[Info-vax] IKEA
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Fri Dec 9 16:37:52 EST 2022
On 2022-12-09 14:05:56 +0000, Alexander Schreiber said:
> Single Stage to Orbit <alex.buell at munted.eu> wrote:
>> On Thu, 2022-12-08 at 08:12 +0000, David Wade wrote:
>>
>>> Given the ubiquity of SMB is there anything that could be done?
>>
>> Yes, stop usuing SMB1, use SMB3 instead.
>
> Which would magically protect against files being encrypted via a
> machine/user with r/w access to the share exactly how?
I'll here assume this reply was intended as a serious posting, and not
as a troll.
Yes, ditching SMB1 will absolutely help, as it's hideously insecure.
Unfortunately for those folks still necessarily using PATHWORKS Server
/ CIFS / Advanced Server, ditching SMB1 can be a problem. The OpenVMS
Samba port can help:
https://vmssoftware.com/docs/samba-release-notes.pdf
The OpenVMS Samba port is 4.10-16A, while Samba 4.17.3 is current. And
there are security fixes, though whether those also effect OpenVMS I've
not checked.
Is the removal of SMB1 the only thing that needs to be addressed to
improve security? No. Of course not. But it helps, as Ned Pyle will
absolutely tell you.
https://techcommunity.microsoft.com/t5/storage-at-microsoft/stop-using-smb1/ba-p/425858
As for the IKEA breach, it's apparently involving spearphishing, and
the attackers reportedly have more than a foothold in the IKEA networks
and servers.
Of what is reported about the IKEA breach:
https://www.bleepingcomputer.com/news/security/ikea-email-systems-hit-by-ongoing-cyberattack/
How much we might eventually learn about the details of the IKEA
breach? How much IKEA might discuss with VSI, assuming OpenVMS issues
or exploits are identified and involved in the breach?
Rackspace had an apparently catastrophic hosted Exchange Server Breach
recently, too. Details:
https://www.rackspace.com/newsroom/rackspace-technology-hosted-exchange-environment-update
Mail servers, directory servers, and network servers more generally are
complex, and failures are bad. Related: https://beyondcorp.com
With OpenVMS, there are various things that the OpenVMS staff, and the
organization's network and security operations staff, should be aware
of potential SMB1 usage included, and also including POP and IMAP
support issues, network service reflection attacks, everybody's
favorite iLO password-revealing mess, the ill-considered open-relay
default of the SMTP mail server, and a variety of other
OpenVMS-specific topics, and of course many other and more generic
topics. Because while SMB1 might not be part of any particular security
attack, it could be.
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list