- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - OpenVMS
- >
- TCP/IP security patch
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-29-2010 09:19 AM
03-29-2010 09:19 AM
Re: TCP/IP security patch
The safest assumption (and based on reading CVEs and reading the developer discussions of the fix over at the ntp site) is that the error does exist in earlier releases.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-29-2010 09:27 AM
03-29-2010 09:27 AM
Re: TCP/IP security patch
Hoff,
Many Thanks for the quick answer. Does V5.6 ECO 3 need to be patched or only V5.6 ECO 4 ?
John
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-29-2010 09:31 AM
03-29-2010 09:31 AM
Re: TCP/IP security patch
HP did NOT make a patch available for TCPIP V5.6 ECO 3. Whether this mean ECO 3 is not affected, only HP can answer !
Volker.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-29-2010 11:13 AM
03-29-2010 11:13 AM
Re: TCP/IP security patch
Sure. That's easy. Be (appropriately!) paranoid.
Until you hear otherwise from an authoritative source (and which is _not_ ITRC) that a version or configuration is explicitly _not_ vulnerable, the assumption is that the software _is_ vulnerable. And if you're even operating with an average level of paranoia, not even then.
This (appropriate!) paranoia irrespective of the platform and software; whether we are discussing OpenVMS or anything else.
The web-facing servers I manage get attacked multiple times a day.
Unfortunately for this whole discussion, the OpenVMS web tools and web-facing software stacks are down-revision, and there are various security issues within the various web-facing and net-facing tools. Which is why do not recommend exposing OpenVMS to the Internet.
In defense of the vendors here, security also often turns into a circus; there's no certainty here, and even current-patch systems can be vulnerable to zero-day attacks, and to targeted attacks and spearfishing. And some of the security uproars are inconsequential for many sites; you have to know how big a target your site is, and how much you're willing to (directly and indirectly) pay to (try to) reduce your exposure to attacks. This security stuff gets FUD'd pretty heavily in the market, and it's easy to end up with an inappropriate degree of paranoia.
And one of the oft-overlooked parts of security is having current archives. And a review for the "low-hanging" security bugs that can exist in most any configuration.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-30-2010 07:41 AM
03-30-2010 07:41 AM
Re: TCP/IP security patch
Many Thanks for the info esp. on the appropriate "paranoia" level - understand the risk assessment aspect that you mentioned and I'll continue to follow up with on whether versions not mentioned in the bulletin do have the vulnerability. Way too easy to just assume that all is well when a specific version is not directly referenced in a bulletin.
Regards,
John
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-02-2010 10:14 AM
04-02-2010 10:14 AM
Re: TCP/IP security patch
They have ACLs on them (at least the Alpha V5.6 ECO 5 *.EXE_ECO_A ones )!
(IDENTIFIER=%X80010100,OPTIONS=PROTECTED,ACCESS=READ+WRITE+EXECUTE+DELETE)(DEFAULT_PROTECTION,SYSTEM:RWE,OWNER:RWE,GROUP:RWE,WORLD:,OPTIONS=PROTECTED)
A BACKUP/INTERCHANGE would have been nice when creating those .BCK files !
Volker.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-03-2010 12:17 AM
04-03-2010 12:17 AM
Solution5 of them only differ in the IMAGE header (VBN 1), i.e. the LINK DATE and the IDENT string.
Only TCPIP$NTP.EXE and TCPIP$NTP_RES_CHILD.EXE differ in the code section of the image !
NOTE: this is just for the images in QXCR1000910870_V56_ECO5_ALPHA.BCK - the same analysis would need to be done for the other patches as well, but I think I can mostly guess what that analysis would turn out...
I hope that e.g. TCPIP$NTPQ.EXE would be different for all the other patches except against V5.6 ECO 5, which already reportedly fixed that problem in NTPQ (re: SSRT#090073)
Volker.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-07-2010 09:36 AM
04-07-2010 09:36 AM
Re: TCP/IP security patch
- TCPIP$NTPTRACE.EXE has been removed from all the patches
- the .BCK savesets have been re-created with BACKUP/INTERCHANGE (on 5-APR-2010).
