable this service if it is not needed.
To disable this service:
cifsstop.ncf
Modify the sys:\system\autoexec.ncf and remark out the CIFSSTRT.NCF
Port(s): 389 and 636
Summary of Service: LDAP (Lightweight Directory Access Protocol) nldap.nlm
Details of Service: “LDAP (Lightweight Directory Access Protocol): a popular protocol
for providing directory services. Despite the name, LDAP isn't very “light weight”: LDAP
has been adopted by several companies including Netscape Communications and has
become a de facto standard for directory services. Other LDAP-compatible offerings
include Novell's Novell Directory Services (NDS) and Microsoft Corporation's Active
Directory (http://mixonline.com/mag/audio_pedant_big_box_4/).”
Action Suggested: Disable this service if it is not needed.
By default, Novell's ldap does NOT allow clear text ldap (389). The administrator must
allow clear text (which is NOT recommended).
To disable this service:
unload nldap.nlm
Modify the sys:\system\autoexec.ncf and remark out the LOAD NLDAP.NLM
#LOAD NLDAP.NLM
Port(s): 427
Summary of Service: SLP (service location protocol)
22
Details of Service: “The Service Location Protocol (SLP) is an Internet standard protocol
(RFC 2165) that enables client applications to dynamically discover services in TCP/IP
networks. Novell® provides implementations of SLP for NetWare®, Windows* 95,
Windows 98, Windows NT*, and Windows 2000
(http://www.novell.com/documentation/ndsedir86/taoenu/data/a2iiimc.html).”
Action Suggested: This is a critical service for Novell name resolution both for the
server(s) and the clients.
To disable this service:
Unload slptcp.nlm (Do NOT do this if you want people to be able to find your server and
login!)
Port(s): 524
Summary of Service: NDS AKA eDirectory. Novell's directory services.
Action Suggested: This is a critical for Novell DS. Do NOT disable this service.
To disable this service:
Unload DS.NLM (Do NOT unload this module if you want people to be able to login).
Port(s): 548
Summary of Service: AFP (Apple protocol via NFAP). This allows native Macintosh
workstations to map a drive to a Novell server and its volumes.
Details of Service: “Apple Filing Protocol's roots remain in the early AppleTalk days of
peer-to-peer, everyone shares everyone's hard disk days. Not secure, not fast. With NFAP
for AFP, you gain security through NDS eDirectory, and you gain at least 30 percent
faster file service (thanks to TCP/IP) through NetWare emulating an AppleShare server
than earlier AFP/NetWare software. Two good reasons to once again use NetWare as
your central AppleShare server
(http://www.novell.com/info/collateral/docs/4621202.01/4621202.html#access).”
Action Suggested: Disable this service if it is not needed.
To disable this service:
afpstop.ncf
Modify the sys:\system\autoexec.ncf and remark out the AFPSTRT.NCF
#AFPSTRT.NCF
23
Port(s): 631
Nessus rating: High
Summary of Service: IPP (Internet Printing Protocol) -- iPrint
Details of Service:
“iPrint is a printing solution that enables you to send documents to printers
located throughout the Net. Using Internet technologies—including the
industry-standard Internet Printing Protocol (IPP)—iPrint provides you
with global access to printers, customizable views of any print
environment, flexible print deployment configurations, and secure printing.
iPrint is based on Novell Distributed Print Services™ (NDPS®), a timetested print solution known for its manageability, scalability, reliability,
and ease of use.
“Features
The iPrint component of Novell Open Enterprise Server includes several
new features:
●
●
●
●
●
●
●
●
●
●
●
●
●
iPrint client for Linux
iPrint client for Macintosh
Printer Profiles (pre-set printer driver defaults)*
NDPS-to-iPrint client migration tools
Queue-based printing-to-iPrint migration tool
Custom banner pages
Auditing
Command-line management**
Printer consolidation tool
Support for Port 9100
Hosting of iPrint services on a Linux server
*Available only on the Novell NetWare kernel of Open Enterprise
Server
**Available only on SUSE LINUX kernel of Open Enterprise
Server
(http://www.novell.com/products/netware/printing/index.html).”
Action Suggested: Disable this service if it is not needed.
To disable this service:
modify the sys:\apache2\conf\httpd.conf and remark out the iprint include
##### Begin Novell iPrint configuration #####
#include iprint/ipp.conf
24
##### End Novell iPrint configuration #####
After modifying the conf file type AP2WEBDN.NCF on the console. Then
AP2WEBUP.NCF
Port(s): 873
Summary of Service: rsync “open source utility that provides fast incremental file
transfer (http://samba.anu.edu.au/rsync).” The author of this document has also written
an article on configuring rsync on NetWare. For more details on rsync please see:
http://www.novell.com/coolsolutions/appnote/654.html
Action Suggested: Disable this service if it is not needed.
To disable this service:
unload rsyncnrm.nlm
unload rsync.nlm
unload rsyncst.nlm
Modify the sys:\system\autoexec.ncf and remark out:
SEARCH ADD SYS:\RSYNC
#LOAD RSYNCNRM
Port(s): 1234 (tcp), 1234 (udp)
Summary of Service: QuickFinder
For more details see:
http://www.novell.com/products/openenterpriseserver/quickfinder.html
Action Suggested: Disable this service if it is not needed.
To disable this service:
Modify the sys:\system\autoexec.ncf and remark out: (then reboot)
#LOAD EMBOX.NLM
embox auto loads quickfinder
Port(s): 2034 2036
Nessus rating: High
Summary of Service: rconag6.nlm (remote console IP). This service allows you to
remote control the NetWare console.
sys:\system\autoexec.ncf has the following by default:
#RCONAG6.NLM is required by RConsoleJ
#LOAD RCONAG6 <Your Password Here> 2034 16800 2036
25
Do NOT put your password here. Rather do this.
LOAD RCONAG6 ENCRYPT | enter | follow the prompts and put in your desired rconj
password. This will create a sys:\system\ldrconag.ncf
put ldrconag.ncf in the autoexec.ncf.
LOAD RCONAG6 -E 28D5D5BF85614FD1F368D4E171FA110B 2034 16800 2036
This is a hash value of the password, I would not trust this completely.
Action Suggested: Disable this service if it is not needed.
To disable this service:
unload rconag6.nlm (If you are remoted into the server via rconj, you will lose your
connection when you unload this)
Modify the sys:\system\autoexec.ncf and remark out:
#ldrconag.ncf
#LOAD RCONAG6 mypassword 2034 16800 2036
Port(s): 2200 and 2211
Nessus rating: High (2200)
Summary of Service: Web site, welcome site, and administration server.
Details of Service:
“NetWare® Web Manager is a browser-based management tool used to
configure and manage the NetWare Enterprise Web server. But it also
serves as a front door to other NetWare browser-based management tools,
such as NetWare Remote Manager. It can be likened to a Web site's home
26
page with links to other resources and tools.
HINT: Web Manager and many other Web-based management tools used
for managing NetWare 6 rely on the industry leading Apache Web server.
Therefore, when viewing Web Manager access or error log files, or when
shutting down or restarting Web Manager, you are actually affecting the
Apache Server, not the NetWare Enterprise Web Server.
Using a workstation and Web browser, you can access Web Manager
either locally (from within your WAN or LAN), or from remote locations
where you have Internet access. Web Manager lets you
●
●
●
●
Manage the Enterprise Web Server
Monitor Web server activity
Set up and manage user authentication and access to information
on your server using Novell® eDirectoryTM or local database modes
Access other browser-based management tools such as NetWare
Remote Manager or NetWare Web Search Server (see Table 1,
NetWare 6 Web-based Management Tools)
(http://www.novell.com/documentation/nw6p/adminenu/data/ac1k
ab2.html).”
Action Suggested: Chances are you will need this service, if not disable it.
To disable this service:
Modify the the configuration sys:\adminsrv\conf\adminserv.conf and remark out the vhost
settings for port 2200.
Port(s): 3306
Summary of Service: mysql (Open source SQL engine).
Details of Service: “MySQL is an open-source relational database management system
that allows you to use Java*, C, Perl, and PHP APIs to access persistent data.
The MySQL database server is the world's most popular open source database. Its
architecture makes it extremely fast and easy to customize. Extensive reuse of code
within the software and a minimalistic approach to producing functionally-rich features
has resulted in a database management system unmatched in speed, compactness,
stability, and ease of deployment. The unique separation of the core server from the
storage engine makes it possible to run with strict transaction control or with ultra-fast
transactionless disk access, whichever is most appropriate for the situation
(http://forge.novell.com/modules/xfmod/project/?mysql).”
Action Suggested: Disable this service if it is not needed.
27
To disable this service:
unload mysql.nlm
Modify the sys:\system\autoexec.ncf and remark
# -- Added by MYSQL Install -SEARCH ADD SYS:\mysql\bin
#mysqld_safe --autoclose
# -- End of MYSQL Install -Port(s): 3351
Summary of Service: btrieve (Pervasive Software database used by core NetWare).
Details of Service:
“bspxcom.nlm 7.90.000 (Build 230)
●
●
●
●
Handles incoming requests to btrieve.nlm from a remote source via SPXTM.
If unloaded, remote communication to btrieve.nlm will not be possible.
Btrieve* monitor utility is dependent on bspxcom.nlm.
Loaded by default only if IPXTM is a loaded protocol.
btcpcom.nlm 7.90.000 (Build 230)
●
●
●
●
Handles incoming requests to btrieve.nlm from a remote source via TCP/IP.
If unloaded, remote communication to btrieve.nlm will not be possible.
Btrieve monitor utility is dependent on bspxcom.nlm.
Loaded by default only if TCP/IP is a loaded protocol
(http://www.novell.com/documentation/nw65/nlm_list/data/ai0oeh9.html).”
Action Suggested: This is such a core service it may not be possible to disable. Perhaps
filtcfg.nlm (Native NetWare firewall) or perimeter firewall rules.
Port(s): 6901
Summary of Service: jstcp.nlm -- Jetstream TCP Transport Layer
Action Suggested: unknown
ichain is an appliance type security device built on the NetWare kernel.
http://www.novell.com/coolsolutions/feature/2516.html
Port(s): 8008 and 8009
Summary of Service: Novell Remote Manager (NRM) AKA portal. Primarily used for
28
server health and statistics and troubleshooting.
Action Suggested: This depends on your environment. Chances are you will want to use
this service. Consider enabling it when you need to use it.
To disable this service:
unload portal.nlm (and its dependent processes)
unload httpstk.nlm
Modify the sys:\system\autoexec.ncf and remark
#load httpstk.nlm /SSL /keyfile:"SSL CertificateIP"
#LOAD PORTAL.NLM
Port(s): 9009 (TCP), 9010 (TCP), and 691 (UDP)
Summary of Service: tomcat (extension of the apache web server). Tomcat is required
for iManager (web based administration tool for managing Novell services, and objects).
Action Suggested: Disable this service until you need it.
Details of Service:
“Tomcat enables the NetWare Enterprise Web Server to execute Java
servlets. A servlet can be thought of as a server-side applet without a user
interface. Tomcat provides Web application developers with additional
functionality. For example, a servlet could be written and deployed to
process data obtained from a client via an HTML form and the server-side
data processing could manipulate the data and store results in a database.
Servlets provide an alternative to CGI
(http://www.novell.com/documentation/nw6p/index.html?page=/document
ation/nw6p/adminenu/data/a3fd4py.html).”
Tomcat is a servlet container, which is a runtime shell that manages and
invokes servlets when they are requested by a Web browser or by another
servlet. Servlets are programs that run on a Web server and automatically
generate Web pages as a result of user input. Two or more servlets
working together to provide a common set of functions is referred to as a
Web application.
Web servers, such the Apache Web server, also included with Open
Enterprise Server (OES) NetWare®, depend on a servlet container like
Tomcat to process JavaServer Pages (JSPs) and servlets.
Tomcat provides many business benefits to your existing network that can
ultimately increase productivity, improve communication between
29
departments and employees. When used in conjunction with the Apache
Web server, Tomcat can host powerful Web applications.
Here are some of the key uses and benefits of using Tomcat on NetWare:
●
●
●
●
Offers a highly flexible, robust JSP servlet container that is tightly
integrated with NetWare.
Provides a simple entry point for organizations planning to
prototype and deploy Java* based utilities and solutions on a
NetWare server.
Works with major development tools available through commercial
vendors and open source communities.
Tomcat can be deployed with Novell® Cluster ServicesTM
(included with NetWare) to provide high availability, load
balancing, and fault tolerance for important business processes
running in the Tomcat JSP servlet container
(http://www.novell.com/documentation/oes/index.html?page=/doc
umentation/oes/web_tomcat/data/ahdyran.html).”
To disable this service:
tcadmdn.ncf (9009)
tc4stop.ncf (9010, 691)
Modify the sys:\system\autoexec.ncf and remark
#tcadmup.ncf
#sys:/tomcat/4/bin/tomcat4.ncf
Port(s): 161
Nessus rating: High (with default public string)
Summary of Service: SNMP (Simple Network Management Protocol) – AKA Security
not my problem). SNMP alerts OS and application level alerts to a site server (ZFS
among others).
Action Suggested: Disable this service if possible. If not, make sure you change the
control and public community strings to something that is not in the dictionary and
change it often (every 60 days or per your Security Policy).
To change the strings modify the sys:\etc\netinfo.cfg (or change it in inetcfg (I
recommend you do it via inetcfg.nlm)
LOAD SNMP MonitorCommunity=nowatchme ControlCommunity=nohackme
TrapCommunity=noalertme
30
To disable this service:
This may be a project in and of itself. Remark it out of the netinfo.cfg (if you hack the
netinfo.cfg file, remember to delete/clear the netinfo.chk file (doing it this way is not
supported by Novell).
Port(s): 123
Summary of Service: NTP (Network Time Protocol) – provides time services to
edir/nds.
Action Suggested: This is a critical service for DS to be in timesync. Use your perimeter
firewall rules to increase security for NTP.
Port(s): 902, 903, 904
Nessus rating: High (903)
Summary of Service: unknown
Action Suggested:
Methods: When I went back to figure out what these services were, they were not
listening.
