[Info-vax] DECnet challenge

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Fri Mar 1 18:47:04 EST 2019


On 2019-03-01 20:18:21 +0000, Mark Berryman said:

> They have been configured by a network engineering staff who knows what 
> they are doing.

Now try that same network configuration again with what passes for 
networking in many of the organizations running OpenVMS and DECnet.

Which is very far from perfect security.  Even with a good team.

Worse, with the sorts of folks that have unfortunately chosen to 
believe some of the worst of the marketing codswallop around.

It's always been (theoretically) possible to lock down and isolate 
servers and server networking.  That was the foundation of the NCSC 
Orange Book security decades ago.

Keeping all that locked down and isolated... gets interesting.  
Mistakes, compromised staff, compromised servers and devices, and 
compromised apps.  And with ever-changing requirements for 
communications and cross-connections.

Pragmatically, we're way past trying for perfection.  Or we should be.  
Which is what this talented-management approach seeks.  Or the 
only-use-highly-skilled developers approach that has been suggested for 
system and network and app deployments.

Assuming we're not going to be perfect leads to discussions of 
mechanisms to increase difficulty.  Which can include sandboxes, ASLR & 
KASLR, W^X, etc.  And encrypted and authenticated connections.

Failures in complex systems are seldom single events.  They're a chain 
of mistakes.  As are exploits.

Unauthenticated connections and cleartext credentials is really hard to 
scale.  Tell me that you'd trust this cleartext configuration to 
maintain security over months and years, across staff churn and 
consultants, across malware-infested printers, and across software and 
firmware upgrades, the telnet and ftp usage for reasons, across patch 
rollouts for printers and switches and servers and MRI scanners and 
embedded warehouse control systems that can take days or weeks or 
months or years, and across the "fun" that is side-channels of other 
co-resident guests peeking into your clients and into your servers.

Ponder explaining this series of decisions to an auditor or a 
regulator, and particularly post-breach.

Fix your unauthenticated and unencrypted links.   Though if your 
management is willing to make the trade-offs around continuing to use 
cleartext links, maybe get that in writing.  Even if you may well still 
be left holding the blame. And expect to have to fix it anyway.


==


Related Reading:

http://web.mit.edu/2.75/resources/random/How%20Complex%20Systems%20Fail.pdf
https://arxiv.org/abs/1902.05178
https://medium.com/@daniel.p.woods/on-infrastructure-at-scale-a-cascading-failure-of-distributed-systems-7cff2a3cd2df 



==


ps: As for your question, I'd likely start with side channels on the 
servers and extracting keys, and with attempting to mess with the IP 
network (ARP, iBGP, WAP, DHCP) via an infested printer or infested 
client.  I'd also consider tossing DECnet routing messages from rogue 
DECnet hosts (IV is tougher here than V, if the switches are paying 
attention), or from existing DECnet or IP hosts that have 
"mysteriously" become routers for DECnet traffic.  And I'd be more 
interested in watching the DECnet and SCS traffic than necessarily 
spoofing a DECnet proxy through obtaining a privileged network position 
via routing or mirroring or finding bugs, as the cleartext or 
poorly-hashed creds visible via DECnet and SCS and telnet and FTP are 
going to be useful for furthering access.  Am I certain to get into the 
DECnet network?  No.  Can a good team block these paths?  Sure.  But 
I'm still not inclined to prefer to run unencrypted and unauthenticated 
and cleartext network traffic.


-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list