<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tcpip vulnerability /SSRT4696 in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-vulnerability-ssrt4696/m-p/4945949#M50922</link>
    <description>You probably got flagged on those because you are not running the SSH on the system.  We get dinged on them also.  Those are the default ports for FTP (21) and TELNET (23).  &lt;BR /&gt;&lt;BR /&gt;We have systems that do not have SSH compatibility or software packages that communicate that don't work with SSH.  So on our systems we have to present a "security exception" to run those 2 images.&lt;BR /&gt;&lt;BR /&gt;I would suggest contacting Qualsys and ask for exact information on what they are testing.  In some cases they perform additional tests that check underlying vulnerabilities on those ports.&lt;BR /&gt;&lt;BR /&gt;As an example.  On port 21 after you do an FTP to a VMS machine and type CHMOD.  Nothing should happen because VMS does not recognize the command.  However some of the Vulnerability scans determine that this is a security issue because the CHMOD did not return what they expected to see.</description>
    <pubDate>Fri, 09 Dec 2005 10:50:29 GMT</pubDate>
    <dc:creator>Peter Zeiszler</dc:creator>
    <dc:date>2005-12-09T10:50:29Z</dc:date>
    <item>
      <title>Tcpip vulnerability /SSRT4696</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-vulnerability-ssrt4696/m-p/4945948#M50921</link>
      <description>Hi there,,&lt;BR /&gt;My company recently made a contract with Qualys Inc. to test our systems. When test where run against our Vms-cluster, we got notified about possible vulnerability on port 21 and 23. I can't find any papers that are about this problem specially for VMS. Is anyone familiar with this and should I worry about this.&lt;BR /&gt;Our cluster is behind firewalls and we have front end machines behind the firewalls that communicate with our cluster, witch is only running Oracle database. OpenVMS 7.3-2 and Oracle 9.2.0.5&lt;BR /&gt;&lt;BR /&gt;Thanks in advance...&lt;BR /&gt;Kjartan</description>
      <pubDate>Fri, 09 Dec 2005 09:53:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-vulnerability-ssrt4696/m-p/4945948#M50921</guid>
      <dc:creator>Kjartan Konradsson</dc:creator>
      <dc:date>2005-12-09T09:53:45Z</dc:date>
    </item>
    <item>
      <title>Re: Tcpip vulnerability /SSRT4696</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-vulnerability-ssrt4696/m-p/4945949#M50922</link>
      <description>You probably got flagged on those because you are not running the SSH on the system.  We get dinged on them also.  Those are the default ports for FTP (21) and TELNET (23).  &lt;BR /&gt;&lt;BR /&gt;We have systems that do not have SSH compatibility or software packages that communicate that don't work with SSH.  So on our systems we have to present a "security exception" to run those 2 images.&lt;BR /&gt;&lt;BR /&gt;I would suggest contacting Qualsys and ask for exact information on what they are testing.  In some cases they perform additional tests that check underlying vulnerabilities on those ports.&lt;BR /&gt;&lt;BR /&gt;As an example.  On port 21 after you do an FTP to a VMS machine and type CHMOD.  Nothing should happen because VMS does not recognize the command.  However some of the Vulnerability scans determine that this is a security issue because the CHMOD did not return what they expected to see.</description>
      <pubDate>Fri, 09 Dec 2005 10:50:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-vulnerability-ssrt4696/m-p/4945949#M50922</guid>
      <dc:creator>Peter Zeiszler</dc:creator>
      <dc:date>2005-12-09T10:50:29Z</dc:date>
    </item>
    <item>
      <title>Re: Tcpip vulnerability /SSRT4696</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-vulnerability-ssrt4696/m-p/4945950#M50923</link>
