Default Behavior: Piranha vs. Microsoft SQL Server 268
Because unlike Red Hat, Microsoft is getting a pass by the media.
Piranha is web clustering/failover software that was released in April by Red Hat without much QA. It somehow went out the door with a default password ("Q") and without docs explaining in big bold caps that it must be changed. If you installed the Piranha RPM without reading the docs carefully, you had a security hole on your site.
The hole allowed an attacker to come in over port 80 and execute arbitrary commands as the Piranha user, which would have been the web user. Typically that's a nonprivileged "nobody" account. While this is never good, let's just note for the record that this is a read-only exploit unless the webserver is very poorly configured.
The media flipped, in a word, out.
Piranha: A Case Study
On April 25, Computerworld announced that the "backdoor password ... could allow an attacker to compromise a Web server and deface and destroy a Web site." Informationweek and Internetweek both warned about "a back-door security flaw that carries ISS's highest danger rating." MSNBC/ZDNET ran the story as "Red Hat Linux open to backdoor password" and explained "there's a backdoor account in Red Hat's Linux that would let a computer intruder access and alter files." The Standard's early report on April 25 wasn't too bad but attacked -- as all reports did to some degree -- the strawman myth that open source is inherently secure. At least it didn't use the word "backdoor." Newsbytes was pretty much the same.
"Backdoor" implies that the flaw was deliberately inserted, by a thoughtless or even malicious programmer. Why did most stories incorrectly use that word? Mostly because that was how it was described in the press release. A security firm called Internet Security Systems found the flaw on April 24 and sent out a security advisory that used the term four times by the end of the first paragraph.
ISS also made some interesting statements when speaking to the press about the vulnerability. Oft-quoted was a line about open-source being both a blessing and a curse (the media loves "on the one hand, on the other hand"). I also liked this comment from their research director:
"There's limited quality assurance in the open-source environment," says Rouland, "because open-source software is basically a bunch of peoples' hobby."
Of the early stories about Piranha, the best one I found was Henry Kingman's ZDNet piece on April 24 (both early and accurate: amazing). CNET's on April 25 wasn't bad either, though they let ISS lay down the anti-open-source and pro-Microsoft propaganda a little thick.
In the days to come, the story didn't change much except to note that Red Hat -- correctly, as it turned out -- denied the seriousness of the vulnerability and tried to explain that it wasn't really a backdoor. Inter@ctive Week's Charles Babcock did such a piece on May 1.
Computer Reseller News still called it a backdoor on April 27. And NetworkWorldFusion's report and Informationweek's followup both came out on May 1, both got the important facts right, but both still called it a backdoor.
ClieNT Server News ran an article in their May issue explaining "Red Hat Red-Faced." I'm not about to pay to read the whole thing. The free synopsis that's available smirks at how "embarrassed" the company must be, and ends: "It seems that Red Hat left a back door in," dot, dot, dot.
The Standard had a second, fair piece that eschewed the term and even, after quoting the line about open-source being a "hobby," gently suggested otherwise.
But the gold stars go to just two good reports. SecurityFocus' Elias Levy, on May 1, turned the spotlight on ISS by pointing out how they "...can make headlines by using the right jargon, even when it's wrong." And Linux World News' Liz Coolbaugh, who had weighed in a few days earlier, questioning the media's coverage in her story "Red Hat Security Hole Not a 'Backdoor'."
If you find any more stories about Piranha, post them below. The Red Hat-bashing pretty much came to a halt a week later, when a little Microsoft-specific email virus named "ILOVEYOU" did a few billion dollars' worth of damage.
(Breaking news: all charges dropped; to quote 10,000 Maniacs, "who ya wanna blame?")
Microsoft SQL Server 7.0
You've heard about the SQL Server vulnerability, right? The one found on Tuesday, six days ago?
Well, no, you probably haven't, unless you read NTBugtraq. Even the maintainer of SecurityPortal's Microsoft Security Digest missed it this week (don't worry: I dropped him a note, he added it).
As the cracker Herbless describes it:
"It has come to light that it is now common knowledge that MS-SQL has a blank 'sa' password by default. This seems to affect a _lot_ of servers on the internet."
A default password vulnerability? Sounds familiar, doesn't it?
Here's Herbless's description and exploit code, posted to BugTraq last Tuesday. And here's Microsoft's acknowledgement, posted on Thursday.
Herbless wasn't kidding when he said it affected a lot of servers. If you're running SQL Server 7.0, with a firewall that doesn't block its port, and you haven't changed the sysadmin password, you're vulnerable.
As he described it to me, unlike Piranha's vulnerability which gave read-only access as an unprivileged user, this one typically gives access as "BUILTIN\System." I don't speak NT, so he had to describe to me what this is: "god-like powers ... greater that those of even the 'Administrator' user."
In other words, you have been 0wn3d.
You may be thinking that this is a vulnerability. Go back and read Microsoft's acknowledgement again. They say quite clearly, "The code does not exploit a vulnerability."
Does it confuse you that what was previously a "backdoor" is now not even a "vulnerability"? That threw me for a loop too -- as well as some of Microsoft's other disclaimers, which only make sense when you realize you're reading non-sequiturs about the newer version SQL Server 2000 (the vulnerability only affects SQL Server 7.0).
All will become clear, though, once you read this story from vnunet.com -- the only media story I've seen, by the way. The fault lies with the website administrators:
"Hacked websites 'didn't read the manual'
"Microsoft has blamed administrator error, rather than a bug in its software, for leaving hundreds of websites running SQL server open to attack this week."
Did they say hundreds? Yes, hundreds, at the very least. And did they say "hacked websites"? Yes -- this is not a theoretical vulnerability with no known attacks, like Piranha was.