“ideafarm-chat
ideafarm-chat
ideafarm-catch
ideafarm-catch
902/tcp IDEAFARM-CHAT
902/udp IDEAFARM-CHAT
903/tcp IDEAFARM-CATCH
903/udp IDEAFARM-CATCH
31
904-910
Unassigned (http://www.iana.org/assignments/port-numbers).”
Conclusion:
From this document you learn of the many ports and services listening by default on
Linux and NetWare (both running Novell services). This is a classic case of ease-of-use
vs security. My recommendation is to research diligently whether or not you 'need' the
service(s), if you do not need the service disable it or uninstall the service. If you must
keep the service running to provide functionality to your users/customers then you must
research how to increase the security of these services via configuration, firewall rules
(inbound/outbound), IDS (host and network), patches, baselines, best practices, and
continual vigilance. The introduction of this document pointed you to many good
references for securing services that must be keep running.
This document showed step-by-step how to disable potentially unneeded default services
on OES NetWare and OES Linux.
32
Annotated Bibliography
Anderson, A. (2003) Introduction to Nessus
Retrieved April 28, 2005 from http://www.securityfocus.com/infocus/1741
Mr. Anderson wrote three introductory articles on installing, configuring and
using Nessus.
“Nessus is a great tool designed to automate the testing and discovery of known
security problems. Typically someone, a hacker group, a security company, or a
researcher discovers a specific way to violate the security of a software product.
The discovery may be accidental or through directed research; the vulnerability, in
various levels of detail, is then released to the security community. Nessus is
designed to help identify and solve these known problems, before a hacker takes
advantage of them”
Apache.org (n.d.) apache.org
Retrieved May 16, 2005
This web site is the apache project's interface. This defines and explains what
apache is, including tomcat.
Deraison, R. (2004) Nessus Open Source Vulnerability Scanner Project
Retrieved April 21, 2005 from Nessus.org
Renaud Deraison is the main author of the Nessus Open Source tool for assessing
known vulnerabilities. Nessus is able to assess the OS, applications and
networking protocols.
Harris, S. (2003). CISSP® Certification All-in-One Exam Guide, Second Edition.
I plan to quote and or paraphrase security principles from this book. I read and reread this book when I studied to challenge the CISSP exam. Now, after passing
the exam I find myself going back to it as a reference book. This book covers well
the 10 common body of knowledge (CBK). The 10 CBK's are: Security
Management Practices, Access Control, Security Models and Architecture,
Physical Security, Telecommunications and Networking Security, Cryptology,
Business Continuity Planning, 'Law, Investigation, and Ethics', Application and
System Development, Operations Security.
Reschke J. (2004) Apache.org defect/bug report referenced in a Nessus scan report
Retrieved April 28, 2005 from
http://issues.apache.org/bugzilla/show_bug.cgi?id=31183
33
This bug report details the Denial of Service Attack that OES Linux with default
configuration is susceptible to.
Nessus report “Solution : Upgrade to Apache 2.0.51 Risk factor : High”
Nessus.org (n.d) CAN report on OpenSSL 0.9.6 and 0.9.7 vulnerability (NetWare and
SLES)
Retrieved April 28, 2005 from
http://cgi.nessus.org/cve.php3?cve=CAN-2003-0543
Similar to a bug report, but has a brief description of the vulnerability.
“Integer overflow in OpenSSL 0.9.6 and 0.9.7 allows remote attackers to cause a
denial of service (crash) via an SSL client certificate with certain ASN.1 tag
values.”
Nessus.org (n.d) CAN report on remote RPC buffer overflow vulnerability (NetWare)
Retrieved April 29, 2005 from
http://cgi.nessus.org/cve.php3?cve=CVE-2001-0779
“Buffer overflow in rpc.yppasswdd (yppasswd server) in Solaris 2.6, 7 and 8
allows remote attackers to gain root access via a long username.”
Nessus.org (n.d) CAN report CAN-2004-1147 in phpMyAdmin 2.6.0-pl2 vulnerability
(NetWare)
Retrieved April 29, 2005 from
http://cgi.nessus.org/cve.php3?cve=CAN-2004-1147
“phpMyAdmin 2.6.0-pl2, and other versions before 2.6.1, with external
transformations enabled, allows remote attackers to execute arbitrary commands
via shell metacharacters.rname.”
Nessus.org (n.d) CAN report CAN-1999-0509 perl, sh, cgi vulnerability (NetWare)
Retrieved April 29, 2005 from
http://cgi.nessus.org/cve.php3?cve=CAN-1999-0509
“Perl, sh, csh, or other shell interpreters are installed in the cgi-bin directory on a
WWW site, which allows remote attackers to execute arbitrary commands.”
Nessus.org (n.d) CAN report CAN-1999-0517 SNMP default read community (public)
(NetWare)
Retrieved April 29, 2005 from
http://cgi.nessus.org/cve.php3?cve=CAN-1999-0517
“An SNMP community name is the default (e.g. public), null, or missing.”
34
Novell Inc. (n. d.) Novell Online Documentation
Retrieved May 16, 2005 from
novell.com
Novell.com will be referenced for details of services. Typically the 'Summary of
Service' will be in my own words, however for the 'Details of Service' I will quote
novell.com.
Maslowski-Yerges (2004) Novell AppNote: Securing a Novell Nterprise Linux Services
Server: Step-by-Step (SUSE 8, NNLS 1.0)
Retrieved April 29, 2005 from
http://www.novell.com/coolsolutions/appnote/1651.html
This is a lengthy (52 pages) step-by-step process/checklist for increasing the
security of SLES with Novell services on it (pre-OES Linux). NovaCoast is a
respected services organization. The author of this document has many
SANS.ORG certifications. I plan to reference this appnote in my paper.
Samba.org (n.d.) Samba project documentation and collaboration website.
Retrieved May 16, 2005
Samba.org is a wonderful resource to explain the details of samba.
35
Appendix A OES Linux Default Assessment
Network Vulnerability Assessment Report
24.04.2005
Sorted by host names
Session name: OES Linux
Start Time: 24.04.2005 08:28:04
Finish Time: 24.04.2005 11:06:38
Elapsed: 0 day(s) 02:38:33
Total records generated: 108
high severity: 4
Medium severity: 25
informational: 79
10.10.10.15
Service Severity
ssh
Info Port is open
(22/tcp)
http
Info Port is open
(80/tcp)
sunrpc
Info Port is open
(111/tcp)
netbiosssn
Info Port is open
(139/tcp)
ldap
Info Port is open
(389/tcp)
svrloc
Info Port is open
(427/tcp)
https
Info Port is open
(443/tcp)
microsoft
-ds
Info Port is open
(445/tcp)
Description
36
mailboxlm
(505/tcp)
ncp
(524/tcp)
ipp
(631/tcp)
ldaps
(636/tcp)
unknown
(5801/tcp
)
unknown
(5901/tcp
)
wbemhttps
(5989/tcp
)
x11
(6001/tcp
)
x11
(6002/tcp
)
http-alt
(8008/tcp
)
unknown
(8009/tcp
)
unknown
(8028/tcp
)
unknown
(8030/tcp
)
unknown
(8180/tcp
)
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
37
unknown
(9009/tcp
)
xdmcp
(177/udp
)
ntp
(123/udp
)
sunrpc
(111/udp
)
netbiosns
(137/udp
)
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
The remote host seem to be running a version of OpenSSL which is
older than 0.9.6k or 0.9.7c.
unknown
(8030/tcp
)
There is a heap corruption bug in this version which might be
exploited by an
attacker to gain a shell on this host.
High
Solution : If you are running OpenSSL, Upgrade to version 0.9.6k or
0.9.7c or newer
Risk factor : High
CVE : CAN-2003-0543, CAN-2003-0544, CAN-2003-0545
BID : 8732
Other references : IAVA:2003-A-0015, RHSA:RHSA-2003:291-01,
SuSE:SUSE-SA:2003:043
38
The remote host is running a version of Apache2 which is older than
2.0.51.
It is reported that versions prior 2.0.51 are prone to a remote denial
of
service issue. An attacker may issue a specific sequence of DAV
LOCK commands
to crash the process. If Apache is configured to use threads, it may
completely crash the Apache process.
ipp
(631/tcp)
High
In addition to this, versions prior 2.0.51 are prone to a remote buffer
overflow when parsing an URI sent over IPv6. An attacker may use
this flaw
to execute arbitrary code on the remote host or to deny service to
legitimate
users.
See also : http://nagoya.apache.org/bugzilla/show_bug.cgi?id=31183
Solution : Upgrade to Apache 2.0.51
Risk factor : High
CVE : CAN-2004-0786, CAN-2004-0747, CAN-2004-0751, CAN2004-0748, CAN-2004-0809
BID : 11185, 11187
39
The remote host is running a version of Apache2 which is older than
2.0.51.
It is reported that versions prior 2.0.51 are prone to a remote denial
of
service issue. An attacker may issue a specific sequence of DAV
LOCK commands
to crash the process. If Apache is configured to use threads, it may
completely crash the Apache process.
https
(443/tcp)
High
In addition to this, versions prior 2.0.51 are prone to a remote buffer
overflow when parsing an URI sent over IPv6. An attacker may use
this flaw
to execute arbitrary code on the remote host or to deny service to
legitimate
users.
See also : http://nagoya.apache.org/bugzilla/show_bug.cgi?id=31183
Solution : Upgrade to Apache 2.0.51
Risk factor : High
CVE : CAN-2004-0786, CAN-2004-0747, CAN-2004-0751, CAN2004-0748, CAN-2004-0809
BID : 11185, 11187
40
The remote host is running a version of Apache2 which is older than
2.0.51.
It is reported that versions prior 2.0.51 are prone to a remote denial
of
service issue. An attacker may issue a specific sequence of DAV
LOCK commands
to crash the process. If Apache is configured to use threads, it may
completely crash the Apache process.
http
(80/tcp)
High
In addition to this, versions prior 2.0.51 are prone to a remote buffer
overflow when parsing an URI sent over IPv6. An attacker may use
this flaw
to execute arbitrary code on the remote host or to deny service to
legitimate
users.
See also : http://nagoya.apache.org/bugzilla/show_bug.cgi?id=31183
Solution : Upgrade to Apache 2.0.51
Risk factor : High
CVE : CAN-2004-0786, CAN-2004-0747, CAN-2004-0751, CAN2004-0748, CAN-2004-0809
BID : 11185, 11187
41
The remote host appears to be running a version of Apache 2.x
which is
older than 2.0.50.
There is denial of service in apache httpd 2.0.x by sending a
specially crafted HTTP request. It is possible to consume arbitrary
amount of memory. On 64 bit systems with more than 4GB virtual
memory
this may lead to heap based buffer overflow. See also
http://www.guninski.com/httpd1.html
ipp
Medium
(631/tcp)
There is also a denial of service vulnerability in mod_ssl's
ssl_io_filter_cleanup function. By sending a request to vulnerable
server over SSL and closing the connection before the server can
send
a response, an attacker can cause a memory violation that crashes the
server.
Solution : Upgrade to Apache/2.0.50 or newer
Risk factor : Medium
CVE : CAN-2004-0493
BID : 10619, 12877
Other references : OSVDB:7269
42
The remote host appears to be running a version of Apache 2.x
which is
older than 2.0.50.
There is denial of service in apache httpd 2.0.x by sending a
specially crafted HTTP request. It is possible to consume arbitrary
amount of memory. On 64 bit systems with more than 4GB virtual
memory
this may lead to heap based buffer overflow. See also
http://www.guninski.com/httpd1.html
http
(80/tcp)
Medium
There is also a denial of service vulnerability in mod_ssl's
ssl_io_filter_cleanup function. By sending a request to vulnerable
server over SSL and closing the connection before the server can
send
a response, an attacker can cause a memory violation that crashes the
server.
Solution : Upgrade to Apache/2.0.50 or newer
Risk factor : Medium
CVE : CAN-2004-0493
BID : 10619, 12877
Other references : OSVDB:7269
The server's directory base is set to NULL. This allows information
to be
enumerated without any prior knowledge of the directory struture.
The following information was pulled from the server via a LDAP
ldap
request:
Medium
(389/tcp)
Solution: Disable or restrict anonymous binds in LDAP if not
required
See also: http://support.novell.com/cgibin/search/searchtid.cgi?/10077872.htm
Risk Factor: Medium
43
Your webserver supports the TRACE and/or TRACK methods.
TRACE and TRACK
are HTTP methods which are used to debug web server connections.
It has been shown that servers supporting this method are subject
to cross-site-scripting attacks, dubbed XST for
"Cross-Site-Tracing", when used in conjunction with
various weaknesses in browsers.
An attacker may use this flaw to trick your
legitimate web users to give him their
credentials.
Solution: Disable these methods.
If you are using Apache, add the following lines for each virtual
host in your configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
If you are using Microsoft IIS, use the URLScan tool to deny HTTP
TRACE
requests or to permit only the methods needed to meet site
https
Medium requirements
(443/tcp)
and policy.
If you are using Sun ONE Web Server releases 6.0 SP2 and later,
add the
following to the default object section in obj.conf:
<Client method="TRACE">
AuthTrans fn="set-variable"
remove-headers="transfer-encoding"
set-headers="content-length: -1"
error="501"
</Client>
If you are using Sun ONE Web Server releases 6.0 SP2 or below,
compile
the NSAPI plugin located at:
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F50603
44
The remote SSH daemon supports connections made
using the version 1.33 and/or 1.5 of the SSH protocol.
ssh
(22/tcp)
Medium
These protocols are not completely cryptographically
safe so they should not be used.
Solution :
If you use OpenSSH, set the option 'Protocol' to '2'
If you use SSH.com's set the option 'Ssh1Compatibility' to 'no'
Risk factor : Low
mailboxlm
Medium The SSL certificate of the remote service expired 030724183953Z!
(505/tcp)
ht://Dig's configuration file is located at:
ipp
Medium
(631/tcp)
CVE : CAN-2000-1191
45
Your webserver supports the TRACE and/or TRACK methods.