      <description>Kjartan,&lt;BR /&gt;&lt;BR /&gt;As noted Ports 21 and 23 are telnet and ftp respectively.&lt;BR /&gt;&lt;BR /&gt;There are two sets of issues with these ports:&lt;BR /&gt;&lt;BR /&gt;- the basic protocols expose passwords for compromise by eavesdropping. For this reason, many security checklists flag the use of these protocols. In the case of ftp, the issue reflects non-anonymous ftp (in the case of anonymous ftp, password exposure is generally a non-issue).&lt;BR /&gt;&lt;BR /&gt;- the second issue is whether the servers for these protocols have implementation defects which can compromise the underlying system. This is a concern, but only if the "detection" is valid. It is not unusual for security scans to check for the common Windows and Unix/Linus behaviors, and give false indications when OpenVMS is encountered.&lt;BR /&gt;&lt;BR /&gt;Get the details of the reported problems, and then determine if they are correct reports. Regardless of whether they are correct, or not, be sure to write a memorandum to your management about the results of your post-scan review.&lt;BR /&gt;&lt;BR /&gt;- Bob Gezelter, &lt;A href="http://www.rlgsc.com" target="_blank"&gt;http://www.rlgsc.com&lt;/A&gt;&lt;BR /&gt;  Contributing Editor, Computer Security Handbook, Internet Security(3rd &amp;amp; 4th Editions), &lt;A href="http://www.computersecurityhandbook.com" target="_blank"&gt;http://www.computersecurityhandbook.com&lt;/A&gt;&lt;BR /&gt;  Contributor, Handbook of Information Security&lt;BR /&gt;</description>
      <pubDate>Fri, 09 Dec 2005 11:07:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-vulnerability-ssrt4696/m-p/4945950#M50923</guid>
      <dc:creator>Robert Gezelter</dc:creator>
      <dc:date>2005-12-09T11:07:33Z</dc:date>
    </item>
    <item>
      <title>Re: Tcpip vulnerability /SSRT4696</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-vulnerability-ssrt4696/m-p/4945951#M50924</link>
      <description>Kjartan,&lt;BR /&gt;&lt;BR /&gt;As noted Ports 21 and 23 are telnet and ftp respectively.&lt;BR /&gt;&lt;BR /&gt;There are two sets of issues with these ports:&lt;BR /&gt;&lt;BR /&gt;- the basic protocols expose passwords for compromise by eavesdropping. For this reason, many security checklists flag the use of these protocols. In the case of ftp, the issue reflects non-anonymous ftp (in the case of anonymous ftp, password exposure is generally a non-issue).&lt;BR /&gt;&lt;BR /&gt;- the second issue is whether the servers for these protocols have implementation defects which can compromise the underlying system. This is a concern, but only if the "detection" is valid. It is not unusual for security scans to check for the common Windows and Unix/Linux behaviors, and give false indications when OpenVMS is encountered.&lt;BR /&gt;&lt;BR /&gt;Get the details of the reported problems, and then determine if they are correct reports. Regardless of whether they are correct, or not, be sure to write a memorandum to your management about the results of your post-scan review.&lt;BR /&gt;&lt;BR /&gt;- Bob Gezelter, &lt;A href="http://www.rlgsc.com" target="_blank"&gt;http://www.rlgsc.com&lt;/A&gt;&lt;BR /&gt;  Contributing Editor, Computer Security Handbook, Internet Security(3rd &amp;amp; 4th Editions), &lt;A href="http://www.computersecurityhandbook.com" target="_blank"&gt;http://www.computersecurityhandbook.com&lt;/A&gt;&lt;BR /&gt;  Contributor, Handbook of Information Security&lt;BR /&gt;</description>
      <pubDate>Fri, 09 Dec 2005 11:07:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-vulnerability-ssrt4696/m-p/4945951#M50924</guid>
      <dc:creator>Robert Gezelter</dc:creator>
      <dc:date>2005-12-09T11:07:49Z</dc:date>
    </item>
    <item>
      <title>Re: Tcpip vulnerability /SSRT4696</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-vulnerability-ssrt4696/m-p/4945952#M50925</link>
