Operating System - OpenVMS
1753878 Members
7487 Online
108809 Solutions
New Discussion юеВ

Re: TCP/IP security patch

 
SOLVED
Go to solution
Volker Halle
Honored Contributor

Re: TCP/IP security patch

Hans,

HP really seems to be listening !

Now there is rev. 2 of the security bulletin c01961959

There are now also patches for TCPIP V5.6 ECO 5.

And the wrong reference to CVE-2009-696 (BIND) has been removed.

Volker.
Ian Miller.
Honored Contributor

Re: TCP/IP security patch

A round of applause for Volker :-)

Someone buy him a beer
____________________
Purely Personal Opinion
Volker Halle
Honored Contributor

Re: TCP/IP security patch

Ian,

hold back on the applause please...

The patches for TCPIP V5.6 ECO 4 and ECO 5 for Alpha and I64 ship TCPIP$NTPTRACE linked 30-MAR-2004 ! Looks like this image has NEVER been relinked since TCPIP V5.6 SSB ?!

The patches for TCPIP V5.5 ECO 3 do NOT ship TCPIP$NTPTRACE images.

So there still remains the question:

Is TCPIP$NTPTRACE affected by this security problem ? If so, why has it not been relinked. And if NOT, why is it being shipped at all ?

To me, it looks like all the .EXE files from the build directory of NTP have been shipped in this kit and not just the affected images.

And to build and ship the V5.6 ECO 5 images took less than 16 hours, so the previous speculation about 'intensive testing of the patched images delaying the issue of the security fixes', does not seem to have affected this set of fixes.

Volker.
Volker Halle
Honored Contributor

Re: TCP/IP security patch

For both OpenVMS I64 and Alpha, TCPIP$NTPTRACE.EXE has NEVER been re-linked since V5.5 (30-MAR-2004).

This seems to be very unusual, all other NTP images have been relinked for each new SSB version and for each patch.

Maybe the NTP build is broken since V5.5 and missing the re-build of TCPIP$NTPTRACE...

FWIW,

Volker.





John28
New Member

Re: TCP/IP security patch

Does this vulnerability exist for TCPIP V5.4?

Thanks for any info...

John
Hoff
Honored Contributor

Re: TCP/IP security patch

HP does not indicate if this error exists in other releases, so if you need an official answer, call HP.

The safest assumption (and based on reading CVEs and reading the developer discussions of the fix over at the ntp site) is that the error does exist in earlier releases.
John28
New Member

Re: TCP/IP security patch


Hoff,

Many Thanks for the quick answer. Does V5.6 ECO 3 need to be patched or only V5.6 ECO 4 ?

John
Volker Halle
Honored Contributor

Re: TCP/IP security patch

John,

HP did NOT make a patch available for TCPIP V5.6 ECO 3. Whether this mean ECO 3 is not affected, only HP can answer !

Volker.
Hoff
Honored Contributor

Re: TCP/IP security patch

If you're looking for a simple answer?

Sure. That's easy. Be (appropriately!) paranoid.

Until you hear otherwise from an authoritative source (and which is _not_ ITRC) that a version or configuration is explicitly _not_ vulnerable, the assumption is that the software _is_ vulnerable. And if you're even operating with an average level of paranoia, not even then.

This (appropriate!) paranoia irrespective of the platform and software; whether we are discussing OpenVMS or anything else.

The web-facing servers I manage get attacked multiple times a day.

Unfortunately for this whole discussion, the OpenVMS web tools and web-facing software stacks are down-revision, and there are various security issues within the various web-facing and net-facing tools. Which is why do not recommend exposing OpenVMS to the Internet.

In defense of the vendors here, security also often turns into a circus; there's no certainty here, and even current-patch systems can be vulnerable to zero-day attacks, and to targeted attacks and spearfishing. And some of the security uproars are inconsequential for many sites; you have to know how big a target your site is, and how much you're willing to (directly and indirectly) pay to (try to) reduce your exposure to attacks. This security stuff gets FUD'd pretty heavily in the market, and it's easy to end up with an inappropriate degree of paranoia.

And one of the oft-overlooked parts of security is having current archives. And a review for the "low-hanging" security bugs that can exist in most any configuration.
John28
New Member

Re: TCP/IP security patch

Hoff,

Many Thanks for the info esp. on the appropriate "paranoia" level - understand the risk assessment aspect that you mentioned and I'll continue to follow up with on whether versions not mentioned in the bulletin do have the vulnerability. Way too easy to just assume that all is well when a specific version is not directly referenced in a bulletin.

Regards,

John