TRACE and TRACK
are HTTP methods which are used to debug web server connections.
It has been shown that servers supporting this method are subject
to cross-site-scripting attacks, dubbed XST for
"Cross-Site-Tracing", when used in conjunction with
various weaknesses in browsers.
An attacker may use this flaw to trick your
legitimate web users to give him their
credentials.
Solution: Disable these methods.
If you are using Apache, add the following lines for each virtual
host in your configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
If you are using Microsoft IIS, use the URLScan tool to deny HTTP
TRACE
requests or to permit only the methods needed to meet site
ipp
Medium requirements
(631/tcp)
and policy.
If you are using Sun ONE Web Server releases 6.0 SP2 and later,
add the
following to the default object section in obj.conf:
<Client method="TRACE">
AuthTrans fn="set-variable"
remove-headers="transfer-encoding"
set-headers="content-length: -1"
error="501"
</Client>
If you are using Sun ONE Web Server releases 6.0 SP2 or below,
compile
the NSAPI plugin located at:
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F50603
46
http
(80/tcp)
ht://Dig's configuration file is located at:
Medium
https
Medium
(443/tcp)
CVE : CAN-2000-1191
ht://Dig's configuration file is located at:
CVE : CAN-2000-1191
The remote host appears to be running a version of Apache 2.x
which is
older than 2.0.50.
There is denial of service in apache httpd 2.0.x by sending a
specially crafted HTTP request. It is possible to consume arbitrary
amount of memory. On 64 bit systems with more than 4GB virtual
memory
this may lead to heap based buffer overflow. See also
http://www.guninski.com/httpd1.html
https
Medium
(443/tcp)
There is also a denial of service vulnerability in mod_ssl's
ssl_io_filter_cleanup function. By sending a request to vulnerable
server over SSL and closing the connection before the server can
send
a response, an attacker can cause a memory violation that crashes the
server.
Solution : Upgrade to Apache/2.0.50 or newer
Risk factor : Medium
CVE : CAN-2004-0493
BID : 10619, 12877
Other references : OSVDB:7269
Here is the browse list of the remote host :
NOVL_CPU2X ( os: 0.0 )
OES-LINUX-VM-W ( os: 0.0 )
microsoft
-ds
Medium
(445/tcp)
This is potentially dangerous as this may help the attack
of a potential hacker by giving him extra targets to check for
Solution : filter incoming traffic to this port
Risk factor : Low
47
The remote web server seems to be vulnerable to the Cross Site
Scripting vulnerability (XSS). The vulnerability is caused
by the result returned to the user when a non-existing file is
requested (e.g. the result contains the JavaScript provided
in the request).
The vulnerability would allow an attacker to make the server present
the user with the attacker's JavaScript/HTML code.
Since the content is presented by the server, the user will give it the
trust
level of the server (for example, the trust level of banks, shopping
centers, etc. would usually be high).
Sample url :
http://10.10.10.15:8028/foo.jsp?param=<SCRIPT>foo</SCRIPT>.js
p
Risk factor : Medium
unknown
(8028/tcp Medium Solutions:
)
. Allaire/Macromedia Jrun:
- http://www.macromedia.com/software/jrun/download/update/
- http://www.securiteam.com/windowsntfocus/Allaire_fixes_CrossSite_Scripting_security_vulnerability.html
. Microsoft IIS:
- http://www.securiteam.com/windowsntfocus/IIS_CrossSite_scripting_vulnerability__Patch_available_.html
. Apache:
- http://httpd.apache.org/info/css-security/
. ColdFusion:
- http://www.macromedia.com/v1/handlers/index.cfm?ID=23047
. General:
http://www.securiteam.com/exploits/Security_concerns_when_devel
oping_a_dynamically_generated_web_site.html
- http://www.cert.org/advisories/CA-2000-02.html
CVE : CVE-2002-1060
BID : 5305, 7344, 7353, 8037, 9245
48
The remote web server seems to be vulnerable to the Cross Site
Scripting vulnerability (XSS). The vulnerability is caused
by the result returned to the user when a non-existing file is
requested (e.g. the result contains the JavaScript provided
in the request).
The vulnerability would allow an attacker to make the server present
the user with the attacker's JavaScript/HTML code.
Since the content is presented by the server, the user will give it the
trust
level of the server (for example, the trust level of banks, shopping
centers, etc. would usually be high).
Sample url :
http://10.10.10.15:8030/foo.jsp?param=<SCRIPT>foo</SCRIPT>.js
p
Risk factor : Medium
unknown
(8030/tcp Medium Solutions:
)
. Allaire/Macromedia Jrun:
- http://www.macromedia.com/software/jrun/download/update/
- http://www.securiteam.com/windowsntfocus/Allaire_fixes_CrossSite_Scripting_security_vulnerability.html
. Microsoft IIS:
- http://www.securiteam.com/windowsntfocus/IIS_CrossSite_scripting_vulnerability__Patch_available_.html
. Apache:
- http://httpd.apache.org/info/css-security/
. ColdFusion:
- http://www.macromedia.com/v1/handlers/index.cfm?ID=23047
. General:
http://www.securiteam.com/exploits/Security_concerns_when_devel
oping_a_dynamically_generated_web_site.html
- http://www.cert.org/advisories/CA-2000-02.html
CVE : CVE-2002-1060
BID : 5305, 7344, 7353, 8037, 9245
49
The remote web server seems to be vulnerable to the Cross Site
Scripting vulnerability (XSS). The vulnerability is caused
by the result returned to the user when a non-existing file is
requested (e.g. the result contains the JavaScript provided
in the request).
The vulnerability would allow an attacker to make the server present
the user with the attacker's JavaScript/HTML code.
Since the content is presented by the server, the user will give it the
trust
level of the server (for example, the trust level of banks, shopping
centers, etc. would usually be high).
Sample url :
http://10.10.10.15:8009/foo.jsp?param=<SCRIPT>foo</SCRIPT>.js
p
unknown
Risk factor : Medium
(8009/tcp Medium
)
Solutions:
. Allaire/Macromedia Jrun:
- http://www.macromedia.com/software/jrun/download/update/
- http://www.securiteam.com/windowsntfocus/5YP0M1F2AM.html
. Microsoft IIS:
- http://www.securiteam.com/windowsntfocus/IIS_CrossSite_scripting_vulnerability__Patch_available_.html
. Apache:
- http://httpd.apache.org/info/css-security/
. ColdFusion:
- http://www.macromedia.com/v1/handlers/index.cfm?ID=23047
. General:
- http://www.securiteam.com/windowsntfocus/5UP0O0A2AE.html
- http://www.cert.org/advisories/CA-2000-02.html
CVE : CVE-2002-1060
BID : 5305, 7344, 7353, 8037, 9245
50
The remote host is running XDMCP.
This protocol is used to provide X display connections for X
terminals.
XDMCP is completely insecure, since the traffic and passwords are
not
encrypted.
xdmcp
(177/udp Medium An attacker may use this flaw to capture all the keystrokes of the
)
users
using this host through their X terminal, including passwords.
Also XDMCP is an additional login mechanism that you may not
have been
aware was enabled, or may not be monitoring failed logins on.
Solution : Disable XDMCP
Risk factor : Medium
The remote host is running Serendipity, a weblog written in PHP.
The remote version of this software is vulnerable to cross-site
scripting attack due to a lack of sanity checks on searchTerm
parameter in the compat.php script.
unknown
(8030/tcp Medium
With a specially crafted URL, an attacker can cause arbitrary
)
code execution resulting in a loss of integrity.
Solution : Upgrade to Serendipity 0.7.1 or newer
Risk factor : Medium
BID : 11790
Other references : OSVDB:12177
51
Your webserver supports the TRACE and/or TRACK methods.
TRACE and TRACK
are HTTP methods which are used to debug web server connections.
It has been shown that servers supporting this method are subject
to cross-site-scripting attacks, dubbed XST for
"Cross-Site-Tracing", when used in conjunction with
various weaknesses in browsers.
An attacker may use this flaw to trick your
legitimate web users to give him their
credentials.
Solution: Disable these methods.
If you are using Apache, add the following lines for each virtual
host in your configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
http
(80/tcp)
If you are using Microsoft IIS, use the URLScan tool to deny HTTP
TRACE
requests or to permit only the methods needed to meet site
Medium requirements
and policy.
If you are using Sun ONE Web Server releases 6.0 SP2 and later,
add the
following to the default object section in obj.conf:
<Client method="TRACE">
AuthTrans fn="set-variable"
remove-headers="transfer-encoding"
set-headers="content-length: -1"
error="501"
</Client>
If you are using Sun ONE Web Server releases 6.0 SP2 or below,
compile
the NSAPI plugin located at:
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F50603
52
The remote host answers to an ICMP timestamp request. This allows
an attacker
to know the date which is set on your machine.
This may help him to defeat all your time based authentication
general/i
protocols.
Medium
cmp
Solution : filter out the ICMP timestamp requests (13), and the
outgoing ICMP
timestamp replies (14).
Risk factor : Low
CVE : CAN-1999-0524
The following 5 NetBIOS names have been gathered :
OES-LINUX-VM-W = This is the computer name registered for
workstation services by a WINS client.
OES-LINUX-VM-W = This is the current logged in user registered
for this workstation.
OES-LINUX-VM-W = Computer name
WORKGROUP = Workgroup / Domain name
WORKGROUP = Workgroup / Domain name (part of the Browser
elections)
netbiosns
Medium . This SMB server seems to be a SAMBA server (this is not a
(137/udp
security
)
risk, this is for your information). This can be told because this
server
claims to have a null MAC address
If you do not want to allow everyone to find the NetBios name
of your computer, you should filter incoming traffic to this port.
Risk factor : Medium
CVE : CAN-1999-0621
53
Improperly configured LDAP servers will allow the directory BASE
to be set to NULL. This allows information to be
culled without any prior knowledge of the directory
structure. Coupled with a NULL BIND, an anonymous
ldap
Medium user can query your LDAP server using a tool such
(389/tcp)
as 'LdapMiner'
Solution: Disable NULL BASE queries on your LDAP server
Risk factor : Medium
Improperly configured LDAP servers will allow any user to connect
to the
server and query for information.
Solution: Disable NULL BIND on your LDAP server
In addition, the LDAP bind function in Exchange 5.5 has a buffer
overflow
that allows a user to conduct a denial of service or execute
commands in all
ldap
versions prior to Exchange server SP2. Coupled with a NULL BIND,
Medium
(389/tcp)
an
anonymous user can mount a remote attack against your server.
Note: no test was done to see what version of Exchange server is
running,
nor attempt to verify the service pack.
Solution: see
http://www.microsoft.com/technet/security/bulletin/ms99-009.mspx
Risk factor: Medium
CVE : CVE-1999-0385
BID : 503
Server Name: OES-LINUX-VM
ncp
Medium NDS Tree Name: OES-LINUX-VM-TREE
(524/tcp)
NDS Users: ADMIN, EGUIDEPUBLICUSER_19226
54
The remote web server seems to be vulnerable to the Cross Site
Scripting vulnerability (XSS). The vulnerability is caused
by the result returned to the user when a non-existing file is
requested (e.g. the result contains the JavaScript provided
in the request).
The vulnerability would allow an attacker to make the server present
the user with the attacker's JavaScript/HTML code.
Since the content is presented by the server, the user will give it the
trust
level of the server (for example, the trust level of banks, shopping
centers, etc. would usually be high).
Sample url :
http://10.10.10.15:8008/foo.jsp?param=<SCRIPT>foo</SCRIPT>.js
p
Risk factor : Medium
http-alt
(8008/tcp Medium Solutions:
)
. Allaire/Macromedia Jrun:
- http://www.macromedia.com/software/jrun/download/update/
- http://www.securiteam.com/windowsntfocus/Allaire_fixes_CrossSite_Scripting_security_vulnerability.html
. Microsoft IIS:
- http://www.securiteam.com/windowsntfocus/IIS_CrossSite_scripting_vulnerability__Patch_available_.html
. Apache:
- http://httpd.apache.org/info/css-security/
. ColdFusion:
- http://www.macromedia.com/v1/handlers/index.cfm?ID=23047
. General:
http://www.securiteam.com/exploits/Security_concerns_when_devel
oping_a_dynamically_generated_web_site.html
- http://www.cert.org/advisories/CA-2000-02.html
CVE : CVE-2002-1060
BID : 5305, 7344, 7353, 8037, 9245
55
The remote host is running Serendipity, a weblog written in PHP.
The remote version of this software is vulnerable to cross-site
scripting attack due to a lack of sanity checks on searchTerm
parameter in the compat.php script.
unknown
(8028/tcp Medium
With a specially crafted URL, an attacker can cause arbitrary
)
code execution resulting in a loss of integrity.