      <description>Note that I see many more attacks on my&lt;BR /&gt;(more exposed) system using SSH than I do&lt;BR /&gt;using Telnet.  And some of the SSH attacks&lt;BR /&gt;run on for thousands of attempts.  The rare&lt;BR /&gt;Telnet attacks are usually quite brief.&lt;BR /&gt;&lt;BR /&gt;The TCPIP FTP server is so different from&lt;BR /&gt;what the usual scripts expect that the FTP&lt;BR /&gt;attacks always fail harmlessly, usually&lt;BR /&gt;leaving only some clutter in the anonymous&lt;BR /&gt;FTP server log and one OPCOM message, like:&lt;BR /&gt;&lt;BR /&gt;%%%%%%%%%%%  OPCOM   9-DEC-2005 07:08:27.48  %%%%%%%%%%%&lt;BR /&gt;Message from user TCPIP$FTP on ALP&lt;BR /&gt;        User Name:      anonymous&lt;BR /&gt;        Source:         84.101.116.32&lt;BR /&gt;        Status:         NOPRIV -- File access violation&lt;BR /&gt;        Object:         SYS$SYSDEVICE:[ANONYMOUS.051209140830p]&lt;BR /&gt;</description>
      <pubDate>Fri, 09 Dec 2005 11:39:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-vulnerability-ssrt4696/m-p/4945952#M50925</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2005-12-09T11:39:44Z</dc:date>
    </item>
    <item>
      <title>Re: Tcpip vulnerability /SSRT4696</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-vulnerability-ssrt4696/m-p/4945953#M50926</link>
      <description>What do they mean by "vulnerability"? If you open ANY system to an outside network, and certainly using TCP/IP, it will allow access to your system, no matter what application protocol (ANY protocol can be mimicked using TELNET, that's the way I test connectivity) and no matter on what port the service is defined.&lt;BR /&gt;&lt;BR /&gt;From my own experience, I can second Steven, at least for anonymous FTP set up to be download only (I don't allow upload on my site) port 23 is pretty safe. "Normal" FTP however can be somewhat troublesome  as will telnet. Does intrusion detection and protection work on FTP as well? If so, you're safer with VMS then any other system - on both ports.&lt;BR /&gt;&lt;BR /&gt;Nevertheless, if your VMS boxes run only Oracle database, what need is there (apart from system and database management) for telnet (port 23)? FTP I could understand, but even that could be limited to the frontend- and backend systems.&lt;BR /&gt;Perhapes these consultants know just aboutr Windows and p;robably some Unixes.</description>
      <pubDate>Fri, 09 Dec 2005 14:50:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-vulnerability-ssrt4696/m-p/4945953#M50926</guid>
      <dc:creator>Willem Grooters</dc:creator>
      <dc:date>2005-12-09T14:50:52Z</dc:date>
    </item>
    <item>
      <title>Re: Tcpip vulnerability /SSRT4696</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-vulnerability-ssrt4696/m-p/4945954#M50927</link>
      <description>Sorry for not having not responding, we had some internet problems here.&lt;BR /&gt;I talked to the Qualys guis, and they could not give me more information. The notice is on HP support web as possible general problem, not specific for VMS. So I will ignore this.&lt;BR /&gt;Thanks for your input..&lt;BR /&gt;&lt;BR /&gt;Kjartan</description>
      <pubDate>Tue, 13 Dec 2005 05:42:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-vulnerability-ssrt4696/m-p/4945954#M50927</guid>
      <dc:creator>Kjartan Konradsson</dc:creator>
      <dc:date>2005-12-13T05:42:47Z</dc:date>
    </item>
    <item>
      <title>Re: Tcpip vulnerability /SSRT4696</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-vulnerability-ssrt4696/m-p/4945955#M50928</link>
      <description>Thanks&lt;BR /&gt;Kjartan&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 13 Dec 2005 10:08:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-vulnerability-ssrt4696/m-p/4945955#M50928</guid>
      <dc:creator>Kjartan Konradsson</dc:creator>
      <dc:date>2005-12-13T10:08:01Z</dc:date>
    </item>
  </channel>
</rss>