All this month, Herbless has been cracking into websites like the National Transportation Safety Board and leaving edgy political messages (while backing up the original files and telling the admins how to close the holes). He confirmed to me that all his attacks, including the Fish and Wildlife Service, the UK's Adult Learning Inspectorate, and the Commonwealth Telecommunications Organisation, were done by exploiting Microsoft SQL Server.
Just to make the story that much better, according to Herbless, the default configuration of SQL Server 7.0 also has logging turned off -- in which case a successful attack would leave few if any tracks.
Sites are lucky if their webpages are hijacked; that way they know to fix the problem, format and reinstall. But some of those "hundreds" of websites running the vulnerable installation have surely been cracked by black hats who quietly installed Back Orifice or a similar remote-exploit program. They can set an SQL Server password, but it won't help them: they'll still be 0wn3d.
The proper fix would be to force the password to be changed before the software can be used, as piranha now does. Wayne Sowery of MIS Corporate Defence Solutions confirmed for me that "versions up to SQL Server 2000 do not ask for the SA password during installation ... we also tried various install options such as 'typical' and 'custom,' neither prompted for a new SA password." Incidentally, he too questions whether this is properly described as a "vulnerability," but I'm not sure what else it could be called.
The lesson here is that the media doesn't treat security reports very fairly. Some organizations have their own selfish reasons to push one agenda or another. (Like Slashdot? You bet. But you know where we stand.)
The motive doesn't have to be that devious, though sometimes, of course, it is. If a reporter gets to write a story that questions a core belief of Linux zealots -- whether or not it's actually a core belief, and whether or not they're actually zealots -- that will be much more attractive than simply reporting security news. The nitty-gritty of security news, after all, is rather dry.
So next time you see a biased polemic about system security, or even a small media feeding frenzy about the latest exploit, take a moment to ask why it's being reported outside of the admins' mailing lists. Open source software is still a new idea to many in the traditional news media, and that means that it's a hook for them to hang any kind of story on -- good or bad.
What? (Score:4)
Oh well, at least we still have the chimpanzees we trained to do Visual Basic programming...
Re:There is a reason why nobody talked about this (Score:1)
Yes I know. Thats why I mentioned the Red Hat website thing. I know they really really blew that out of proportion. But if Slashdot critizes them for blowing it out of proportion, then does the same themselves with the Windows problem, they are just being hypocritical.
"By publicizing it,
Sometimes full disclosure isn't the best option. When security holes are found they should be kept quiet until they are fixed and people who are running the servers or whatever are notified.
Telling people about a security hole before it can be fixed is like telling people about a bad computer virus weeks after it hit.
Re:*grin* Here's another... (Score:1)
--Shoeboy
Re:The difference here... (Score:1)
Yes and no. I would imagine that very few people go through and choose each of the thousands of package options. More likely, they just set the checkbox for a typical install of certain types, which is as good as a default install.
Re:*grin* Here's another... (Score:1)
To fix you have to make sure you do some validation on your fields... its more or less common sense..
Jeremy
Re:Releasing details of vulnerabilities(Off Topic) (Score:1)
>opinion. It'd be like seeing someone drive a >Corvair after Nader's exposé.)
There is nothing wrong with Corvair provided the rear tires are properly inflated, so says a Federal Government study in 1972. Ralph Nader was WRONG. Just like he was about Y2K issues...
Mojo
Re:There is a reason why nobody talked about this (Score:1)
last month.
Re:Releasing details of vulnerabilities (Score:1)
Is it well known? If I set up a web site on NT tomorrow, would it's vaunted ease-of-use make this default known to me? It's well known if you are an experienced admin of anything, but if I'm small business owner who wants to plug in Microsoft and forget it, how well known is this?
Did anybody actually READ this post? (Score:5)
Let me sum up for you who apparently can write but not read (well, maybe someone else can read this to you)...
Redhat software package ships with default password; media goes crazy over this so-called "back door" into the operating system.
Microsoft ships thier SQL server with no password for "se" user and no prompt to change it, allowing complete system compromise under common cirumstances; media is strangely quiet about this.
In other words, very similar problems, but MS doesn't get attacked by the media.
THAT is what the friggin' article is about!
Re:I could be wrong, but... (Score:1)
Re:Oh, come *on* (Score:1)
You're right, this could be potentially dangerous. But you don't give a handgun to someone who's never used one before and act all surprised when they shoot themselves in the head(apparently experienced owners have done the same to themselves).
Maintaining and setting up a database is not a task for the unwashed masses, nor should it be designed with your typical "where's the 'any' key" user in mind. Any competent admin, and I mean ANY slightly competent DB admin knows to set the stupid default password. Anyone claiming to be competent who doesn't know about this "vulnerability" should be fired immediately.
overreaction (Score:1)
If you install MSSQL7, the default password for the sa account is blank.
If you don't change it, it's still blank.
In an install of linux, the default root password is blank. If you don't change it, it's still blank.
The only difference is that you are usually asked to change it during the linux install...
But if you can't think to change default passwords after installing SQL server, you shouldn't be using it anyway.
Re:Never underestimate the stupidity of Micrsoft (Score:3)
But here is a news flash for people. Oracle has *two* default u/p combos: sys/manager and system/change_on_install (cute, eh?). Both have administrator privs. Oracle 8i introduces the relatively poorly documented outln/outln login, though with far fewer privleges. Other oracle add on packages (Intermedia, iFS, whatnot) often add other default username/password combos with varying degrees of power.
Of course, people with a clue firewall the damn things, and only allow incoming connections to their web server, or even use a private network segment for them. This is why, IMO, the RedHat problem is bigger... Even though it is usually read-only, as a web server issue, it will *always* be vulnerable to the outside. DB servers rarely are, unless the admin is enough of a cluefuck to not change the default PW. er...