Solution : Upgrade to Serendipity 0.7.1 or newer
Risk factor : Medium
BID : 11790
Other references : OSVDB:12177
Remote SSH version : SSH-1.99-OpenSSH_3.8p1
ssh
(22/tcp)
microsoft
-ds
(445/tcp)
unknown
(8180/tcp
)
unknown
(8028/tcp
)
Info
Remote SSH supported authentication : publickey,keyboardinteractive
Info
A CIFS server is running on this port
Info
A web server is running on this port
Info
A web server is running on this port
56
wbemhttps
(5989/tcp
)
Info
Here is the SSLv2 server certificate:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 0 (0x0)
Signature Algorithm: md5WithRSAEncryption
Issuer: C=--, ST=SomeState, L=SomeCity, O=SomeOrganization,
OU=SomeOrganizationalUnit,
CN=localhost.localdomain/[email protected]
in
Validity
Not Before: Apr 24 05:45:03 2005 GMT
Not After : Apr 24 05:45:03 2006 GMT
Subject: C=--, ST=SomeState, L=SomeCity, O=SomeOrganization,
OU=SomeOrganizationalUnit,
CN=localhost.localdomain/[email protected]
in
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (1024 bit)
Modulus (1024 bit):
00:af:69:5e:a0:0b:2a:81:38:94:af:14:6d:85:94:
d5:ae:62:b5:ae:88:fd:b1:63:d5:28:9c:c1:d4:7d:
ac:b0:05:d2:85:f8:47:90:9d:e0:21:fa:a3:80:2e:
ba:f9:6b:f7:a9:14:01:e6:3a:27:9d:15:61:e6:24:
4d:06:22:3f:99:98:5e:7f:24:0e:ff:4e:22:31:c2:
3f:15:14:01:b9:0b:1d:f9:1d:73:58:85:1e:4d:d5:
00:77:2d:80:78:c5:05:f0:20:1a:02:28:13:74:dd:
e3:00:ea:99:69:45:cd:cc:65:15:1b:9f:3b:b7:27:
60:a1:de:24:a2:aa:91:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
69:2c:64:cd:d1:7a:db:3e:9b:4b:f3:bf:4b:e4:af:09:ae:c1:
d7:c1:14:7b:e6:88:6f:96:9a:23:d6:1c:86:aa:cf:52:3c:3d:
fb:af:44:66:25:fc:7e:94:12:47:5b:a0:57:da:f0:9d:2e:29:
42:39:bd:79:d1:66:ac:d4:73:69:27:0b:89:85:9e:cd:2b:05:
5f:d8:b1:d3:85:38:15:b3:65:77:28:f1:74:36:12:52:38:b0:
d7:93:24:cd:c1:bd:89:3e:eb:44:6e:f1:9a:48:b5:bd:49:a1:
28:4a:3e:a0:73:a9:d1:18:3f:46:f7:1a:86:e7:48:25:07:c2:
33:4e
Here is the list of available SSLv2 ciphers:
RC4-MD5
EXP-RC4-MD5
RC2-CBC-MD5
EXP-RC2-CBC-MD5
DES-CBC-MD5
57
unknown
(8030/tcp
)
unknown
(8030/tcp
)
unknown
(8009/tcp
)
Info
A web server is running on this port through SSL
Info
A SSLv2 server answered on this port
Info
A web server is running on this port through SSL
58
mailboxlm
(505/tcp)
Info
Here is the SSLv3 server certificate:
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 0 (0x0)
Signature Algorithm: md5WithRSAEncryption
Issuer: C=--, ST=SomeState, L=SomeCity, O=SomeOrganization,
OU=SomeOrganizationalUnit,
CN=localhost.localdomain/[email protected]
in
Validity
Not Before: Jul 24 18:39:53 2002 GMT
Not After : Jul 24 18:39:53 2003 GMT
Subject: C=--, ST=SomeState, L=SomeCity, O=SomeOrganization,
OU=SomeOrganizationalUnit,
CN=localhost.localdomain/[email protected]
in
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (1024 bit)
Modulus (1024 bit):
00:b7:46:f6:1f:76:8a:b2:ec:18:6c:1f:6f:a6:fb:
8a:36:84:df:19:7e:e4:c0:ae:74:83:7a:23:6e:77:
86:17:c8:e1:a1:8c:f0:de:fa:82:3c:eb:07:df:fa:
e9:e8:7e:c0:e5:66:7f:f2:c3:c7:38:8d:65:26:93:
aa:47:0f:6d:75:69:8f:b8:f5:e0:00:f9:f3:4f:da:
c9:27:80:29:51:95:5a:00:40:76:6c:11:6c:74:0c:
8f:9f:87:f3:41:3c:59:03:f7:b1:8a:a1:19:0b:b7:
e0:49:2b:96:d1:1d:27:27:3a:92:cc:c6:7e:66:27:
dd:d6:fa:67:8f:f1:7f:0f:b9
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
1F:68:3C:69:DB:98:C6:F3:0A:D0:A7:2B:E6:B9:50:0F:53:C4:70:39
X509v3 Authority Key Identifier:
keyid:1F:68:3C:69:DB:98:C6:F3:0A:D0:A7:2B:E6:B9:50:0F:53:C4:
70:39
DirName:/C=--/
ST=SomeState/L=SomeCity/O=SomeOrganization/OU=SomeOrgan
izationalUnit/CN=localhost.localdomain/emailAddress=root@localh
ost.localdomain
serial:00
X509v3 Basic Constraints:
CA:TRUE
Signature Algorithm: md5WithRSAEncryption
59
Here is the SSLv2 server certificate:
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=US, CN=YaST Default CA (oes-linux-vm)/
[email protected]
Validity
Not Before: Apr 24 06:04:04 2005 GMT
Not After : Apr 24 06:04:04 2006 GMT
Subject: C=US, CN=oes-linuxvm.thomaserickson.com/emailAddress=postmaster@thomaserickson
.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (2048 bit)
Modulus (2048 bit):
00:a2:9b:0c:5d:0b:e5:5c:24:cc:46:a1:75:4f:06:
de:47:f3:57:dc:f9:09:39:ed:cb:52:10:2e:f1:c7:
4f:17:08:fc:e2:26:f4:4e:78:92:4c:e9:0d:a6:b7:
56:53:3b:9c:42:f8:ed:3b:50:aa:03:49:e5:7d:89:
91:8e:8d:5b:05:ce:7e:02:fa:7b:5d:4f:00:5f:b8:
95:6f:b0:a8:32:78:89:dd:a7:a0:dd:f4:e3:28:bd:
ca:aa:44:85:eb:ff:b7:35:82:db:70:bb:23:e6:70:
f7:35:db:98:33:fa:7a:a6:46:16:c5:31:6e:96:d1:
6b:60:32:05:e2:81:dd:41:9e:74:25:6a:a5:87:0b:
3c:79:bf:45:19:7d:d3:30:21:61:53:bd:a6:8e:e5:
c2:95:1d:4e:02:c1:c9:13:78:79:54:39:61:d5:31:
dc:c8:89:73:72:e2:ea:33:c0:1b:86:b9:3e:6f:59:
b2:ee:00:bd:f2:c0:51:99:dd:b4:3d:c9:ff:fe:64:
72:a0:aa:f2:ad:e8:6c:fd:7b:ac:6b:63:7e:46:2e:
fa:06:28:2e:3c:fd:5f:ec:e4:3d:cd:02:6c:66:ad:
1c:22:a0:44:cf:9c:7c:5f:d1:b9:4e:22:8f:9a:23:
1f:ec:5a:c7:98:ae:b2:fe:ed:7a:f9:c3:3d:5f:3d:
e5:65
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Comment:
YaST Generated Server Certificate
Netscape Cert Type:
SSL Server
X509v3 Key Usage:
Key Encipherment
60
Here is the SSLv2 server certificate:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
02:1c:14:e1:6e:79:e7:a8:0c:4f:5a:15:fb:0e:75:24:80:da:a0:e3:b6:39:7
e:cb:03:61:3b:a4:d5:8b:02:02:01:0c
Signature Algorithm: sha1WithRSAEncryption
Issuer: OU=Organizational CA, O=OES-LINUX-VM-TREE
Validity
Not Before: Apr 22 06:06:19 2005 GMT
Not After : Apr 24 06:06:19 2007 GMT
Subject: CN=oes-linux-vm.thomaserickson.com, O=OES-LINUXVM-TREE
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (2048 bit)
Modulus (2048 bit):
00:bc:ca:65:cf:30:8e:76:66:c0:ee:c4:ab:bf:a6:
f0:20:03:bb:6d:01:82:b6:2e:21:00:55:7f:9b:66:
53:66:30:8a:99:0d:41:21:80:81:e9:d9:7f:92:35:
93:70:a7:83:8f:08:eb:0b:d0:68:bc:d9:67:8f:1e:
e3:61:e8:6d:fb:5d:19:03:aa:82:e5:5e:61:cf:55:
54:0b:07:91:92:71:6d:f2:49:59:0e:fb:48:e6:5b:
74:d6:a6:c5:33:2d:63:03:b3:77:e4:91:19:b8:46:
fa:0a:c2:1c:bd:9f:af:e7:3e:75:18:18:05:b4:8c:
c7:4b:83:43:3d:5a:1b:9d:05:d0:80:90:24:50:ee:
25:e0:6e:1d:cf:8c:fc:ac:0b:54:90:d5:72:e3:4b:
a0:d5:2b:48:44:b3:a7:4f:8d:a1:38:ae:0d:e3:97:
39:92:9a:49:c0:38:5c:9b:b4:86:29:df:59:0c:73:
eb:8b:77:5a:dc:81:0a:8a:f0:89:b5:87:e3:f6:1d:
b5:68:56:5a:2a:7c:9c:a7:53:b2:e6:e0:d6:f0:82:
e2:19:29:bc:df:de:31:87:d4:5c:4b:85:12:a8:a8:
78:06:27:3a:e9:9c:4c:99:53:a9:b2:ca:2c:ed:e0:
1e:ac:15:31:12:43:0b:1b:c3:c2:04:4d:9f:fa:c3:
6f:09
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
D0:AD:65:81:3E:E7:2C:88:9E:D1:32:73:DF:63:B9:08:F7:6A:B9:3F
X509v3 Authority Key Identifier:
keyid:31:1D:CD:47:BD:D0:8C:5A:CC:05:3E:A8:E9:AF:9E:99:29:E
4:99:1B
X509v3 Key Usage:
Digital Signature, Key Encipherment
61
unknown
(8009/tcp
)
Info
Here is the SSLv2 server certificate:
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 0 (0x0)
Signature Algorithm: md5WithRSAEncryption
Issuer: C=AU, ST=Some-State, O=Organization,
OU=Organizational Unit, CN=10.10.10.15
Validity
Not Before: Apr 24 05:56:39 2005 GMT
Not After : Apr 24 05:56:39 2009 GMT
Subject: C=AU, ST=Some-State, O=Organization,
OU=Organizational Unit, CN=10.10.10.15
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (1024 bit)
Modulus (1024 bit):
00:ac:30:58:1b:0e:0c:1f:7b:a6:82:d9:40:28:66:
fb:60:d8:e6:15:1b:68:e2:fc:19:c7:a8:e7:02:b8:
cf:ce:88:22:d5:e3:99:1e:c7:92:e5:ef:d0:56:65:
8f:4c:5a:d2:00:fb:03:41:04:3c:78:e6:13:90:48:
c5:8c:5c:92:8a:78:a8:06:2c:31:e5:9f:49:82:0c:
b4:cd:ce:6e:0f:1b:ea:fa:4d:22:a1:d0:cf:cf:e5:
f9:11:91:0e:92:67:52:3a:97:84:78:ca:10:45:1d:
54:16:25:44:19:4a:d1:4f:62:3e:42:c1:d7:c4:15:
fc:1a:cd:3f:93:58:3e:34:f7
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
D7:D1:08:93:10:9E:33:D2:CA:A5:A3:71:80:0F:00:E5:9B:ED:AC:2
D
X509v3 Authority Key Identifier:
keyid:D7:D1:08:93:10:9E:33:D2:CA:A5:A3:71:80:0F:00:E5:9B:ED
:AC:2D
DirName:/C=AU/ST=SomeState/O=Organization/OU=Organizational Unit/CN=10.10.10.15
serial:00
X509v3 Basic Constraints:
CA:TRUE
Signature Algorithm: md5WithRSAEncryption
02:cd:7e:b9:13:05:22:4c:c1:87:f4:33:55:b3:52:c8:20:db:
11:34:19:43:c2:c3:a4:80:cd:e5:ca:29:e9:ba:75:52:03:74:
fd:d1:19:4f:55:c7:1b:45:29:33:95:06:fc:65:72:22:05:35:
94:7d:29:ca:32:a9:f6:91:68:56:7f:d6:5a:ec:9b:d7:dd:8c:
f7:d0:94:e8:47:31:e2:85:80:4f:6d:3d:3d:9f:6f:4a:b9:8d:
62
microsoft
-ds
(445/tcp)
- NULL sessions are enabled on the remote host
- Remote users are authenticated as 'Guest'
Info
CVE : CAN-1999-0504, CAN-1999-0506, CVE-2000-0222, CAN1999-0505, CAN-2002-1117
BID : 494, 990, 11199
63
Here is the SSLv2 server certificate:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
02:1c:14:e1:6e:79:e7:a8:0c:4f:5a:15:fb:0e:75:24:80:da:a0:e3:b6:39:7
e:cb:03:61:3b:a4:d5:8b:02:02:01:0f
Signature Algorithm: sha1WithRSAEncryption
Issuer: OU=Organizational CA, O=OES-LINUX-VM-TREE
Validity
Not Before: Apr 22 06:06:33 2005 GMT
Not After : Apr 24 06:06:33 2007 GMT
Subject: CN=10.10.10.15, O=OES-LINUX-VM-TREE
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (2048 bit)
Modulus (2048 bit):
00:a1:38:c7:ed:9a:ae:de:9b:4b:5b:f6:c5:71:a5:
40:d2:60:01:6a:8f:aa:2f:c2:81:46:c7:31:5e:74:
e7:b9:49:16:83:9e:c5:44:40:aa:e3:f0:d9:be:47:
7e:f3:a5:45:63:02:b9:14:db:1e:b4:43:96:d2:e4:
dd:9f:44:48:bb:58:69:a5:04:13:65:52:2b:b8:28:
00:8b:18:fb:2a:f1:13:2e:45:51:03:27:f3:8d:80:
fa:3d:f0:5c:84:ad:9e:f8:67:ff:cc:cc:39:d3:1c:
61:35:f4:b9:21:3a:27:cc:44:bc:aa:90:1e:66:ea:
16:df:64:35:2c:e2:4f:e9:d4:97:c8:9d:39:9e:24:
21:ba:7d:97:27:eb:8d:92:9c:ce:5f:15:03:59:87:
a8:52:ae:44:49:3d:00:17:73:f1:94:68:83:8b:04:
f4:cb:b3:b5:48:bb:ee:d1:88:fd:11:1e:c9:e4:9f:
20:86:20:1b:67:77:81:17:a1:f7:6a:b1:48:5f:86:
83:4d:38:62:13:cd:28:73:f7:f7:3f:3b:9b:0b:03:
16:91:e6:84:f0:1a:02:e9:23:97:31:13:12:3b:92:
88:c0:7a:00:76:c8:ea:fb:1c:9c:46:70:7b:22:fd:
60:72:3d:19:31:22:49:6d:d9:46:6e:e5:19:2c:77:
e6:8b
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
DB:7A:6B:AC:D0:E9:0F:F8:36:F1:2C:6E:CF:CD:E6:9C:42:81:72:4
0
X509v3 Authority Key Identifier:
keyid:31:1D:CD:47:BD:D0:8C:5A:CC:05:3E:A8:E9:AF:9E:99:29:E
4:99:1B
unknown
X509v3 Key Usage:
Digital Signature, Key Encipherment
64
microsoft
-ds
(445/tcp)
unknown
(8009/tcp
)
general/t
cp
general/t
cp
Info
The remote native lan manager is : Samba 3.0.9-2.6-SUSE
The remote Operating System is : Unix
The remote SMB Domain Name is : WORKGROUP
Info
A SSLv2 server answered on this port
Info
The remote host is running Linux Kernel 2.6.5-7.147-default (i386)
Info
The remote host is running one of these operating systems :
Linux Kernel 2.6
Linux Kernel 2.4
The following CGI have been discovered :
Syntax : cginame (arguments [default value])
ipp
(631/tcp)
Info
/gif/ (C=S
O [A] C=N
O [D] C=M
O [A] C=D
O [A] )
/nps/servlet/webacc (taskId [fw.Startup] )
. (C=S
O [A] C=N
O [D] C=M
O [A] C=D
O [A] )
Directory index found at /
Directory index found at /gif/
65
The remote host seem to be running an SSH server which can allow
an attacker to determine the existence of a given login by comparing
the time the remote sshd daemon takes to refuse a bad password for a
non-existent login compared to the time it takes to refuse a bad
password
for a valid login.
ssh
(22/tcp)
Info
An attacker may use this flaw to set up a brute force attack against
the remote host.