[I have verified this for QXCR1000910870_V56_ECO5_ALPHA.BCK]
- all NTP images have been re-linked, because they all use the same .OLB and some modules in the .OLB have been changed due to the SSRT fix
- ONLY the following iamges are affected by the security fixes:
For TCPIP V56-ECO4 and TCPIP V55-ECO3
1. TCPIP$NTP.EXE
2. TCPIP$NTP_RES_CHILD.EXE
3. TCPIP$NTPQ.EXE
And for TCPIP V56-ECO5
1. TCPIP$NTP.EXE
2. TCPIP$NTP_RES_CHILD.EXE.
NOTE: the protection of those images is (RWE,RWE,RWE,RE), so this might cause problems during deletion !
Volker.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-18-2010 05:20 AM
05-18-2010 05:20 AM
Re: TCP/IP security patch
Now there are also NTP patches for TCPIP V5.4 ECO 7
See Document ID: c01961959 Version: 3
Volker.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-02-2010 08:09 PM
06-02-2010 08:09 PM
Re: TCP/IP security patch
I don't know if my question is relevant to this topic, but I do have problems with installing TCPIP v5.6 ECO5 patch on my DS25.
Currently I'm running OpenVMS 8.2 with TCPIP v5.6 ECO3.
But when I want to decompress the ZIPEXE file, I get an error:
%DCL-W-ACTIMAGE, error activating image DEC-AXPVMS-TCPIP-V0506-9ECO5-1.ZIPEXE
-CLI-E-IMGNAME, image file CARD$DKB1:[PATCHES]DEC-AXPVMS-TCPIP-V0506-9ECO5-1.ZIP
EXE;1
-IMGACT-F-NOTNATIVE, image is not an OpenVMS Alpha image
Can anyone please advise?
Thanks,
IO
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-02-2010 08:28 PM
06-02-2010 08:28 PM
Re: TCP/IP security patch
The run command is failing because of IMGACT-F-NOTNATIVE error. If the file was FPTed over network then there are chances that it might have lost some of the file attributes like RFM, LRL, MRS etc. In this case you have to restore the lost attributes before using the file. Check the file attributes before and after file transfer by $ dir/full command. You can use the below command to restore the attributes back. The typical command used is:
SET FILE/ATTR=(RFM:FIX,LRL:32256,MRS:32556) DEC-AXPVMS-TCPIP-V0506-9ECO5-1.ZIPEXE
Hope this helps.
Regards,
Ketan
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-02-2010 09:47 PM
06-02-2010 09:47 PM
Re: TCP/IP security patch
OpenVMS .EXE files have 512 byte length FIXED records ! Your command can be used to modify the record attribute for BACKUP savesets !
Here is a real working example:
AXPVMS $ dir/full DEC-AXPVMS-TCPIP-V0506-9ECO5-1.ZIPEXE;1
Directory DSA64:
DEC-AXPVMS-TCPIP-V0506-9ECO5-1.ZIPEXE;1 File ID: (46058,7,0)
Size: 84846/84848 Owner: [1,1]
Created: 26-MAR-2010 09:06:53.07
Revised: 29-MAR-2010 14:17:26.15 (3)
Expires:
Backup:
Effective:
Recording:
Accessed:
Attributes:
Modified:
Linkcount: 1
File organization: Sequential
Shelved state: Online
Caching attribute: Writethrough
File attributes: Allocation: 84848, Extend: 0, Global buffer count: 0
No version limit, Backups disabled
Record format: Fixed length 512 byte records
Record attributes: None
RMS attributes: None
Journaling enabled: None
File protection: System:RWED, Owner:RWED, Group:RE, World:
Access Cntrl List: None
Client attributes: None
Total of 1 file, 84846/84848 blocks.
AXPVMS $ run DEC-AXPVMS-TCPIP-V0506-9ECO5-1.ZIPEXE;1
UnZipSFX 5.42 of 14 January 2001, by Info-ZIP (Zip-Bugs@lists.wku.edu).
...
You need to use the appropriate SET FILE/ATTR=... commands to change the file attributes of your .ZIPEXE file to those shown above.
Volker.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-02-2010 10:15 PM
06-02-2010 10:15 PM
Re: TCP/IP security patch
Regards,
Ketan
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-02-2010 11:14 PM
06-02-2010 11:14 PM
Re: TCP/IP security patch
I have modified it as it should be now.