Re:Releasing details of vulnerabilities (Score:1)
Granted, these items aren't very difficult, but each time that you login as the system administrator to do the above items it might occur to you that "hey--I just logged in without a password" maybe I should change my 'sa' password.
or not...
---
Interested in the Colorado Lottery?
Re:It is documented - if you look for it.... (Score:1)
The problem is that you need a an admin password in order to do anything useful, so they give it a default, just like RedHat. The problem lies in them not FORCING you to change it the way RedHat now does.
Now, think about this for a minute. I had a localized machine at home, not on a network, and I installed Linux. Linux made me install a new root password. Now, it's probably a good idea to do it, I don't run everything as root, I know what I'm doing, and I went and took it out anyway - because I know how. But forcing you to do something is not what I consider to be in the spirit of free software. Having the option to do whatever you want is in the spirit of this community. Everytime a program makes me do something, I get pissed off. Who's running the show, me or my computer?
It's like seatbelt laws. I've always used my seatbelt, long before there were laws, because it only makes sense to do it. But who has the right to tell me I MUST wear a seatbelt? Making people do things "for their own good" does not make me happy, it makes me quite sad.
Of course, right now none of my machines are solo, and they all have pretty strong protection - at least a good root password and most services turned off, and a firewall to boot. This is clearly not an error on Microsoft's part. There is nothing unsecure about the software when used correctly. And I'm the last person to support MS (just look at my SIG).
On to the issue: it's hard to say why RedHat got raked over the coals and MS didn't, I see lot's of good postings that have alternative views, any of which may be correct or partially correct. Who knows? We don't. It's sad and unfair, but let's just keep doing what we do best and spread the word about alternative (not just Linux) operating systems.
----------
Re:Releasing details of vulnerabilities (Score:1)
Re:*grin* Here's another... (Score:4)
Basically, if someone is passing variables into a page (say index.asp?variable=5) then you can piggyback your own query after that (say index.asp?variable=5%20DELETE%20FROM%20sysobjects ). Or something.
This is a programmer problem, not a problem with SQL Server. In *many* cases, I use multiple SQL commands in one call through ODBC, for speed. I'm not positive, but I think this is kosher with the ANSI-SQL spec.
The problem occurs when you don't check the data you are sending to your SQL server through ODBC. For instance, if you let people pass in $value, thinking it's going to be a constraint for a WHERE clause, they could just as easily change that value and add something more sinister.
You think: "Hmmm, $value will be a number! I'll write, 'SELECT * FROM MyTable WHERE thenumber = $value'.
Meanwhile, Mr. Blackhat sends 'value=5; USE master; DELETE FROM sysobjects'.
Again, this is not specific to Microsoft or SQL Server
Of course
Indeed...
-thomas
New(s) Vulnerability (Score:2)
Wait. Is it a vulnerability? Certainly. If we can believe this is the exploit Herbless is using, a cursory look at the attrition.org archive will show a handfull of gov't and commercial site defacements accredited to him and presume its involving this default password issue. Web sites are being defaced. Whether it is trivial or not, its still a vulnerability.
So how trivial is this? DO sysadmins knowingly put out boxes with default passwords belonging to highly priviliged accounts? Common sense would suggest the admins wouldn't leave "the biggest door to [their] house" open. Trivial? Perhapse. Obvious... apparently not.
So we have a fairly serious situation, one many admins are apparently unaware of, affecting a large number of sites. Isn't that newsworthy?
Perhapse its not affecting THAT many sites. Of course, the fact that the pirahna case didn't involve actual defacements seems to argue against that being a pre-requisite of newsworthiness.
Perhapse Microsoft owns the press and vetos this kind of coverage. Sure... some of the sources mentioned might be more than friendly towards Microsoft. But not all of them. Besides, bashing Microsoft is trendy in some circles. I'm sure at least a few would have jumped on the chance to show that they're hip.
Maybe news of Microsoft vulnerabilities just isn't interesting anymore? PHBs are trying to wrap their brains around this whole Open Source jugernaught that just materialized in front of them. Since Red Hat is one of the more tangible phantoms, its a given that there will be a readership interested in material that deals with Open Source development and Red Hat. Will Red Hat vulerability news sell? No brainer.
Of course, this all goes far beyond the cares of your average admin. All exploits are trivial once they're known and a patch / configuration is available. Its just a matter of knowing the vulnerability is there and doing something about it. Any admin can do it. Simple. Trivial.
How are a majority of sites taken? Trivial exploits known for months if not years by the general community. The challenge developers have, closed or open source, is limiting the exploits available "out of the box".
Re:So why haven't you read about it? (Score:1)
Oracle 7 has a default password for SYS of Change_on_install as well as having a password called 'SCOTT' with a password of TIGER, Sybase's default password for sa is also blank, Interbase's default password for sysdba is masterkey. I don't think Informix has this problem, but it is so long since I installed it I can't remember what choices it offered me.
I think your phrase should have read:
'A good DBA will know about these holes and will set the sa password as part of the installation process.'
Re:You over-estimate MS Product buyers (Score:1)
Don't get me wrong, I think not making the SA password change a part of the install is a bad idea, since it's easy to forget when you get busy with making your database actually do something. The only flaw here is in the wizard.
As for the ability to control the OS from SQL, that's not a bug, that's a feature. =] Granted, it's not a feature most of us use, and the stored procedure should probably be removed. That's just another part of being aware of the security implications of any system you put on the Internet.