Solution : Disable PAM support if you do not use it, upgrade to the
newest
version of OpenSSH
Risk factor : Low
CVE : CAN-2003-0190
BID : 7342, 7467, 7482, 11781
http-alt
(8008/tcp
)
unknown
(5801/tcp
)
wbemhttps
(5989/tcp
)
mailboxlm
(505/tcp)
Info
Info
A web server is running on this port
This web server is [mis]configured in that it
does not return '404 Not Found' error codes when
a non-existent file is requested, perhaps returning
a site map, search page or authentication page instead.
Unfortunately, we were unable to find a way to recognize this page,
so some CGI-related checks have been disabled.
To work around this issue, please contact the Nessus team.
The remote web server type is :
Info
openwbem/3.1.0 (CIMOM)
The remote web server type is :
Info
Red Carpet Daemon/2.4.5
66
The remote web server type is :
Apache/2.0.49 (Linux/SuSE)
https
(443/tcp)
Info
Solution : You can set the directive 'ServerTokens Prod' to limit
the information emanating from the server in its response headers.
The remote web server type is :
Apache/2.0.49 (Linux/SuSE)
http
(80/tcp)
Info
Solution : You can set the directive 'ServerTokens Prod' to limit
the information emanating from the server in its response headers.
The remote web server type is :
Apache/2.0.49 (Linux/SuSE)
ipp
(631/tcp)
unknown
(8030/tcp
)
unknown
(8028/tcp
)
Info
Solution : You can set the directive 'ServerTokens Prod' to limit
the information emanating from the server in its response headers.
The remote web server type is :
Info
DHost/9.0 HttpStk/1.0
The remote web server type is :
Info
DHost/9.0 HttpStk/1.0
The remote web server type is :
unknown
(8180/tcp
)
Apache-Coyote/1.1
Info
and the 'ServerTokens' directive is ProductOnly
Apache does not permit to hide the server type.
ldaps
(636/tcp)
Info
A SSLv2 server answered on this port
67
ipp
(631/tcp)
sunrpc
(111/udp
)
sunrpc
(111/tcp)
ssh
(22/tcp)
Info
A web server is running on this port
Info
RPC program #100000 version 2 'portmapper' (portmap sunrpc
rpcbind) is running on this port
Info
Info
RPC program #100000 version 2 'portmapper' (portmap sunrpc
rpcbind) is running on this port
The remote SSH daemon supports the following versions of the
SSH protocol :
. 1.33
. 1.5
. 1.99
. 2.0
SSHv1 host key fingerprint :
8e:0c:5e:3f:51:81:33:bd:6c:e9:13:4a:e2:00:9d:ff
SSHv2 host key fingerprint :
74:89:cb:61:2d:c6:eb:1c:e3:99:5f:5d:0b:85:a0:35
unknown
(5801/tcp
)
http
(80/tcp)
https
(443/tcp)
https
(443/tcp)
mailboxlm
(505/tcp)
mailboxlm
(505/tcp)
wbemhttps
(5989/tcp
)
Info
A web server is running on this port
Info
A web server is running on this port
Info
A web server is running on this port through SSL
Info
A SSLv2 server answered on this port
Info
A web server is running on this port through SSL
Info
A TLSv1 server answered on this port
Info
A web server is running on this port through SSL
68
wbemhttps
(5989/tcp
)
ssh
(22/tcp)
Info
A SSLv2 server answered on this port
Info
An ssh server is running on this port
The RPC portmapper is running on this port.
sunrpc
(111/tcp)
Info
An attacker may use it to enumerate your list
of RPC services. We recommend you filter traffic
going to this port.
Risk factor : Low
CVE : CAN-1999-0632, CVE-1999-0189
BID : 205
69
It is possible to determine a lot of information about the remote host
by querying the NTP (Network Time Protocol) variables - these
include
OS descriptor, and time settings.
It was possible to gather the following information from the remote
NTP host :
version='ntpd [email protected] Wed Jan 26 17:44:09 UTC 2005 (1)',
processor='i686', system='Linux/2.6.5-7.147-default', leap=0,
stratum=11, precision=-19, rootdelay=0.000, rootdispersion=45.006,
ntp
(123/udp
)
Info
peer=32660, refid=127.127.1.0, reftime=0xc6164ab6.218eda22,
poll=10,
clock=0xc6164bf4.87401c4f, state=4, offset=0.000,
frequency=0.000,
error=0.002, jitter=0.000, stability=0.000
Quickfix: Set NTP to restrict default access to ignore all info
packets:
restrict default ignore
Risk factor : Low
netbiosssn
(139/tcp)
ldap
(389/tcp)
unknown
(5901/tcp
)
Info
Info
Info
An SMB server is running on this port
An unknown server is running on this port.
If you know what it is, please send this banner to the Nessus team:
00: 30 24 02 01 0$..
An unknown server is running on this port.
If you know what it is, please send this banner to the Nessus team:
00: 52 46 42 20 30 30 33 2e 31 33 30 0a RFB 003.130.
70
x11
(6002/tcp
)
Info
http-alt
(8008/tcp
)
Info
unknown
(8009/tcp
)
Info
This port was detected as being open by a port scanner but is now
closed.
This service might have been crashed by a port scanner or by a
plugin
This port was detected as being open by a port scanner but is now
closed.
This service might have been crashed by a port scanner or by a
plugin
This port was detected as being open by a port scanner but is now
closed.
This service might have been crashed by a port scanner or by a
plugin
Appendix B OES NetWare Default Assessment
Network Vulnerability Assessment Report
23.04.2005
Sorted by host names
Session name: NW65SP3_AKA_OES
Start Time: 23.04.2005 21:50:35
Finish Time: 23.04.2005 23:32:50
Elapsed: 0 day(s) 01:42:14
Total records generated: 140
high severity: 8
Medium severity: 23
informational: 109
10.10.10.6
Service
ftp (21/tcp)
http (80/tcp)
hosts2-ns
(81/tcp)
sunrpc
(111/tcp)
Severity
Info Port is open
Info Port is open
Info
Port is open
Info
Port is open
Description
71
netbios-ssn
(139/tcp)
ldap
(389/tcp)
svrloc
(427/tcp)
https
(443/tcp)
ncp (524/tcp)
afpovertcp
(548/tcp)
ipp (631/tcp)
ldaps
(636/tcp)
netviewdm3
(731/tcp)
unknown
(846/tcp)
dhcpfailover2
(847/tcp)
rsync
(873/tcp)
search-agent
(1234/tcp)
scoremgr
(2034/tcp)
unknown
(2036/tcp)
nfs
(2049/tcp)
ici (2200/tcp)
unknown
(2211/tcp)
mysql
(3306/tcp)
btrieve
(3351/tcp)
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
72
unknown
(6901/tcp)
http-alt
(8008/tcp)
unknown
(8009/tcp)
unknown
(9009/tcp)
unknown
(9010/tcp)
netbios-ns
(137/udp)
snmp
(161/udp)
unknown
(32779/udp)
unknown
(32778/udp)
nfs
(2049/udp)
search-agent
(1234/udp)
ntp (123/udp)
unknown
(961/udp)
ideafarm-chat
(902/udp)
sunrpc
(111/udp)
unknown
(32779/tcp)
unknown
(32778/tcp)
ideafarmcatch
(903/udp)
unknown
(904/udp)
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
Info
Port is open
73
The remote host seems to be using a version of OpenSSL which
is
older than 0.9.6e or 0.9.7-beta3
This version is vulnerable to a buffer overflow which,
may allow an attacker to obtain a shell on this host.
unknown
(2036/tcp)
High
*** Note that since safe checks are enabled, this check
*** might be fooled by non-openssl implementations and
*** produce a false positive.
*** In doubt, re-execute the scan without the safe checks
Solution : Upgrade to version 0.9.6e (0.9.7beta3) or newer
Risk factor : High
CVE : CAN-2002-0656, CAN-2002-0655, CAN-2002-0657,
CAN-2002-0659, CVE-2001-1141
BID : 3004, 4316, 5363
Other references : IAVA:2002-A-0009, SuSE:SUSESA:2002:033
The remote RPC service 100009 (yppasswdd) may be vulnerable
to a buffer overflow which would allow any user to obtain a root
shell on this host.
ideafarmcatch
(903/udp)
High
*** Nessus reports this vulnerability using only
*** information that was gathered. Use caution
*** when testing without safe checks enabled.
Solution : disable this service if you don't use
it, or contact Sun for a patch
Risk factor : High
CVE : CVE-2001-0779
BID : 2763
74
The remote host is running phpMyAdmin, an open-source
software
written in PHP to handle the administration of MySQL over the
Web.
The remote version of this software is vulnerable to one (or
both)
of the following flaws :
ici (2200/tcp)
High
- An attacker may be able to exploit this software to execute
arbitrary
commands on the remote host on a server which does not run
PHP in safe mode.
- An attacker may be able to read arbitrary files on the remote
host
through the argument 'sql_localfile' of the file 'read_dump.php'.
Solution : Upgrade to version 2.6.1-rc1 or newer
Risk factor : High
CVE : CAN-2004-1147, CAN-2004-1148
BID : 11886
The 'Perl' CGI is installed and can be launched
as a CGI. This is equivalent to giving a free shell to an attacker,
with the
http server privileges (usually root or nobody).
ici (2200/tcp)
High
Solution : remove it from /cgi-bin
Risk factor : High
CVE : CAN-1999-0509
The 'Perl' CGI is installed and can be launched
as a CGI. This is equivalent to giving a free shell to an attacker,
with the
http server privileges (usually root or nobody).
ipp (631/tcp)
High
Solution : remove it from /cgi-bin
Risk factor : High
CVE : CAN-1999-0509
75
The 'Perl' CGI is installed and can be launched
as a CGI. This is equivalent to giving a free shell to an attacker,
with the
http server privileges (usually root or nobody).
http (80/tcp)
High
Solution : remove it from /cgi-bin
https
(443/tcp)
Risk factor : High
CVE : CAN-1999-0509
The 'Perl' CGI is installed and can be launched
as a CGI. This is equivalent to giving a free shell to an attacker,
with the
http server privileges (usually root or nobody).
High
Solution : remove it from /cgi-bin
Risk factor : High
CVE : CAN-1999-0509
snmp
(161/udp)
High
SNMP Agent responded as expected with community name:
public
CVE : CAN-1999-0517, CAN-1999-0186, CAN-1999-0254,
CAN-1999-0516
BID : 11237, 10576, 177, 2112, 6825, 7081, 7212, 7317, 9681,
986
Other references : IAVA:2001-B-0001
76
This web server leaks a private IP address through its HTTP
headers : /10.10.10.6
This may expose internal IP addresses that are usually hidden or
masked
behind a Network Address Translation (NAT) Firewall or proxy
server.
http-alt
(8008/tcp)
Medium There is a known issue with IIS 4.0 doing this in its default
configuration.
See
http://support.microsoft.com/support/kb/articles/Q218/1/80.ASP
See the Bugtraq reference for a full discussion.
Risk factor : Low
CVE : CAN-2000-0649
BID : 1499
This web server leaks a private IP address through its HTTP
headers : /10.10.10.6
This may expose internal IP addresses that are usually hidden or
masked
behind a Network Address Translation (NAT) Firewall or proxy
server.
hosts2-ns
(81/tcp)
Medium There is a known issue with IIS 4.0 doing this in its default
configuration.
See
http://support.microsoft.com/support/kb/articles/Q218/1/80.ASP
See the Bugtraq reference for a full discussion.
Risk factor : Low
CVE : CAN-2000-0649
BID : 1499
77
The remote host is running phpMyAdmin, an open-source
software
written in PHP to handle the administration of MySQL over the
Web.
This version is vulnerable to cross-site scripting attacks threw
ici (2200/tcp) Medium read_dump.php script.
With a specially crafted URL, an attacker can cause arbitrary
code execution resulting in a loss of integrity.
Solution : Upgrade to version 2.6.0-pl3 or newer
Risk factor : Medium
BID : 11707
78
The remote host uses non-random IP IDs, that is, it is
possible to predict the next value of the ip_id field of
the ip packets sent by this host.
