[Info-vax] SAMBA and Ransomeware

Scott Dorsey kludge at panix.com
Mon Jul 17 16:51:59 EDT 2017


Michael Moroney <moroney at world.std.spaamtrap.com> wrote:
>kludge at panix.com (Scott Dorsey) writes:
>
>>Our question, then, becomes this: How do we, knowing we have an inherently
>>untrustworthy protocol, manage to implement it in the safest possible way?
>>Because we have to implement it.  And we have to do it as safely as we can.
>
>I suppose the VMS server process has as few privileges as absolutely possible,
>ideally TMPMBX+NETMBX only, if at all possible.

That's key number one.  

>Naive question: Are the protocols fundamentally broken, security wise, or,
>in theory, could a good VMS programmer given the SMBx spec and no existing
>code as a bad example, write a secure SAMBA implementation from scratch?

Unknown, since nobody has actually seen the SMB spec outside of Microsoft,
and SAMBA exists entirely due to reverse-engineering of the protocol.

SMB1 is fundamentally broken in every possible way.

SMB2 has some things which are alarming but I suspect it's not fundamentally
broken.  But, given the history, I am sure there are some problems in there
that we don't know about yet.  It has been reverse-engineered well enough to
talk to and from, but that doesn't mean there aren't some gotchas somewhere.

SMB3 I have no idea about since I have never seen it, but again knowing the
source I am suspicious.
--scott


-- 
"C'est un Nagra. C'est suisse, et tres, tres precis."



More information about the Info-vax mailing list