As for the original note's comparison of the Piranha thing and this non-problem, get a life, people. What is it with
the password is (Score:3)
.seineew era sreenigne taH deR
------------
a funny comment: 1 karma
an insightful comment: 1 karma
a good old-fashioned flame: priceless
Best Practices (Score:3)
Re:Oh, come *on* (Score:1)
Trust me I forgot to put an enable password on a switch I run, and I can't do a damn thing with it
I guess I will have to put one on eventually
Brown Orifice... (Score:1)
Such is life.
This is related to the 2600 article (Score:1)
It strikes me that there's a link between the response of the judge in the 2600 decision [slashdot.org] and the reponse of the different press sources cited in this article.
What they have in common is a mistrust and fear of those who make, support, and use <free, open-source, ... your favorite term here> tools. This mistrust produces a hostility toward the people involved as well as toward the tools themselves.
You didn't ask me, but that looks to me like the reactionary response by those who are frustrated by the reported technical successes of free software. DeCSS seems like deeper, more offensive magic if you assume that CSS started off being very secure. Linux and Apache seem like upstarts [netcraft.com] if Microsoft has been your sole introduction and guide through the world of personal computing.
It's also related to how religiously and self-righteously we tend to hop on those successes. Some people are used to hearing paid PR and marketing folks doing that, and it sounds like the pretty background noise of commerce to them.
Community-produced software, on the other hand, makes noise that sounds more like revolution to some ears, in part because it's not looking lucrative [lwn.net] in the traditional sense.
There's nothing wrong with wanting judges to make rational decisions, or media sources to make reasonable reports. It's foolish, on the other hand, to believe that either is likely, let alone assured.
The real answers come as we address technical issues, even while we're indignant about and frustrated by the falsehoods and prejudice.
While I don't want to live in a technocracy, I prefer my software built there, y'know?
Releasing details of vulnerabilities (Score:2)
I've heard the argument that Microsoft won't fix it unless the vulnerability is made public, but doesn't everyone know that to be bullshit? I mean, Outlook's flaws were explained in detail, and instead of Microsoft fixing 'em, I just get more internal memos from the IT department telling me what subject-lines will delete the contents of my hard drive and send itself out to every member of the firm. Clearly telling the public how to make an exploit can only aggravate the problem, so why do people insist on doing it?
Shit, this is a problem (Score:5)
This isn't new, it's been around for ages. It was there in the first MS SQL Sever version 4.21a.
It's ancient and it's beautiful.
Like all NT services, SQL can be run under a domain admin account. It frequently is. SQL also has a command called 'xp_cmdshell' that allows you to shell commands to the OS.
Executing an xp_cmdshell 'net group "domain admins" username
I love this.
--Shoeboy
Re:So why haven't you read about it? (Score:4)
RTFM
xp_cmdshell
xp_regaddmultistring
xp_regdeletekey
xp_regdeletevalue
xp_regenumvalues
xp_regread
xp_regremovemultistring
xp_regwrite
--Shoeboy
Re:Releasing details of vulnerabilities (Score:2)
As for the difference between a proprietary system and an O/S system, when you buy from microsoft, you have to accept their defaults. If RedHat or Debian insisted on distributing systems that installed with root passwords I'd always have the option of building my own distribution and giving that to my friends without having to worry about them sueing my ass off for saving my newbie friends' butts.
Re:Just let me get this straight... (Score:2)
RTFM on integrated security
isql
--Shoeboy
Re:Ok (Score:2)
The next question is: how come this isn't big news?
I think that there's a benign answer to this one: It's not sexy anymore.
When the Piranha thing became known, MS had just been beaten to death over all sorts of security bugs, including their backdoor fiasco. The general subject was hot news.
Now a security company (friendly to MS, of course), sends out a press release with everything short of " Back door security vulnerability virus!!!! in neon pink.
For MS apologists, this would look like a silver smoke grenade to cover their own back door. They're going to push it all they can. Sites like MSN could probably be expected to push it to the max.
Properly spun, it would look, to many news editors, like 'the next big headline'. The last thing that they'll want is to be scooped. Given the time constraints and lack of technical savy on the part of many journalists, they're most likely to eat the press release and regurgitate with minimal digestion.
In this case, however, back doors and default passwords have been out of the news for a while now. Sites affected are likely to be small to medium (yahoo and Hotmail better have sysadmins who know to change the password). It's simply not sexy.
As an analogy: If some US sailor had dropped a hand grenade and blown up two of his buddies on a US Nuclear Sub 6 weeks ago, it would have been front page news at the sub's home port, and rated a light aside anywhere else. If it happened this week, with the Kursk a multi-billion dollar mass coffin on the bottom of the ocean, it would be front page news. The news itself wouldn't be any different, but the context would.
Never assign beligerance to something that can be adequately explained by mere stupidity.
Re:Oh, come *on* (Score:2)
This is commonly left open by MSCE consultants. (Score:3)
Most of the sites that were in this sorry state were systems put together by MCSE consultants.
Now, I don't have hard evidence to back this up, but I think you'd be pretty unlikely to get that kind of sorry ass configuration from IBM, Oracle or Sun certified consultants using Unix systems. (Linux is another story, but they're not even nearly in the same league as Microsoft when it comes to professional services and turnkey solutions.)
The meatspace metaphor is more like hiring a certified contractor from the world's biggest burglar alarm company to install a home security system, and he leaves the default disable code in the system or installs the master override switch on the outside of your house. The alarm company may not be directly at fault, but there is a strong case for negligence/fraud regarding the "certification" program that is really just a marketing tool.
Re:Just let me get this straight... (Score:3)
Re:Oh, come *on* (Score:2)
When I last used VMS c. 10 years ago, you had to enter new passwords for priviliged accounts as part of the installation process. I know this personally, because I did quite a few VMS installations myself.