An attacker may use this feature to determine traffic patterns
within your network. A few examples (not at all exhaustive) are:
1. A remote attacker can determine if the remote host sent a
packet
in reply to another request. Specifically, an attacker can use your
server as an unwilling participant in a blind portscan of another
network.
general/tcp
Medium
2. A remote attacker can roughly determine server requests at
certain
times of the day. For instance, if the server is sending much more
traffic after business hours, the server may be a reverse proxy or
other remote access device. An attacker can use this information
to
concentrate his/her efforts on the more critical machines.
3. A remote attacker can roughly estimate the number of requests
that
a web server processes over a period of time.
Solution : Contact your vendor for a patch
Risk factor : Low
nfs
(2049/udp)
Medium
The nfsd RPC service is running. In the past, this service has had
bugs which allow an intruder to execute arbitrary commands on
your system. In addition, FreeBSD 4.6.1 RELEASE-p7 and
earlier, NetBSD 1.5.3 and earlier have a bug wherein sending a
zero length packet to the RPC service will cause the operating
system to hang.
Solution : Make sure that you have the latest version of nfsd
Risk factor : High
CVE : CVE-1999-0832, CVE-2002-0830
BID : 782
79
Your webserver supports the TRACE and/or TRACK methods.
TRACE and TRACK
are HTTP methods which are used to debug web server
connections.
It has been shown that servers supporting this method are subject
to cross-site-scripting attacks, dubbed XST for
"Cross-Site-Tracing", when used in conjunction with
various weaknesses in browsers.
An attacker may use this flaw to trick your
legitimate web users to give him their
credentials.
Solution: Disable these methods.
If you are using Apache, add the following lines for each virtual
host in your configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
If you are using Microsoft IIS, use the URLScan tool to deny
HTTP TRACE
requests or to permit only the methods needed to meet site
requirements
ici (2200/tcp) Medium
and policy.
If you are using Sun ONE Web Server releases 6.0 SP2 and later,
add the
following to the default object section in obj.conf:
<Client method="TRACE">
AuthTrans fn="set-variable"
remove-headers="transfer-encoding"
set-headers="content-length: -1"
error="501"
</Client>
If you are using Sun ONE Web Server releases 6.0 SP2 or
below, compile
the NSAPI plugin located at:
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%
2F50603
80
Your webserver supports the TRACE and/or TRACK methods.
TRACE and TRACK
are HTTP methods which are used to debug web server
connections.
It has been shown that servers supporting this method are subject
to cross-site-scripting attacks, dubbed XST for
"Cross-Site-Tracing", when used in conjunction with
various weaknesses in browsers.
An attacker may use this flaw to trick your
legitimate web users to give him their
credentials.
Solution: Disable these methods.
If you are using Apache, add the following lines for each virtual
host in your configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
If you are using Microsoft IIS, use the URLScan tool to deny
HTTP TRACE
requests or to permit only the methods needed to meet site
requirements
ipp (631/tcp) Medium
and policy.
If you are using Sun ONE Web Server releases 6.0 SP2 and later,
add the
following to the default object section in obj.conf:
<Client method="TRACE">
AuthTrans fn="set-variable"
remove-headers="transfer-encoding"
set-headers="content-length: -1"
error="501"
</Client>
If you are using Sun ONE Web Server releases 6.0 SP2 or
below, compile
the NSAPI plugin located at:
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%
2F50603
81
Your webserver supports the TRACE and/or TRACK methods.
TRACE and TRACK
are HTTP methods which are used to debug web server
connections.
It has been shown that servers supporting this method are subject
to cross-site-scripting attacks, dubbed XST for
"Cross-Site-Tracing", when used in conjunction with
various weaknesses in browsers.
An attacker may use this flaw to trick your
legitimate web users to give him their
credentials.
Solution: Disable these methods.
If you are using Apache, add the following lines for each virtual
host in your configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
If you are using Microsoft IIS, use the URLScan tool to deny
HTTP TRACE
requests or to permit only the methods needed to meet site
requirements
http (80/tcp) Medium
and policy.
If you are using Sun ONE Web Server releases 6.0 SP2 and later,
add the
following to the default object section in obj.conf:
<Client method="TRACE">
AuthTrans fn="set-variable"
remove-headers="transfer-encoding"
set-headers="content-length: -1"
error="501"
</Client>
If you are using Sun ONE Web Server releases 6.0 SP2 or
below, compile
the NSAPI plugin located at:
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%
2F50603
82
The remote host is a NIS server. NIS is used to share password
files among
the hosts of a given network, which must not be intercepted by
an attacker.
unknown
(904/udp)
Usually, the first step of their attack is to determine whether they
are
attacking a NIS server, which make the host a more valuable
target.
Medium
Since we could determine that the remote host is a NIS server,
they can
determine too, which is not a good thing.
Solution : filter incoming TCP and UDP traffic to prevent them
from connecting
to the portmapper and to the NIS server.
Risk factor : Low
CVE : CAN-1999-0620
Default files, such as documentation, default Servlets and JSPs
were found on
the Apache Tomcat servlet/JSP container.
Solution: Remove default files, example JSPs and Servlets from
the Tomcat
Servlet/JSP container.
https
(443/tcp)
Medium
These files should be removed as they may help an attacker to
guess the
exact version of Apache Tomcat which is running on this host
and may provide
other useful information.
The following default files were found :
/tomcat-docs/index.html
Risk factor : Low
83
Default files, such as documentation, default Servlets and JSPs
were found on
the Apache Tomcat servlet/JSP container.
Solution: Remove default files, example JSPs and Servlets from
the Tomcat
Servlet/JSP container.
http (80/tcp) Medium
These files should be removed as they may help an attacker to
guess the
exact version of Apache Tomcat which is running on this host
and may provide
other useful information.
The following default files were found :
/tomcat-docs/index.html
Risk factor : Low
Default files, such as documentation, default Servlets and JSPs
were found on
the Apache Tomcat servlet/JSP container.
Solution: Remove default files, example JSPs and Servlets from
the Tomcat
Servlet/JSP container.
ipp (631/tcp) Medium
These files should be removed as they may help an attacker to
guess the
exact version of Apache Tomcat which is running on this host
and may provide
other useful information.
The following default files were found :
/tomcat-docs/index.html
Risk factor : Low
84
The statd RPC service is running. This service has a long history
of
security holes, so you should really know what you are doing if
you decide
to let it run.
unknown
Medium
(32778/udp)
*** No security hole regarding this program have been tested, so
*** this might be a false positive.
netbios-ns
(137/udp)
Solution : We suggest that you disable this service.
Risk factor : High
CVE : CVE-1999-0018, CVE-1999-0019, CVE-1999-0493
BID : 127, 450, 6831, 11785
The following 3 NetBIOS names have been gathered :
NW65-FS1-W = This is the computer name registered for
workstation services by a WINS client.
NW65-FS1-W = Computer name
WORKGROUP = Workgroup / Domain name (part of the
Browser elections)
The remote host has the following MAC address on its adapter :
Medium
00:0c:29:d7:6c:c6
If you do not want to allow everyone to find the NetBios name
of your computer, you should filter incoming traffic to this port.
Risk factor : Medium
CVE : CAN-1999-0621
85
Your webserver supports the TRACE and/or TRACK methods.
TRACE and TRACK
are HTTP methods which are used to debug web server
connections.
It has been shown that servers supporting this method are subject
to cross-site-scripting attacks, dubbed XST for
"Cross-Site-Tracing", when used in conjunction with
various weaknesses in browsers.
An attacker may use this flaw to trick your
legitimate web users to give him their
credentials.
Solution: Disable these methods.
If you are using Apache, add the following lines for each virtual
host in your configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
https
(443/tcp)
If you are using Microsoft IIS, use the URLScan tool to deny
HTTP TRACE
requests or to permit only the methods needed to meet site
requirements
Medium
and policy.
If you are using Sun ONE Web Server releases 6.0 SP2 and later,
add the
following to the default object section in obj.conf:
<Client method="TRACE">
AuthTrans fn="set-variable"
remove-headers="transfer-encoding"
set-headers="content-length: -1"
error="501"
</Client>
If you are using Sun ONE Web Server releases 6.0 SP2 or
below, compile
the NSAPI plugin located at:
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%
2F50603
86
Your webserver supports the TRACE and/or TRACK methods.
TRACE and TRACK
are HTTP methods which are used to debug web server
connections.
It has been shown that servers supporting this method are subject
to cross-site-scripting attacks, dubbed XST for
"Cross-Site-Tracing", when used in conjunction with
various weaknesses in browsers.
An attacker may use this flaw to trick your
legitimate web users to give him their
credentials.
Solution: Disable these methods.
If you are using Apache, add the following lines for each virtual
host in your configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
unknown
(2211/tcp)
If you are using Microsoft IIS, use the URLScan tool to deny
HTTP TRACE
requests or to permit only the methods needed to meet site
requirements
Medium
and policy.
If you are using Sun ONE Web Server releases 6.0 SP2 and later,
add the
following to the default object section in obj.conf:
<Client method="TRACE">
AuthTrans fn="set-variable"
remove-headers="transfer-encoding"
set-headers="content-length: -1"
error="501"
</Client>
If you are using Sun ONE Web Server releases 6.0 SP2 or
below, compile
the NSAPI plugin located at:
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%
2F50603
87
It was possible to obtain the list of network interfaces of the
remote host via SNMP :
. AMD PCNTNW
snmp
(161/udp)
ldap
(389/tcp)
Medium
An attacker may use this information to gain more knowledge
about
the target host.
Solution : disable the SNMP service on the remote host if you do
not
use it, or filter incoming UDP packets going to this port
Risk factor : Low
Improperly configured LDAP servers will allow the directory
BASE
to be set to NULL. This allows information to be
culled without any prior knowledge of the directory
structure. Coupled with a NULL BIND, an anonymous
Medium
user can query your LDAP server using a tool such
as 'LdapMiner'
Solution: Disable NULL BASE queries on your LDAP server
Risk factor : Medium
The nlockmgr RPC service is running.
If you do not use this service, then disable it as it may become a
unknown
security
Medium
(32779/udp)
threat in the future, if a vulnerability is discovered.
Risk factor : Low
CVE : CVE-2000-0508
BID : 1372
88
The server's directory base is set to NULL. This allows
information to be
enumerated without any prior knowledge of the directory
struture.
ldap
(389/tcp)
The following information was pulled from the server via a
LDAP request:
LDAP Server - NW65-FS1,o=novell0
M0
extensionInfo1
DE#2.16.840.1.113719.1.142.100.1#2.16.840.1.113719.1.142.10
0.2#lburp
DE#2.16.840.1.113719.1.142.100.4#2.16.840.1.113719.1.142.10
0.5#lburp
DE#2.16.840.1.113719.1.142.100.6#2.16.840.1.113719.1.142.10
0.7#lburp
CE#2.16.840.1.113719.1.27.100.1#2.16.840.1.113719.1.27.100.
2#ldapxs
CE#2.16.840.1.113719.1.27.100.3#2.16.840.1.113719.1.27.100.
4#ldapxs
CE#2.16.840.1.113719.1.27.100.5#2.16.840.1.113719.1.27.100.
6#ldapxs
CE#2.16.840.1.113719.1.27.100.7#2.16.840.1.113719.1.27.100.
8#ldapxs
EE#2.16.840.1.113719.1.27.100.11#2.16.840.1.113719.1.27.100
.12#ldapxs
EE#2.16.840.1.113719.1.27.100.13#2.16.840.1.113719.1.27.100
.14#ldapxs
EE#2.16.840.1.113719.1.27.100.15#2.16.840.1.113719.1.27.100
.16#ldapxs
EE#2.16.840.1.113719.1.27.100.17#2.16.840.1.113719.1.27.100
.18#ldapxs
EE#2.16.840.1.113719.1.27.100.19#2.16.840.1.113719.1.27.100
.20#ldapxs
EE#2.16.840.1.113719.1.27.100.21#2.16.840.1.113719.1.27.100
.22#ldapxs
EE#2.16.840.1.113719.1.27.100.23#2.16.840.1.113719.1.27.100
.24#ldapxs
Medium EE#2.16.840.1.113719.1.27.100.25#2.16.840.1.113719.1.27.100
.26#ldapxs
EE#2.16.840.1.113719.1.27.100.27#2.16.840.1.113719.1.27.100
.28#ldapxs
EE#2.16.840.1.113719.1.27.100.29#2.16.840.1.113719.1.27.100
.30#ldapxs
EE#2.16.840.1.113719.1.27.100.31#2.16.840.1.113719.1.27.100
89
Server Name: NW65-FS1
NDS Tree Name: NW65_TREE
ncp (524/tcp) Medium NDS Users: ADMIN, EGUIDEPUBLICUSER1795,
LDAPUSER, MINIME, NFAUUSER, USER1, USER2,
USER3, USER321
Improperly configured LDAP servers will allow any user to
connect to the
server and query for information.
Solution: Disable NULL BIND on your LDAP server
ldap
(389/tcp)
In addition, the LDAP bind function in Exchange 5.5 has a
buffer overflow
that allows a user to conduct a denial of service or execute
commands in all
versions prior to Exchange server SP2. Coupled with a NULL
Medium BIND, an
anonymous user can mount a remote attack against your server.
Note: no test was done to see what version of Exchange server is
running,
nor attempt to verify the service pack.
Solution: see
http://www.microsoft.com/technet/security/bulletin/ms99009.mspx
Risk factor: Medium
CVE : CVE-1999-0385
BID : 503
90
This web server leaks a private IP address through its HTTP
headers : /10.10.10.6
This may expose internal IP addresses that are usually hidden or
masked
behind a Network Address Translation (NAT) Firewall or proxy
server.
unknown
(8009/tcp)
Medium There is a known issue with IIS 4.0 doing this in its default
configuration.
See
http://support.microsoft.com/support/kb/articles/Q218/1/80.ASP
See the Bugtraq reference for a full discussion.
general/udp
Info
hosts2-ns
(81/tcp)
Info
Risk factor : Low
CVE : CAN-2000-0649
BID : 1499
For your information, here is the traceroute to 10.10.10.6 :
10.10.10.82
10.10.10.6
A web server is running on this port
The RPC portmapper is running on this port.
sunrpc
(111/tcp)
Info
An attacker may use it to enumerate your list
of RPC services. We recommend you filter traffic
going to this port.