Before:
--------
DEC-AXPVMS-TCPIP-V0506-9ECO5-1.ZIPEXE;1 File ID: (45190,42,0)
Size: 85340/85351 Owner: [SYSTEM]
Created: 3-JUN-2010 18:52:36.69
Revised: 3-JUN-2010 18:52:40.37 (1)
Expires:
Backup:
Effective:
Recording:
Accessed:
Attributes:
Modified:
Linkcount: 1
File organization: Sequential
Shelved state: Online
Caching attribute: Writethrough
File attributes: Allocation: 85351, Extend: 0, Global buffer count: 0
No version limit
Record format: Variable length, maximum 0 bytes, longest 5299 bytes
Record attributes: Carriage return carriage control
RMS attributes: None
Journaling enabled: None
File protection: System:RWED, Owner:RWED, Group:RE, World:
Access Cntrl List: None
Client attributes: None
Command:
--------
SET FILE/ATTR=(RFM:FIX,MRS:512,LRL=512,ORG=SEQ,RAT=NONE)DEC-AXPVMS-TCPIP-V0506-9ECO5-1.ZIPEXE
After:
------
DEC-AXPVMS-TCPIP-V0506-9ECO5-1.ZIPEXE;1 File ID: (45190,42,0)
Size: 85340/85351 Owner: [SYSTEM]
Created: 3-JUN-2010 18:52:36.69
Revised: 3-JUN-2010 19:08:30.96 (4)
Expires:
Backup:
Effective:
Recording:
Accessed:
Attributes:
Modified:
Linkcount: 1
File organization: Sequential
Shelved state: Online
Caching attribute: Writethrough
File attributes: Allocation: 85351, Extend: 0, Global buffer count: 0
No version limit
Record format: Fixed length 512 byte records
Record attributes: None
RMS attributes: None
Journaling enabled: None
File protection: System:RWED, Owner:RWED, Group:RE, World:
Access Cntrl List: None
Client attributes: None
Total of 1 file, 85340/85351 blocks.
What I can see already is that the block size of this file is different from your example, however it is the same file.
Any ideas?
Thanks a lot,
IO
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-02-2010 11:26 PM
06-02-2010 11:26 PM
Re: TCP/IP security patch
it's possibly too late now, but please do not 'hijack' existing threads for a new problem. Consider to create a new topic for this question.
Does this .ZIPEXE expand correctly when run ?
The release notes specify checksums, do they match ?
I now remember: this kit might been re-released. My notes show a 1-MAR-2010 and a 5-MAR-2010 date for this patch. Copy it again...
Volker.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-02-2010 11:59 PM
06-02-2010 11:59 PM
Re: TCP/IP security patch
You're right. I should have started a new thread.
Thanks for your help here. I just moved then.
Cheers,
IO
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-03-2010 07:49 AM
06-03-2010 07:49 AM
Re: TCP/IP security patch
Many thanks to all who offered valuable suggestions and info regarding the security patch, and special thanks to Volker for his detailed analysis of the contents of the various generations of patch kits and additions to the original bulletin. I owe you a beer or two when we meet next time :-)
Also thanks to the TCP/IP maintenance engineers who listened to this thread and updated the patch kits to deliver better quality ECOs. I'm confident that future ECOs will reach the standards again which the OpenVMS community is used to (and expects).
Closing this topic.
Hans.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-14-2011 02:00 AM
02-14-2011 02:00 AM
Re: TCP/IP security patch
Purely Personal Opinion
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-14-2011 04:48 AM
02-14-2011 04:48 AM
Re: TCP/IP security patch
If someone from engineering is reading this thread as well: could you please update the "patch description" field of the various TCPIP_NTP_PAT patches? It still contains this template text:
"This will appear in the ITRC interface next to the patch ID. For example: DECnet-Plus for OpenVMS Alpha V7.3 ECO04"
Also, the new patches are missing the Release Notes :-(
Thanks for listening.
Closing this thread again,
Hans.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-14-2011 04:56 AM
02-14-2011 04:56 AM
Re: TCP/IP security patch
HP-I64VMS-TCPIP_NTP_PAT-V0506-9ECO5D-4
...
3.2 Version of TCPIP to which this kit may be applied
OVMS I64 TCPIP V5.5
...
should be:
OpenVMS I64 TCPIP V5.6
Volker.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-14-2011 08:35 AM
02-14-2011 08:35 AM
Re: TCP/IP security patch
Purely Personal Opinion
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-15-2011 01:58 AM
02-15-2011 01:58 AM
Re: TCP/IP security patch
Purely Personal Opinion
- « Previous
-
- 1
- 2
- Next »