The "standards" you report were just the stupidity of bogo-gurus that wanted an easy-to-remember password. Yes, I heard of lots of security audits where the first test was to try to log on to "system" with "manager", and lots of people failed it. But in every case it was because some dumbass typed "manager" in and then re-typed it for verification.
Lots of VMS-based software products created an account when you installed them, but without fail you had to pick your own password when you installed the product, if it was a Digital product. (Most 3rd-party s/w required it as well because it was an easy call in the VMS installation library.)
Possibly the VMS engineers have gotten stupid in the last 10 years, but I doubt it.
--
Re:Ding, ding, ding, we have a winner. (Score:2)
Simple explanation. The RH "backdoor" came up about a week after the (false alarm) "weenies" backdoor scare for Windows. The media had to protect their interests by making much of the fact that RH was "just as bad" as their primary source of ad revenue.
Their fears of people migrating from Windows to Linux (and thus cutting off their primary source of revenue) seem to be well founded, because fear of deliberate backdoors is one of the most oft cited reasons for parties outside the USA to want to use OSS.
Now the situation is just the opposite, i.e. this makes MS look bad rather than RH, and the media don't want to bite the hand that feeds them.
--
Re:NOT a vulnerability (Score:2)
Microsoft makes security gaffe, they get to say "Pay no attention to the man behind the curtain...look over there at that shiny new SQL 2000! Buy it today for $umpty bajillion dollars!". Media buys it lock stock and barrel. (mostly)
Red Hat makes minor, non-destructive security gaffe, and the media calls into question an entire programming philosophy. (mostly)
The mechanics of the gaffe are not really interesting to the REAL issue here...namely, the self-administered blowjob Microsoft enjoys on the major news organs (one of which has become MS's bitch).
You're right. Anybody who doesn't change the SA password shouldn't be allowed near any devices with buttons on them. However, Microsoft should have been pilloried for this, and they weren't. They successfully pointed the finger at the hapless (clueless, feckless, reckless, and really really dumb) admins whose training they (MS) designed (poorly) and subsidized and advertised.
(Enjoying the parentheticals?)
Re:Oh, come *on* (Score:2)
If you do not change default passwords, you are an idiot.
If you do not place your database server inside your firewall, you are an idiot
If you let your ASP application connect to the database as sa, you are an idiot.
If the database users you use to connect to the database has priviliges to do anything more than they need, you are an idiot.
If you do not check every user data (text fields, url's etc) before passing them on to the database, you are an idiot.
If you are an idiot: thank you for purchasing this software. Too bad you are too stupid to use it.
Re:BUILTIN/System not the same as a user account (Score:2)
Bad analogy, try this: (Score:4)
Nope, more like you have a lock installed on your door made by a manufacturer who ships all locks keyed to the same key, and expects you to re-key the lock when you install it. You do lock the door behind you (but haven't rekeyed the lock) and somebody else using his copy of the key breaks into your house.
This puts 3, the company that made the lock, at least partly in the wrong, although it's probably still your fault for choosing that lock company in the first place.
Re:the password is (Score:2)
Ok (Score:3)
When you setup the software, it creates the sa account and asks you to set a password. It is blank by default. If you don't set one, you are an idiot.
But it doesn't matter if the default is blank or 30 characters long, if it's a default you should change it. This is true with any piece of software, MS or otherwise. And of course OSS is going to get bashed, since you have so many zealots SCREAMING about how secure OSS is, and how crappy MS is.
EHA
Oh for crying out loud!!! (Score:2)
http://www.microsoft.com/tec hnet/security/database.asp [microsoft.com]
When you read those articles, for example the SQLserver 7 security how to here [microsoft.com], with good tips on securing databases inside SQLserver, ODBC links to databases etc etc, you'll learn that SEVERAL TIMES you're advised to give the 'sa' account a secure password (that is: a password difficult to guess) and NEVER USE the 'sa' account again, only in case of trouble. You're adviced to setup accounts in NT and to use these inside SQLserver, and how to use NT security over SQLserver security (thus, using NT accounts instead of SQLserver accounts, like the 'sa' account, over thrusted pipes.)
I simply don't understand why MS has to be blamed for typical misbehaviour of end-users. If an end user doesn't want to read the articles online or doesn't want to understand the issues concerning security and internet when installing and setting up corporate systems (we're not talking a deskop system here), why is it suddenly the vendor's problem? "Yes, dear RedHat helpdesk guy, I did rm -rf /* when I was logged in as root, why is it MY fault that everything is gone?".
--
Of course it wasn't news (Score:2)
Re:Just let me get this straight... (Score:2)
Can anybody confirm this, and confirm that this is not true of pirana? Ie: is SQL useless unless the user logs in at least once, and is pirana usable without using the password.
Amoung all the noise here, this is the first coherent response that indicates that in fact the two pieces of software might be different.
It's all about what qualifies as "news" (Score:4)
Unbiased reporting is not possible (Score:4)
--
Facts all backwards. (Score:2)
--
Re:*grin* Here's another... (Score:2)
---
Re:Oh, come *on* (Score:2)
sig:
Repeat after me. (Score:2)
Repeat after me. Installations should be secure by default, insecure due to administrator action. The converse is NOT true.
So now, for penance, I suggest you go to OpenBSD [openbsd.org] and catch a clue on creating systems with security appropriate for being placed open on the net.
Same old situation (Score:2)
What I would like to see is an article in some major publication that points out that anyone dumb enough to *not* change a *default* password that allows a user "god-like powers" is going to be experiencing some problems whether they are using open-source or proprietary systems. If you don't change default behavior of your machines, that isn't really the fault of the company that shipped it to you. That's just bad policy.