Risk factor : Low
CVE : CAN-1999-0632, CVE-1999-0189
BID : 205
https
(443/tcp)
https
(443/tcp)
ici (2200/tcp)
Info
A SSLv3 server answered on this port
Info
A web server is running on this port through SSL
Info
A SSLv3 server answered on this port
91
snmp
(161/udp)
unknown
(32779/udp)
rsync
(873/tcp)
unknown
(32778/udp)
ici (2200/tcp)
ideafarm-chat
(902/udp)
Info
Info
Info
Using SNMP, we could determine that the remote operating
system is :
Novell NetWare 5.70.03 January 20, 2005
null
RPC program #100021 version 1 'nlockmgr' is running on this
port
RPC program #100021 version 2 'nlockmgr' is running on this
port
RPC program #100021 version 3 'nlockmgr' is running on this
port
RPC program #100021 version 4 'nlockmgr' is running on this
port
An unknown service is running on this port.
It is usually reserved for Rsyncd
Info
RPC program #100024 version 1 'status' is running on this port
Info
A web server is running on this port through SSL
Info
nfs
(2049/udp)
Info
ntp (123/udp)
Info
The ypbind RPC service is running. If you do not use this
service, then
disable it as it may become a security threat in the future, if a
vulnerability
is discovered.
Risk factor : Low
CVE : CVE-1999-0312
BID : 52
RPC program #100003 version 2 'nfs' (nfsprog) is running on
this port
RPC program #100003 version 3 'nfs' (nfsprog) is running on
this port
A NTP (Network Time Protocol) server is listening on this port.
Risk factor : Low
unknown
(8009/tcp)
http-alt
(8008/tcp)
Info
A SSLv3 server answered on this port
Info
A web server is running on this port
92
search-agent
(1234/udp)
Info
ftp (21/tcp)
Info
RPC program #100005 version 1 'mountd' (mount showmount)
is running on this port
RPC program #100005 version 2 'mountd' (mount showmount)
is running on this port
RPC program #100005 version 3 'mountd' (mount showmount)
is running on this port
Remote FTP server banner :
220 Service Ready for new User
netbios-ssn
(139/tcp)
Info
An SMB server is running on this port
ftp (21/tcp)
Info
Remote FTP server banner :
220 Service Ready for new User
unknown
(2036/tcp)
Info
A SSLv2 server answered on this port
ftp (21/tcp)
Info
netbios-ssn
(139/tcp)
Info
netbios-ssn
(139/tcp)
Info
netbios-ssn
(139/tcp)
Info
general/tcp
Info
An FTP server is running on this port.
Here is its banner :
220 Service Ready for new User
- NULL sessions are enabled on the remote host
CVE : CAN-1999-0504, CAN-1999-0506, CVE-2000-0222,
CAN-1999-0505, CAN-2002-1117
BID : 494, 990, 11199
The remote native lan manager is : NetWare 6.5
The remote Operating System is : NetWare 6.5
The remote SMB Domain Name is : WORKGROUP
The remote registry can be accessed remotely using the login /
password
combination used for the SMB tests.
The remote host is running Novell Netware 5.7
The domain SID can be obtained remotely. Its value is :
0-0
netbios-ssn
(139/tcp)
Info
An attacker can use it to obtain the list of the local users of this
host
Solution : filter the ports 137 to 139 and 445
Risk factor : Low
CVE : CVE-2000-1200
BID : 959
93
The host Security Identifier (SID) can be obtained remotely. Its
value is :
0-0
netbios-ssn
(139/tcp)
Info
An attacker can use it to obtain the list of the local users of this
host
Solution : filter the ports 137-139 and 445
Risk factor : Low
CVE : CVE-2000-1200
BID : 959
The following CGI have been discovered :
Syntax : cginame (arguments [default value])
ici (2200/tcp)
unknown
(961/udp)
Info
Info
/welcome/LoginPage (UserContext [cn=admin,o=novell]
Password [] ProviderPort [636] strUseSSL [] InitialContext
[o=novell] LoginImage [LoginImage] Login [Login] )
RPC program #100004 version 1 'ypserv' (ypprog) is running on
this port
94
ici (2200/tcp)
Info
Here is the SSLv3 server certificate:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
02:1c:05:62:e5:5d:4c:8f:96:89:37:a6:11:7c:1a:b3:b9:0a:6c:6e:14
:43:a2:a8:92:12:95:b1:ae:c9:02:01:12
Signature Algorithm: sha1WithRSAEncryption
Issuer: OU=Organizational CA, O=NW65_TREE
Validity
Not Before: Aug 5 02:50:35 2004 GMT
Not After : Aug 5 02:50:35 2006 GMT
Subject: CN=NW65-FS1.THOMASERICKSON.COM,
O=.NW65_TREE.
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (2048 bit)
Modulus (2048 bit):
00:c3:e4:cc:35:17:a8:3d:4b:93:59:9d:c4:ed:b2:
56:76:71:e7:ed:3a:e4:1f:90:8c:74:37:d6:68:d0:
0c:15:b7:c2:03:0a:7a:a2:21:0b:fa:6a:ee:94:44:
fe:a8:7c:7c:44:0d:1c:5f:a4:93:4a:4a:70:fb:64:
65:da:45:d5:49:50:11:79:77:c0:7b:9b:c4:c4:42:
a3:8e:f1:07:56:db:ac:bf:e9:48:b1:6d:4e:87:bd:
93:1f:51:85:52:b5:fd:35:97:ff:7a:bf:7d:5f:ee:
3f:f9:5a:ae:64:5e:d2:86:59:d4:46:ed:94:45:7f:
27:ba:a2:5f:51:bc:20:df:45:bb:fa:cc:4d:9b:7a:
c9:fb:34:f1:79:c2:ac:65:aa:15:23:fa:bc:2c:5d:
36:a9:0a:a3:f8:f7:50:1b:57:50:40:a0:f9:3a:d8:
75:4f:e1:e6:2e:82:71:ff:29:cc:e4:5a:d1:ff:aa:
2c:59:22:42:dc:6f:8b:52:aa:29:74:2f:bf:80:c2:
46:cb:00:bb:62:20:d6:0a:42:3a:91:a6:60:4d:0e:
c0:30:9f:63:15:e4:2d:c4:38:5a:4b:e2:9b:d1:bf:
bd:95:14:bc:f5:c4:22:49:a3:b5:b1:11:63:81:53:
12:e3:b4:35:96:4f:ec:8e:0b:36:5f:ba:32:1f:14:
19:5d
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
11:8A:C0:3E:00:48:52:76:F1:6B:DC:75:2A:80:32:0C:96:26:B1:
1F
X509v3 Authority Key Identifier:
keyid:95:2D:72:53:4C:78:AA:10:53:9A:81:2A:89:EB:CC:71:30
:1C:05:FE
X509v3 Subject Alternative Name:
95
Here is the SSLv2 server certificate:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
02:1c:05:62:e5:5d:4c:8f:96:89:37:a6:11:7c:1a:b3:b9:0a:6c:6e:14
:43:a2:a8:92:12:95:b1:ae:c9:02:01:12
Signature Algorithm: sha1WithRSAEncryption
Issuer: OU=Organizational CA, O=NW65_TREE
Validity
Not Before: Aug 5 02:50:35 2004 GMT
Not After : Aug 5 02:50:35 2006 GMT
Subject: CN=NW65-FS1.THOMASERICKSON.COM,
O=.NW65_TREE.
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (2048 bit)
Modulus (2048 bit):
00:c3:e4:cc:35:17:a8:3d:4b:93:59:9d:c4:ed:b2:
56:76:71:e7:ed:3a:e4:1f:90:8c:74:37:d6:68:d0:
0c:15:b7:c2:03:0a:7a:a2:21:0b:fa:6a:ee:94:44:
fe:a8:7c:7c:44:0d:1c:5f:a4:93:4a:4a:70:fb:64:
65:da:45:d5:49:50:11:79:77:c0:7b:9b:c4:c4:42:
a3:8e:f1:07:56:db:ac:bf:e9:48:b1:6d:4e:87:bd:
93:1f:51:85:52:b5:fd:35:97:ff:7a:bf:7d:5f:ee:
3f:f9:5a:ae:64:5e:d2:86:59:d4:46:ed:94:45:7f:
27:ba:a2:5f:51:bc:20:df:45:bb:fa:cc:4d:9b:7a:
c9:fb:34:f1:79:c2:ac:65:aa:15:23:fa:bc:2c:5d:
36:a9:0a:a3:f8:f7:50:1b:57:50:40:a0:f9:3a:d8:
75:4f:e1:e6:2e:82:71:ff:29:cc:e4:5a:d1:ff:aa:
2c:59:22:42:dc:6f:8b:52:aa:29:74:2f:bf:80:c2:
46:cb:00:bb:62:20:d6:0a:42:3a:91:a6:60:4d:0e:
c0:30:9f:63:15:e4:2d:c4:38:5a:4b:e2:9b:d1:bf:
bd:95:14:bc:f5:c4:22:49:a3:b5:b1:11:63:81:53:
12:e3:b4:35:96:4f:ec:8e:0b:36:5f:ba:32:1f:14:
19:5d
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
11:8A:C0:3E:00:48:52:76:F1:6B:DC:75:2A:80:32:0C:96:26:B1:
1F
X509v3 Authority Key Identifier:
keyid:95:2D:72:53:4C:78:AA:10:53:9A:81:2A:89:EB:CC:71:30
:1C:05:FE
X509v3 Subject Alternative Name:
96
Here is the SSLv2 server certificate:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
02:1c:05:62:e5:5d:4c:8f:96:89:37:a6:11:7c:1a:b3:b9:0a:6c:6e:14
:43:a2:a8:92:12:95:b1:ae:c9:02:01:12
Signature Algorithm: sha1WithRSAEncryption
Issuer: OU=Organizational CA, O=NW65_TREE
Validity
Not Before: Aug 5 02:50:35 2004 GMT
Not After : Aug 5 02:50:35 2006 GMT
Subject: CN=NW65-FS1.THOMASERICKSON.COM,
O=.NW65_TREE.
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (2048 bit)
Modulus (2048 bit):
00:c3:e4:cc:35:17:a8:3d:4b:93:59:9d:c4:ed:b2:
56:76:71:e7:ed:3a:e4:1f:90:8c:74:37:d6:68:d0:
0c:15:b7:c2:03:0a:7a:a2:21:0b:fa:6a:ee:94:44:
fe:a8:7c:7c:44:0d:1c:5f:a4:93:4a:4a:70:fb:64:
65:da:45:d5:49:50:11:79:77:c0:7b:9b:c4:c4:42:
a3:8e:f1:07:56:db:ac:bf:e9:48:b1:6d:4e:87:bd:
93:1f:51:85:52:b5:fd:35:97:ff:7a:bf:7d:5f:ee:
3f:f9:5a:ae:64:5e:d2:86:59:d4:46:ed:94:45:7f:
27:ba:a2:5f:51:bc:20:df:45:bb:fa:cc:4d:9b:7a:
c9:fb:34:f1:79:c2:ac:65:aa:15:23:fa:bc:2c:5d:
36:a9:0a:a3:f8:f7:50:1b:57:50:40:a0:f9:3a:d8:
75:4f:e1:e6:2e:82:71:ff:29:cc:e4:5a:d1:ff:aa:
2c:59:22:42:dc:6f:8b:52:aa:29:74:2f:bf:80:c2:
46:cb:00:bb:62:20:d6:0a:42:3a:91:a6:60:4d:0e:
c0:30:9f:63:15:e4:2d:c4:38:5a:4b:e2:9b:d1:bf:
bd:95:14:bc:f5:c4:22:49:a3:b5:b1:11:63:81:53:
12:e3:b4:35:96:4f:ec:8e:0b:36:5f:ba:32:1f:14:
19:5d
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
11:8A:C0:3E:00:48:52:76:F1:6B:DC:75:2A:80:32:0C:96:26:B1:
1F
X509v3 Authority Key Identifier:
keyid:95:2D:72:53:4C:78:AA:10:53:9A:81:2A:89:EB:CC:71:30
:1C:05:FE
X509v3 Subject Alternative Name:
97
https
(443/tcp)
Info
Here is the SSLv3 server certificate:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
02:1c:05:62:e5:5d:4c:8f:96:89:37:a6:11:7c:1a:b3:b9:0a:6c:6e:14
:43:a2:a8:92:12:95:b1:ae:c9:02:01:12
Signature Algorithm: sha1WithRSAEncryption
Issuer: OU=Organizational CA, O=NW65_TREE
Validity
Not Before: Aug 5 02:50:35 2004 GMT
Not After : Aug 5 02:50:35 2006 GMT
Subject: CN=NW65-FS1.THOMASERICKSON.COM,
O=.NW65_TREE.
