[Info-vax] DECnet challenge
superseth369 at gmail.com
superseth369 at gmail.com
Tue Mar 19 13:06:52 EDT 2019
On Friday, March 1, 2019 at 3:18:24 PM UTC-5, Mark Berryman wrote:
> Based on a conversation that has been going on between Simon and myself,
> the following challenge is issued:
>
> You work at a company that still uses DECnet, phase IV in this case.
> The DECnet nodes are scattered around the various physical sites of your
> company, some on the same LAN, others separated by WAN links.
> Different sites may or may not use different DECnet areas. You choose.
> Your DECnet nodes make use of DECnet proxies.
>
> Your company uses Enterprise-grade routers and switches. They have been
> configured by a network engineering staff who knows what they are doing.
> Among other things:
> The routers have been configured so that they do not allow any DECnet
> node number not assigned to the LAN into the router.
> The switches have been configured so that no port may accept a DECnet
> MAC address not assigned to that port.
> The holes that used to exist in switches where a host on one port
> could snag the traffic from another port no longer exist.
> This is standard in every DECnet network still in use that I have seen.
>
> You are a node on this corporate network. You may use any hardware and
> any software you wish.
>
> The challenges:
> 1. Spoof an existing DECnet node on the network in order to subvert the
> DECnet proxies in use.
> 2. Examine the DECnet traffic between any 2 DECnet nodes so that you can
> view the in-the-clear information and learn what you can by doing so.
>
> The winner is anyone who can describe a way to accomplish either goal.
>
> A long time ago, a DECnet worm was released into the wild. Improperly
> configured DECnet systems (mainly those that just accepted the defaults)
> were subject to this worm. Properly configured systems, i.e. those that
> were configured according to the instructions then present in the
> manual, were immune. Your corporation is one of those that were
> properly configured. You were part of the SPAN network but the WANK
> worm just passed you by. Remember that in this challenge.
>
> Mark Berryman
gee I ran 30 nodes on TCPware using Phase IV over IP all over the country and to our office in Shanghai China and never had a problem.
More information about the Info-vax
mailing list