Re:Releasing details of vulnerabilities (Score:2)
People still distrust MS security. (Score:2)
Remember when we could laugh at e-mail forwards like "Do not open a message with 'Good times' in the subject"? Well, thanks to Microsoft innovations, these are now very real advisories. The IT department at the large office where I work put up hundreds of flyers to ensure that people didn't open these attachments. Many people still did, out of curiosity or just plain stupidity. The solution? Reconfigure the mail server to reject these things outright.
Microsoft has cost many people hours in overtime reconfiguring systems that were designed poorly from the get-go, and then has the gall to blame administrators. Good Lord, man, someone needs a whooping with the clue stick.
Re:Just let me get this straight... (Score:2)
So who's to blame? The manufacturer for handing out generic keys? The couple for not reading the manual? I think it's pretty clear that the manufacturer should be to blame for not telling the couple the keys were generic when he handed them out.
This isn't news. (Score:2)
On the other hand, open source folks usually like to crow about the security of their systems. Consequently, a security hole (even one like this, where the vulnerability is due to incompetent administration) is news.
Response to Fred Moody (who misquoted me, grrr). (Score:2)
Fred Moody was nice enough to quote me and completely take them out of context/etc. My response to him: http://www.securityportal. com/topnews/moody20000821.html [securityportal.com].
Changing it is the fun part. (Score:2)
I'm in Dilbert Hell!
Re:The difference here... (Score:2)
My understanding was that Piranha was NOT enabled by default (It may have ben installed, but default configs did not run it.)
Well, default passwords aren't limited to m$ (Score:3)
MySQL (I'm rusty here: correct me if I'm wrong) also defaults the root user to no password, like the m$ sa user.
Not defending m$: Just pointing out that this is fairly common practice, and that there is indeed some responsibility to "know what you're doing" when opening a database up to the world
Re:Releasing details of vulnerabilities (Score:3)
The Power of the Media (Score:2)
wishus
Vote for freedom! [harrybrowne2000.org]
---
Re:Just let me get this straight... (Score:2)
5. The insurance company, for publicizing a case just like this that happened in the neighborhood, but implying that only Open Source houses were vulnerable.
Fighting bias with reverse bias (Score:2)
Then turns around and blasts Microsoft for an identical issue (which of course is now a major bug!). And to top it off, the media gets blamed for bias... talk about your pot and your fscking kettle.
It's true... every remotely competant sysadmin has already changed the sa password and it's been common knowledge for years. It's a stupid vulnerablitiy that M$ should fix by prompting for an sa password as part of install. Its almost exactly like the RedHat non-bug, and as a result, is a non-bug now too. It IS a design flaw and it SHOULD be corrected.
- StaticLimit
Everybody knows... (Score:2)
"Everybody knows that the dice are loaded...
Everybody rolls with their fingers crossed.
Everybody knows that the war is over...
Everybody knows that the good guys lost.
Everybody knows that...
Funny thing about that song - no matter where you are or what you're doing, the lyrics seem uncannily relevant to what is happening.
(Maybe I need to burn me a Happy Album (with lashings of Optimism)).
NOT a vulnerability (Score:5)
The fact that there might be someone out there clueless enough to omit this essential step is a far greater security concern than the fact that MS didn't include the changing of the sa password in the install wizard. Bottom line is, if you expect to be secure, you have to have people who know what they are doing. Someone has to read between the lines of all the GUI's and wizards and actually know what is going on.
i HAVE read about it before... (Score:2)
So maybe it's not a technical article... but the media has reported on this vulnerability of SQL Server... and the criticism is from Microsoft-sponsored MSNBC, no less.
-rt-
That's not all... (Score:4)
An undocumented HTTP request header of "Translate: f" will cause the web server to return the source code of an ASP page! And often, this source code contains juicy tidbits like SQL server passwords, not to mention the business logic behind the web site.
Upgrading to W2K SP1 is enough to fix this bug, but with Microsoft's history of NT4 service packs, it's understandable that nobody is in a hurry to upgrade.
An actual case (Score:2)
I asked the vendor two very important questions:
1) Why am I allowing all of these other machines to connect as the sysadmin anyway??
2) When will this be fixed?
The answer to both? "Um..."
I know many of you will say that this is a case that won't happen often, but I beg to differ:
One of our Sun based systems has a "default" root password. Changing your root passwd has the unfortunate side effect of none of the users being able to log in. The company that sold us the software has no idea why this is, and we were the first site to report this vulnerability. (?backdoor?) This is a vendor that has been in business for 20 years, and our systems are 5-6 years old. Of course this does mean that I could wreck the publishing industry some day...
Of course, an attach to an NT workstation on port 139 and a "net users" can yield up a domains worth of unames, and trying each with a blank password is almost guaranteed to get you into most corporate domains. Extract the SAM DB and get a copy of L0phtcrack...
Some days this stuff is just too easy...
Outlaw blank passwords!!!!!
Always change and default passwords while the vendor is still in the building!!! If you veer recieve a machine that is vulnerable in the way mentioned above, refuse delivery. Tell the vendor that you will not sign off on the install until these are fixed, and also that they will not get paid....
You are already ahead of 80% of admins out there.
~Hammy
"Good, Bad, I'm the guy with the root access." ~AOD
No (Score:4)
-jpowers
BUILTIN/System not the same as a user account (Score:2)
Never underestimate the stupidity of Micrsoft (Score:4)
Re:Releasing details of vulnerabilities (Score:2)
More directly, it's like RedHat installing the system with an empty root password. If you've got a UNIX veteran installing the system who KNOWS about the login, KNOWS how dangerous it is and doesn't just forget to change all these, not necessarily documented, default user passwords then you're fine.