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (2048 bit)
Modulus (2048 bit):
00:c3:e4:cc:35:17:a8:3d:4b:93:59:9d:c4:ed:b2:
56:76:71:e7:ed:3a:e4:1f:90:8c:74:37:d6:68:d0:
0c:15:b7:c2:03:0a:7a:a2:21:0b:fa:6a:ee:94:44:
fe:a8:7c:7c:44:0d:1c:5f:a4:93:4a:4a:70:fb:64:
65:da:45:d5:49:50:11:79:77:c0:7b:9b:c4:c4:42:
a3:8e:f1:07:56:db:ac:bf:e9:48:b1:6d:4e:87:bd:
93:1f:51:85:52:b5:fd:35:97:ff:7a:bf:7d:5f:ee:
3f:f9:5a:ae:64:5e:d2:86:59:d4:46:ed:94:45:7f:
27:ba:a2:5f:51:bc:20:df:45:bb:fa:cc:4d:9b:7a:
c9:fb:34:f1:79:c2:ac:65:aa:15:23:fa:bc:2c:5d:
36:a9:0a:a3:f8:f7:50:1b:57:50:40:a0:f9:3a:d8:
75:4f:e1:e6:2e:82:71:ff:29:cc:e4:5a:d1:ff:aa:
2c:59:22:42:dc:6f:8b:52:aa:29:74:2f:bf:80:c2:
46:cb:00:bb:62:20:d6:0a:42:3a:91:a6:60:4d:0e:
c0:30:9f:63:15:e4:2d:c4:38:5a:4b:e2:9b:d1:bf:
bd:95:14:bc:f5:c4:22:49:a3:b5:b1:11:63:81:53:
12:e3:b4:35:96:4f:ec:8e:0b:36:5f:ba:32:1f:14:
19:5d
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
11:8A:C0:3E:00:48:52:76:F1:6B:DC:75:2A:80:32:0C:96:26:B1:
1F
X509v3 Authority Key Identifier:
keyid:95:2D:72:53:4C:78:AA:10:53:9A:81:2A:89:EB:CC:71:30
:1C:05:FE
X509v3 Subject Alternative Name:
98
unknown
(8009/tcp)
Info
Here is the SSLv3 server certificate:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
02:1c:05:62:e5:5d:4c:8f:96:89:37:a6:11:7c:1a:b3:b9:0a:6c:6e:14
:43:a2:a8:92:12:95:b1:ae:c9:02:01:0e
Signature Algorithm: sha1WithRSAEncryption
Issuer: OU=Organizational CA, O=NW65_TREE
Validity
Not Before: Aug 5 02:50:35 2004 GMT
Not After : Aug 5 02:50:35 2006 GMT
Subject: CN=10.10.10.6, O=.NW65_TREE.
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (2048 bit)
Modulus (2048 bit):
00:a3:3e:21:a1:5e:af:c5:fd:66:67:49:97:bb:7c:
14:10:d7:b6:8a:c7:26:9f:b9:9e:0b:0b:69:5e:3b:
32:02:e2:e9:06:bc:93:ba:67:c5:f6:d0:1d:35:5a:
12:da:62:15:7f:1b:da:8e:22:8c:04:08:33:6f:96:
7c:e0:6c:6c:e0:c4:16:61:5d:cd:7f:68:11:96:40:
d2:a9:6b:be:53:39:e3:39:cf:b9:d7:4c:16:a8:52:
52:cc:b1:89:1c:0c:68:2d:4d:e8:6b:08:b8:27:99:
ed:28:33:77:fd:c7:24:a3:9d:e9:ba:31:05:a6:29:
e1:05:6d:0f:61:00:ba:c1:57:dc:9c:fa:29:1f:70:
62:f2:37:b5:55:f6:fb:6e:8a:8a:d6:a2:48:5b:37:
d8:85:df:a4:14:d7:2f:e8:5b:da:9f:f7:bc:39:4a:
f1:ab:c3:92:f7:56:39:0b:e7:90:e3:e2:19:0c:78:
6f:51:17:40:9c:02:92:f1:13:23:5e:c4:1d:de:38:
c7:1b:17:2f:03:7d:ab:45:9f:df:e5:e5:4a:49:3a:
39:51:a8:ef:cc:29:9c:9c:3c:fd:db:a8:65:e7:79:
2a:1c:1a:9a:d7:ab:0e:23:77:23:76:05:c3:3c:be:
25:25:32:db:89:d2:a0:ce:59:e3:ed:4e:cd:b8:ed:
aa:9f
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
13:D9:BA:5A:FA:DA:52:17:2E:86:11:E4:F9:77:AB:D5:DC:A0:
65:4D
X509v3 Authority Key Identifier:
keyid:95:2D:72:53:4C:78:AA:10:53:9A:81:2A:89:EB:CC:71:30
:1C:05:FE
X509v3 Subject Alternative Name:
DirName:/CN=NW65-FS1/O=novell
99
The remote web server type is :
Apache/2.0.52 (NETWARE) mod_jk/1.2.6a PHP/5.0.3
ici (2200/tcp)
Info
Solution : You can set the directive 'ServerTokens Prod' to limit
the information emanating from the server in its response
headers.
The remote web server type is :
Apache/2.0.52 (NETWARE) mod_jk/1.2.6a
ipp (631/tcp)
Info
Solution : You can set the directive 'ServerTokens Prod' to limit
the information emanating from the server in its response
headers.
The remote web server type is :
Apache/2.0.52 (NETWARE) mod_jk/1.2.6a
http (80/tcp)
Info
Solution : You can set the directive 'ServerTokens Prod' to limit
the information emanating from the server in its response
headers.
The remote web server type is :
Apache/2.0.52 (NETWARE) mod_jk/1.2.6a PHP/5.0.3
unknown
(2211/tcp)
Info
Solution : You can set the directive 'ServerTokens Prod' to limit
the information emanating from the server in its response
headers.
The remote web server type is :
hosts2-ns
(81/tcp)
Info
NetWare HTTP Stack
100
The remote web server type is :
Apache/2.0.52 (NETWARE) mod_jk/1.2.6a
https
(443/tcp)
Info
Solution : You can set the directive 'ServerTokens Prod' to limit
the information emanating from the server in its response
headers.
The remote web server type is :
http-alt
(8008/tcp)
Info
NetWare HTTP Stack
The remote web server type is :
unknown
(8009/tcp)
unknown
(904/udp)
ideafarmcatch
(903/udp)
ipp (631/tcp)
Info
NetWare HTTP Stack
Info
RPC program #100004 version 2 'ypserv' (ypprog) is running on
this port
Info
RPC program #100009 version 1 'yppasswdd' (yppasswd) is
running on this port
Info
A web server is running on this port
phpMyAdmin 2.6.0-pl2 was detected on the remote host under
the path /phpMyAdmin.
ici (2200/tcp)
ideafarm-chat
(902/udp)
ldaps
(636/tcp)
sunrpc
(111/udp)
http (80/tcp)
Info
phpMyAdmin is a web based MySQL administration tool written
in PHP.
See http://www.phpmyadmin.net/home_page/index.php for more
information.
Info
RPC program #100007 version 2 'ypbind' is running on this port
Info
A SSLv2 server answered on this port
Info
Info
RPC program #100000 version 2 'portmapper' (portmap sunrpc
rpcbind) is running on this port
A web server is running on this port
101
unknown
(32779/tcp)
ideafarmcatch
(903/udp)
Info
Info
afpovertcp
(548/tcp)
Info
unknown
(32778/tcp)
Info
nfs
(2049/tcp)
Info
search-agent
(1234/tcp)
Info
dhcpfailover2
(847/tcp)
unknown
(846/tcp)
netviewdm3
(731/tcp)
Info
Info
Info
RPC program #100021 version 1 'nlockmgr' is running on this
port
RPC program #100021 version 2 'nlockmgr' is running on this
port
RPC program #100021 version 3 'nlockmgr' is running on this
port
RPC program #100021 version 4 'nlockmgr' is running on this
port
The yppasswd RPC service is running. If you do not use this
service, then
disable it as it may become a security threat in the future, if a
vulnerability
is discovered.
Risk factor : Low
This host is running an AppleShare File Services over IP.
Machine type: Novell NetWare 5.70.03
Server name: NW65-FS1
UAMs: Randnum Exchange/2-Way Randnum exchange
AFP Versions: AFPVersion 1.1/AFPVersion 2.0/AFPVersion
2.1/AFP2.2/AFPX03/AFP3.1
RPC program #100024 version 1 'status' is running on this port
RPC program #100003 version 2 'nfs' (nfsprog) is running on
this port
RPC program #100003 version 3 'nfs' (nfsprog) is running on
this port
RPC program #100005 version 1 'mountd' (mount showmount)
is running on this port
RPC program #100005 version 2 'mountd' (mount showmount)
is running on this port
RPC program #100005 version 3 'mountd' (mount showmount)
is running on this port
RPC program #100004 version 2 'ypserv' (ypprog) is running on
this port
RPC program #100009 version 1 'yppasswdd' (yppasswd) is
running on this port
RPC program #100004 version 1 'ypserv' (ypprog) is running on
this port
102
sunrpc
(111/tcp)
unknown
(2211/tcp)
nfs
(2049/tcp)
Info
RPC program #100000 version 2 'portmapper' (portmap sunrpc
rpcbind) is running on this port
Info
A web server is running on this port
Info
You are running a superfluous NFS daemon.
You should consider removing it
CVE : CAN-1999-0554, CAN-1999-0548
unknown
(8009/tcp)
mysql
(3306/tcp)
ldap
(389/tcp)
Info
Info
Info
A web server is running on this port through SSL
An unknown service is running on this port.
It is usually reserved for MySQL
An unknown server is running on this port.
If you know what it is, please send this banner to the Nessus
team:
00: 30 24 02 01 0$..
Appendix C Post Hardening Comparison of OES NetWare and
OES Linux
Summary of scanned hosts
Host
Holes
10.10.10.15 (Linux) 0
10.10.10.6 (NW)
0
Warnings
2
2
Open ports
4
4
State
Finished
Finished
Appendix D Nessus Assessment -- Post hardening of OES Linux
10.10.10.15 (OES Linux)
Service
Severity
ntp (123/udp)
Info Port is open
svrloc (427/tcp)
Info Port is open
Description
103
ncp (524/tcp)
ssh (22/tcp)
Info
Info
Port is open
Port is open
The remote host does not discard TCP SYN packets which
have the FIN flag set.
Depending on the kind of firewall you are using, an
attacker may use this flaw to bypass its rules.
general/tcp
Medium See also :
http://archives.neohapsis.com/archives/bugtraq/200210/0266.html
http://www.kb.cert.org/vuls/id/464113
Solution : Contact your vendor for a patch
Risk factor : Medium
BID : 7487
The remote SSH daemon supports connections made
using the version 1.33 and/or 1.5 of the SSH protocol.
These protocols are not completely cryptographically
safe so they should not be used.
ssh (22/tcp)
Medium
Solution :
If you use OpenSSH, set the option 'Protocol' to '2'
If you use SSH.com's set the option 'Ssh1Compatibility' to
'no'
Risk factor : Low
104
It is possible to determine a lot of information about the
remote host
by querying the NTP (Network Time Protocol) variables these include
OS descriptor, and time settings.
It was possible to gather the following information from the
remote NTP host :
version='ntpd [email protected] Wed Jan 26 17:44:09 UTC
2005 (1)',
processor='i686', system='Linux/2.6.5-7.147-default', leap=0,
stratum=11, precision=-19, rootdelay=0.000,
rootdispersion=44.776,
ntp (123/udp)
Info
peer=29180, refid=127.127.1.0,
reftime=0xc625406f.b379c842, poll=10,
clock=0xc625419f.ba95421c, state=4, offset=0.000,
frequency=0.000,
error=0.002, jitter=0.000, stability=0.000
Quickfix: Set NTP to restrict default access to ignore all info
packets:
restrict default ignore
Risk factor : Low
Remote SSH version : SSH-1.99-OpenSSH_3.8p1
ssh (22/tcp)
Info
Remote SSH supported authentication : publickey,keyboardinteractive
ssh (22/tcp)
Info
general/udp
Info
An ssh server is running on this port
For your information, here is the traceroute to 10.10.10.15 :
10.10.10.82
10.10.10.15
105
The remote host answers to an ICMP timestamp request.
This allows an attacker
to know the date which is set on your machine.
general/icmp
Info
This may help him to defeat all your time based
authentication protocols.
Solution : filter out the ICMP timestamp requests (13), and
the outgoing ICMP
timestamp replies (14).
general/tcp
ssh (22/tcp)
general/tcp
Info
Info
Info
Risk factor : Low
CVE : CAN-1999-0524
The remote host is running Linux Kernel 2.6.5-7.147-default
(i386)
The remote SSH daemon supports the following versions of
the
SSH protocol :
. 1.33
. 1.5
. 1.99
. 2.0
SSHv1 host key fingerprint :
8e:0c:5e:3f:51:81:33:bd:6c:e9:13:4a:e2:00:9d:ff
SSHv2 host key fingerprint :
74:89:cb:61:2d:c6:eb:1c:e3:99:5f:5d:0b:85:a0:35
The remote host is running one of these operating systems :
Linux Kernel 2.6
Linux Kernel 2.4
106
Appendix E Nessus Assessment -- Post hardening of OES
NetWare
10.10.10.6 (OES NetWare)
Service
Severity
unknown
Info Port is open
(6901/tcp)
ncp (524/tcp)
Info Port is open
ntp (123/udp)
Info Port is open
svrloc (427/tcp)
Info Port is open
Description
107
The remote host uses non-random IP IDs, that is, it is
possible to predict the next value of the ip_id field of
the ip packets sent by this host.
An attacker may use this feature to determine traffic patterns
within your network. A few examples (not at all exhaustive)
are:
1. A remote attacker can determine if the remote host sent a
packet
in reply to another request. Specifically, an attacker can use
your
server as an unwilling participant in a blind portscan of
another
network.
general/tcp
Medium
2. A remote attacker can roughly determine server requests at
certain
times of the day. For instance, if the server is sending much
more
traffic after business hours, the server may be a reverse proxy
or
other remote access device. An attacker can use this
information to
concentrate his/her efforts on the more critical machines.
3. A remote attacker can roughly estimate the number of
requests that
a web server processes over a period of time.
ncp (524/tcp)
ntp (123/udp)
Solution : Contact your vendor for a patch
Risk factor : Low
Server Name: NW65-FS1
NDS Tree Name: NW65_TREE
Medium NDS Users: ADMIN, EGUIDEPUBLICUSER1795,
LDAPUSER, MINIME, NFAUUSER, USER1, USER2,
USER3, USER321
Info
A NTP (Network Time Protocol) server is listening on this
port.
Risk factor : Low
108
general/udp
Info
general/tcp
Info
For your information, here is the traceroute to 10.10.10.6 :
10.10.10.82
10.10.10.6
Nessus was not able to reliably identify the remote operating
system. It might be:
Novell Netware 6.0
The fingerprint differs from these known signatures on 2
points.
If you know what operating system this host is running,
please send this signature to
[email protected] :
:1:1:0:128:0:128:1:0:128:1:0:128:1:8:128:0:1:1:2:1:1:1:1:1:1
28:6143:MWNSNN:0:N:N
109