------------------------------------------------------------------- SECURTY1.DOC -- 19960730 -- Email thread on NetWare Security Issues ------------------------------------------------------------------- Feel free to add or edit this document and then email it back to faq@jelyon.com On firewall's in general you should run to your favorite bookstore and get: "Firewall's and Internet security: repelling the wily hacker" from Cheswick & Bellovin, Addison & Wessley press. The section with port-numbers to block in the back is very usefull and can already be inplemented at a decent access list on a decent router. Henno Keers ------------------------------ Date: Tue, 26 Sep 1995 00:16:16 -0400 From: Joe Short Subject: Finding Supervisor Users in Bindery >I am looking for a utility which will give me a list of all users on a >server who have supervisor rights. We recently had a problem with some >goofy user backing up their hard drive to the apps volume and running >it out of space. She should not have super access, and we arn't sure >how she got it. Now I want to see who else may have these rights. With >over 10,000 defined users looking up the rights one at a time isn't an >option :-) Try NetWare's SECURITY.EXE command (DOS executable). Not the most detailed function, but an effective reporting tool. You can use the command by itself for screen display, or redirect the output to a file. Example: Z:\SYSTEM\SECURITY > C:\NET\LOG\SECURITY.LOG With 10,000 users, I strongly suggest you redirect to a file! After entering the above command, the prompt will not let you know that it is processing, and it could be quite a while before you see results. Just be patient and let it complete. Joe Short ------------------------------ From: Garry J Scobie Ext 3360 Date: Tue, 26 Sep 1995 12:25:45 +0000 Subject: Security hole ? http://mft.ucs.ed.ac.uk/novell/techsup/servman.htm ------------------------------ Date: Tue, 26 Sep 1995 04:03:15 GMT From: Eli Shapira Subject: Re: Crack: Released. A similar program is available from e.g. Software, Inc. Will scan for 150,000 words and different alogrithms searches (Dates, NetWare names, Anagrams, etc...). However, it is an NLM that works on your server and does not require a download of the bindery (and therefore it is more secure). SmartPass NLM is available for download from: http://www.egsoftware.com ----- Yes - SmartPass also uses NetWare names, Real Names (First and Last), places around the globe, common used words, hackers dictionary. SmartPass can automatically expire passwords that are found weak, notify the user and notify the administrator. ID DOES NOT REQUIRE YOU TO CLOSE THE BINDERY AND DOWNLOAD IT TO YOUR WORKSTATION. SmartPass runs in the background and has a built in Scheduler to start a password scan on a specified time. It will also automatically scan any new password set by the user or administrator. All of this can be done only through an NLM that runs securely on a server. SmartPass and other NLM products can be downloaded from: http://www.egsoftware.com SmartPass is available in two versions - one that displays the passwords and one that does not display them but does display the user name that has the weak password. Eli Shapira ------------------------------ Date: Wed, 27 Sep 1995 12:15:57 +0100 From: "Mr. R. Coates" Subject: Re: Crack: Released. > A similar program is available from e.g. Software, Inc. > > Will scan for 150,000 words and different alogrithms searches (Dates, > NetWare names, Anagrams, etc...). > > However, it is an NLM that works on your server and does not require a > download of the bindery (and therefore it is more secure). Crack also uses netware names, real-name info, and a few other tricks in addition to the dictionary. Since it will run on a standalone PC it also causes no network load. But the greatest difference, and one which is important to many sysadmins (esp University/College ones) is that it is free. This is one of the main reasons ALL my software is freeware. Incidentally, Crack 1.2 is now online and supports a /SECRET switch to suppress the display of discovered passwords on the screen. As requested by several users. ftp://ftp.mechnet.liv.ac.uk/novell/freeware/crack.zip http://www.mechnet.liv.ac.uk/~roy/freeware.html A couple of people have suggested that I add a feature to disable accounts whose passwords have been cracked.... your thoughts please to: Roy Coates ------------------------------ Date: Mon, 16 Oct 1995 12:55:02 -0800 From: Stephen Herzog Subject: Re: Passwords >>> Does anybody know about some kind of program >>> that can read a user's password from the Netware bindery? >>> Is the bindery secure? >"Mr. R. Coates" wrote: >>There is no way to read