On the other hand, the users who don't know to fix this without having to be told are the most at risk. Given that MS claims to be the OS for ignorant users ("linux is for experts") this is kinda like the pesticide manufacturers promoting cherry and bubble-gum flavoured pesticides (I kid you not! [vancouversun.com])
It also sounds like the SQL server may CREATE an user with a blank password. If this is the case, the it would become a case of a login that didn't previously exist suddenly gives remote users the ability to seriously 'own' your machine.
In any case, this is rather like Linux installing with a blank root password. (or MySql installer adding a root user with no password, if that's what this bug does). Any half-ass distribution source should know far better than to do something like that.
You can blame the Royal Swiss Navy [vcn.bc.ca] for not replacing the screen doors on their submarines, but it was a stupid manufacturer who installed them in the first place.
Re:So why haven't you read about it? (Score:2)
Those of us who watch security probing trends, noticed a huge increase in scanning on ports 1433 and 1434. When there was an M$SQL server sitting on 1433, the script checked for a blank password. It took a month of detective work by the white hats to come up with a reason for the sudden increase in this particular exploit. Now the egg is on micr~1.oft's face, but their PR department has squashed most news coverage, which is the reason for this
the AC
Missing the point (Score:5)
If you omit the section 'Piranha: A Case Study' above, you could be right.
This is not about whether an having a default password is leaving open a backdoor, but about the media treatment of Linux and NT.
Linux (well, a linux service) has a theoretical problem, only allowing read-only access, and no reports of it ever actually being exploited: Linux is "basically a bunch of peoples' hobby."
Windows (you know the drill) has a real problem, allowing root equivalent access, it *IS* actually being exploited: Eerie silence.
Why?
Is this a media conspiracy against Linux?
Probably not. Probably just lazy journalism.
The minute that MS heard about piranha, they will have gone into spin frenzy, putting words into journalists mouths, and basicly writing the reports for them. We can't stop this happening - we just have to do it ourselves.
Linux just needs better PR.
Why have you forsaken us, ESR?
cheers,
G
I'll tell you why... (Score:2)
How about because most pieces of software for the past 30 years have shipped with default passwords?
So why haven't you read about it? (Score:5)
Seriously, this exploit has been known for many weeks now. Probes for MS-SQL ports have equalled all other probes on our honeypots. When we did put up an MS-SQL server and recorded the responses, it seems there are already several kits out there looking for a blank sa password. Silly us, we set the sa password to sa, and nobody guessed
You are right about the press giving micr~1.oft a free ride. But wait until a this exploit gets some better kits. 'Rooting' an SQL db does not give you as much control over a machine as rooting the whole OS does, and the general lack of SQL knowledge out there will limit what script kiddies can do. But given the widespread use of M$SQL server for web engines, there should be some spectacular hacks in the coming months.
Other large commercial DBs require you to set the sa password as part of the installation process.
the AC
*grin* Here's another... (Score:5)
Just let me get this straight... (Score:5)
I don't know the details of the situation, I admit.
Now someone finally realizes that the sa account in MS-SQL 7.0 ships with no password.. so did 6.5 BackOffice Edition.
To complete the setup of the server, and create the storage space to STORE your data (read: You can't.. can NOT.. skip this step and expect it to work right, er, at all.) you have to login as 'sa' with no password.
So from the very start, the admin KNOWS that there is no password, because hes already logged in to finish configuration.
Is it *REALLY* Microsofts fault, and should they *REALLY* call this a vulnerability, when the admin KNOWINGLY leaves a system account with a blank password exposed to the Internet in all its glory?
Lets take this little bit of humor into meatspace.. You open the biggest door to your house to get in, and leave it open. You settle in for a day, and then go out to party... but you leave the door open still. You are robbed blind and silly, and theres not even a broken window, because *you* left the door open.
Who is at fault? (Other than the robber)
1. The person who built your house
2. The bank, for owning your house
3. The company that made the lock
4. Your sorry ass for leaving the door open
I vote 4. Who's with me?
Obviously an installation package flub. (Score:4)
I think that this is just a classic omission on the part of the Microsoft (and Red Hat) software engineers. This is the reason why much of the software released as 1.0 is actually beta quality.
If I had my way, I'd add on a "gamma" software stage; the requirements of this stage being:
Full functionality,
Passed the 99 runtime test (ran the latest build at least 99 times without a single hitch)
Not quite tested on all systems (hence, the gamma)
It's closed source! (Score:4)
Re:I'll tell you why... (Score:2)
Ok, so why was the Pirhana default password a story then? By your lights, that shouldn't have been reported either.
I think the Pirhana thing hit big due to the discovery of the "seineew era sreenigne epacsteN" thing in a chunk of MS software that I can't recall right now just a few days earlier, kind of a tit-for-tat thing. In any event, I think M$ needs all the media help it can get, in the face of antitrust, ILOVEYOU and the delays in getting any kind of a patch out, among other things.
On second thought, fudge 'em. About time they got dragged into the light. Maybe someone will also rake Red Hat and other Linux distributors over the coals a bit for their gaping-wide default installs:)
The story does make a good point about what kind of stories the media picks up on and how such things are reported, although I tend to cringe whenever I see a "Linux vs. Windows" story on
media contradiction... of course (Score:2)
Let's look at how the media is contradicting themselves on this issue.
Remember the extreme media coverage during the Microsoft trials? Remember how it was in the top stories for weeks? Understand how it is the FEDERAL GOVERNMENT that is fighting Micro$oft? Why is the media giving them a free pass now, when we all know that the media is the little darling child of the FEDERAL GOVERNMENT? Does this make any sense?!?! NO!!