a users password from the bindery. It's quite >>secure. and lastly, Gary McNeel, Jr. Director - Technical Marketing BindView Development Corporation made the following comments: >This is not true! Passwords in the Novell bindery can be read and >captured, though it is not easy. So, I felt the need to add my 2 cents worth. No, you can not just open the bindery and see a user's password. Yes, passwords can be obtained, however it is not something trivial. * You must get a copy of the encrypted password from either the bindery, or capturing a login packet sequence. * You then have to use a guess and check method of determining the password. ie, take the first word from your dictionary, encrypt it, check the result against the encrypted password, if it matches, the word you encrypted was the password. If it doesn't match, get the next word from the dictionary and try again. And then Gary McNeel, Jr. Continues... >There are a few products on the >market that can do this. Some can give you list of passwords found >not to be secure, such as SmartPass NLM, which keeps a list of >passwords it has found by comparing user passwords against, at last >report, a 150,000 word database(s). > >We felt that a security product should not give you a list of unsecure >products, it opens another security hole in your network. We >developed Password Sentry NLM help people secure their sites against >intrusion through the exploitation of weak passwords. Password Sentry >has 18 databases with over 1 million words. Ok, lets argue on dictionary sizes. First off, the bindery provides you with the number of characters in the original password. How nice. If you pre-sort your dictionary by the length of the words, you can avoid checking all but the words of the same length of the password. I assume that a "set of 18 databases with 1 million words" is 18 files, each with a set of words of a specific length. Each password in the bindery would be checked with aprox 60 thousand words then, correct? It would be a waste of time to check all 1 million words, since you can eliminate the ones that are the wrong length. And what of large dictionaries. Is bigger always better? Yes and No. If you were trying to break the supervisor password on a specific file server, and you happen to know that they use a password checking program such as Password Sentry, our Password Inspector, or SmartPass, you could purchase a copy, extract the words from the dictionary, and you now have a list of 1 million words you don't need to check. So in short, a dictionary with 5 words is pretty useless... So is one that contains every possible combination of letters and numbers for each length of password. (what should the user use for a password if *all* the word-letter combinations are already in a dictionary.) I won't make any judgements as to what the best word count is for a dictionary (the sysop should do that) but don't assume bigger is always better. If you want passwords that are harder to guess, increase your minimum password length. 4 and 5 letter passwords can be broken by testing every possible set of letters and words pretty quickly. Explain to your users why secure passwords are important, and ask/force them to use long passwords with letters and numbers. But be careful; long-hard-to-remember passwords tend to get written down. There is nothing worse than someone finding a business card with your account name and password on the back. ------------------------------ Date: Thu, 16 Nov 1995 13:06:27 +0000 From: Richard Letts Subject: Re: Novell Hacking Protection? >What programs, or patches can be run to prevent to use of the following >programs or ideas? > >hack.exe - a program that i believe sends packets from a fake supervisor > to do such things as gain supervisor access. packet signing -- I insist everyone who uses supervisor has their station set to level3 -- if they cannot login to an unsecure server, then they know to fix it. >view.exe - a program that allows anyone to see supervisor equals. not too worried about this... >sniffers..watching network packets, from the supervisor as he calls Build your network using devices that scramble data, eg the 3com FMS-II hubs have the ability ot operate in a secure mode. >rconsole, with the use of rcon.exe anyone could decrypt, or see the >rconsole password (that was a senario using sniffers.) go back to the previous answer. Yes, we really need to be quick on our feat in an academic environment, commercial companies don't appear to suffer from the same problems (from experience of doing security consultancy work) Richard Letts ------------------------------ Date: Sun, 19 Nov 1995 08:34:04 +0000 From: Rob Mcgillen Subject: A good NLM to think about.... I am not one to give faint praise- usually no news is good news around my shop..... but I wanted to share with this listserv the excellent experience I have recently had with a Commercial Nlm.... Audittrak- from On Technologies. I installed it this past Friday afternoon on a 250 user Novell 3.12 lan here at the Univ. of Oklahoma... this lan is used for a number of tasks.... from payroll to lab software distribution.... and a number of the workstations are "public" access- someone could(and have) wander in with little to no supervision and monkey with things....