An anology: today you're supposed to stop at red lights and go on green. Tomorrow is a different day... perhaps we will stop on green and go on red. See what I mean?
Conclusion: The media has simply stuck itself in another contradiction that the mass blithering idiotic public won't see or understand. I like the theory that somehow Micro$oft is being carried under the wings of the media to hide this major security flaw. But of course, that doesn't make sense because the media is on the Government's side attacking Micro$oft... one would think that they would be all over this like a pack of rapid dogs! Where's the sanity?
Perhaps we can assume that Micro$oft has the ability to buy media coverage, or buy the lack of it. Perhaps they paid the media to focus on piranha. Perhaps they paid the media to ignore SQL 7.0. Perhaps I'm not a micro$oft fan... actually, it's definite and I haven't been for a long time.
--cr@ckwhore
Re:Releasing details of vulnerabilities (Score:2)
This is _exactly_ what I've been saying for the longest. Forget about Outlook
and its craptacular features and remember Macro BASIC. How long have macro
viruses been around? 10 years? At least. Has MS done _absolutely anything_
about them? Oh, Office 2000 has some features that keep these things from
happening, but that's an age-old vulnerability! MS certainly has a lot of
fault in this, and it responsible for quite a bit of its misfortune [from
Concept all the way to the latest ska and so on], but who is really the
responsible party now? The idiots who still use these products and put faith
in them, believing that the entire work of macro viruses is "normal", and
that it's all the "damn hackers'" fault.
What could have been done? Well, let's see...
Sandboxing
Altering abused commands
Restricting writes to primary templates
etc...
Of course, this has only bred a response now, and I don't know of any place
that it's really been put to the test; however, it's sure as hell made NAI
and Symantec richer than hell over something that could have [and should have!]
been fixed long ago.
Re:People still distrust MS security. (Score:2)
I was talking to a co-worker who had been working here at the start of the Melissa virus outbreak. As the virus was first detected at our site, he received an urgent message saying "DO NOT OPEN ANY E-MAIL ATTACHMENTS!" For further information, he was referred to the enclosed Word document.
The virus security team now copies and pastes text into e-mail, the old-fashioned way.
Re:It is documented - if you look for it.... (Score:2)
Re:I could be wrong, but... (Score:2)
sig:
Re:*grin* Here's another... (Score:5)
Did you know that SQL Server passwords are transmitted in plain text across the network unless you are using multiprotocol encryption?
That's another nice one.
--Shoeboy
this is old news (Score:2)
should we really be suprised by ms's lack of security?
You over-estimate MS Product buyers (Score:2)
Therefore, if a MS product does something by default, a typical MS users feels its best left unchanged. After all, MS must know much more about computers than they do. That's why they're so successful, right?
MS even explains how the default blank password is a feature in that it facilitates 'Integrated Mode' i.e. letting NT manage access security. They say in their response to Bugtraq, that its only users who choose to run in 'Mixed Mode' (which they don't reccommend) that are at risk from the blank password. See http://www.microsoft.com/t echnet/SQL/Technote/secure.asp [microsoft.com] for more.
Of course they also say that there is a forced change of the password in SQL Server 2000.
Also note that Oracle has something four default usernames with default passwords, and that these are published in most books on Oracle. I think the real concern is that there is a known vulnerability in SQL Server that lets you gain control of the OS itself from within SQL Server, and I don't think MS response to Bugtraq has addressed this, other than to say you should have a firewall (like this will protect you from users within your own organization).
The Real Story ... (Score:3)
in a story posted minutes after this story [slashdot.org] about IBM, and its plans to open source something as useful [ibm.com] as Websphere.
Some of ISS's pages aren't opening right now (/. effect?) so I can't see if Mr. Rouland has shot himself in the other foot yet
Derwen
Comment removed (Score:5)
I agree, not a problem (Score:2)
I also agree that software installs SHOULD ask for an admin password. In the case of SQL server, doing so is not that big of a deal. The install should say
1: What do you want for the sa password.
2: Pick an NT account/group for admin rights. AND make them pick at least one.
That way, SOMEONE is an admin and can change the sa password
---
big problem (Score:3)
As a consultant, I am at 2-5 sites per year. I have seen firsthand multiple production systems, and production systems connected to the internet still utilizing the default null sa password. This is widespread.
Typically, the current admins are aghast at it, and it's "that way since I got here". Changes are then not made as it affects too many proccesses. (code: too much work to do it right)
There's lots of excuses for it, none hold water, yet it remains. cracker paradise.
Re:Oh, come *on* (Score:2)
sig:
why even "nobody" access is a problem (Score:5)
Well, it automatically turns any other local exploits into effectively remote exploits. So an exploit in some dumb little suid game on your system, which would normally only let local users get root, suddenly mushrooms into an exploit that gives anyone root.
An attacker need only get in as user nobody, install a real backdoor, and wait. Eventually a local exploit will be found, and they can finish cracking the system.
--
Re:NOT a vulnerability (Score:4)
Now, no one from Microsoft is going to tell me that using an OpenBSD firewall is going to make my website more secure. Yet this is the type of thing that a good sysadmin will be able to do. You have to understand enough not to be dependent on any particular vendor.
Conversely, when I first became a sysadmin, I learned the concepts rather than the actual commands first. Regardless of what system you use(I started on AIX), the basic tasks are the same. You have to monitor the system, add/replace hardware, add/delete users, maintain a backup scheme, etc. etc. The actual commands or buttons you push are trivial. The concepts are what is important.
Why the disparity happens (Score:2)
Really this strong coverage of redhat and weak coverage of Microsoft is just further illustration of how shoddy Microsoft's products are.
---
A simple explanation? (Score:2)
Re:what about mySQL? (Score:2)