( I inherited this headache- and have been pulling out hairs at the numerous screwball things that have been going on....) Using the default nlms and logs on Netware 3.12- I was not getting much of an idea of how certain programs were executing, etc. Anyway- I installed the NLM on Friday afternoon.... came in Yesterday (Saturday)- and had a full log of access, logins, .exe alterations, attempted logins, accesses to restricted documents, etc. I sat down and read thru the 12 hour -61 page log- and was amazed at what was going on.... caught 6 different students in VERY wrong places.... all kinds of .jpg's and .gif's that really should not be on a state server, etc. Also found a person trying to hack the supervisor password... The log was quite an interesting read... not only did it give me an idea who were problem users, it also let me know about files that were not working properly-resulting in some of the squirrelly program executions I had witnessed. Anyway, if you need a better idea of what is going on in your network - and console logs are not cutting it- I recommend it. As this isn't an ad for On Technologies- you will have to look up their number yourself or drop me some mail... ------------------------------ Date: Tue, 21 Nov 1995 03:44:06 GMT From: Gerald Khoo Seng Wee Subject: Re: Novell Password Change >There is a parameter for checking of the number of days where the >password will expire. I think it is PASSWORD_EXPIRES (I don't have the >manuals with me right now). I have added that in my system login >script to inform my users when their password is going to expires within >7 days. Yes... just put the following lines in your login script: write "Your Password Expires in %PASSWORD_EXPIRES Days" and it will show you the number of days before your password expires on each login. ------------------------------ Date: Sat, 25 Nov 1995 09:24:16 -0600 From: Joe Doupnik Subject: Re: Logging hacking on Novell >>>>I have a problem with somebody internal that is a litle to eager on the >>>>Novell 3.12 network. Does anybody know of a NLM that writes to a >>>>log-file every login and logout with name, nettwork address, date >>>>and time. Both successful and unseccessful logins ? >> >>Paudit only logs succesful logins, not the >>unsuccesful. You could use the Intruder detection for the unsuccesful >>ones (at least you'll know where they come from), but this will >>severely disturb the 'hacked' user account. Especially the >>supervisor's. ------------- You need to look around more thoroughly. See file SHOWEV.ZIP in directory misc on netlab2.usu.edu. It will show much more than you may wish. It is the original tool used to detect presence of hack program. Before asking repeated times for a utility, Please read the list's FAQ and explore the sites listed therein. Failure to do so bothers everyone on the list. Joe D. ------------------------------ Date: Wed, 29 Nov 1995 18:17:13 UTC+0100 From: Amador Hernandez Subject: Re: Reducing net$acct.dat >I need to reduce the size of the net$acct.dat file and move some of the >oldest data to other files. How do I do that ? I would prefer if the new >files with the oldest data would be readable for paudit or paudit2. You can simple delete the NET$ACCT.DAT, and next time some user logs in, a new one will be created (on NetWare 3.11). I use it to see how many times a user logins in one month. I do PAUDIT one a month, and with a simple C program I examine the lines generated with PAUDIT > C:\PAUDIT.TXT, and see how many times a user had logged in. Each month I delete the NET$ACCT.DAT, and a new one is created when the next user logs in. ------------------------------ Date: Mon, 27 Nov 1995 16:50:40 PST From: Rob Wiese Subject: Re: Logging hacking on Novell >I have a problem with somebody internal that is a litle to eager on the >Novell 3.12 network. > >Anybody know of a NLM that writes to a log-file every login and logout >with name, network address, date/time, both successful & unsuccessful >logins ? I track this using a combination of w3secmon.nlm and conlog.nlm Each unsuccessful login via invalid password is written to the console: