Worm Exploiting Solaris Telnetd Vulnerability 164
MichaelSmith writes "Several news sites are reporting that a worm is starting to exploit the Solaris Telnet 0-day vulnerability. By adding simple text to the Telnet command, the system will skip asking for a username and password. If the systems are installed out of the box, they automatically come Telnet-enabled. 'The SANS Internet Storm Center, which monitors Internet threats, has noticed some increase in activity on the network port used by Solaris' telnet feature, according to an ISC blog posted on Tuesday. "One hopes that there aren't that many publicly reachable Solaris systems running telnet," ISC staffer Joel Esler wrote.'"
Yep. (Score:5, Insightful)
Use SSH.
...oh, and don't forget to wear your raincoat.
Re:Yep. (Score:5, Insightful)
Yeah, that was my response when I first heard of this bug/exploit. But the real question is, should systems be shiped with telnet enabled? Obviously the answer is "no", but vendors seem to be slow to get this message.
And note that this worm is enabled by a bug in Solaris's implementation of telnet, not by telnet itself. A similar bug in ssh would have had the same effect.
Re:Yep. (Score:4, Funny)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Insightful)
Re: (Score:2)
Re: (Score:2)
what an idiotic question
I think the question was rhetorical.
My question is: Who the hell still uses telnet? I don't even use telnet on my LAN.
Re: (Score:3, Funny)
Stop repeating that!
They don't use telnet, and that plaintext you see when sniffing their network is your natural ability to crack encryption.
How many times do I have to tell you that you're special?!
Now, back to the task I've given you. The NSA won't be lending me your brain again if you spend all my alloted time on
Re: (Score:3, Interesting)
This is Sun. Remember "+" in hosts.equiv ? They deliberately shipped with a known insecure default config in order to reduce support costs / complaints ("ease-of-use" was allegedly considered more important than security).
Re: (Score:3, Insightful)
Re: (Score:3, Funny)
Re: (Score:2)
Re: (Score:2)
Yeah, that was my response when I first heard of this bug/exploit. But the real question is, should systems be shiped with telnet enabled? Obviously the answer is "no", but vendors seem to be slow to get this message.
Re: (Score:2)
Serious answers:
1: Ummm, Solaris ships with telnet enabled. Did you see the headline of the article you are posting in regards to?
Ummm, No, it doesn't. But I've only got about 1000 of 'em to use as a sample size so maybe my experience is too limited.
2: Many people, or there would be no worm, if you want a concrete example then look elsewhere.
Your (2) depends on your (1) to be true, and I suspect that it is not.
As others have pointed out, many of whom even stand behind their statements with their identity, the admin has to specifically decide they want telnet enabled. Exposing telnet to anything, especially the public internet, has been widely regarded as an Astonishingly Bad Idea for many years.
Re: (Score:2)
Um yes it does. If you have 1000 machines you probably have an image, jumpstart installation, custom installer, or possibly newer OS CDs/DVDs. The admin, since its probably not you, also could have disabled it after the fact.
Assume much? Hell yes we have a jumpstart infrastructure. And my question remains, who in the world takes a raw box from Sun with an OS that they shipped with and use it? First of all, the partitioning is very unlikely to be suitable for, well, anything by default.
Telnet has been enabled by default for a long time on the default installs going back quite a ways on up well into several solaris 10 sub-releases.
Oddly enough, several non-AC's have posted otherwise. I tend to trust their word over that of someone not even willing to say who they are.
Re: (Score:2)
Eh? My response was, who cares, no one uses it, but I'll check the top leevl comments to see if there was anything interesting or insightfull. I guess not
Re: (Score:2)
Re: (Score:3, Insightful)
Yeah, that was my response when I first heard of this bug/exploit. But the real question is, should systems be shiped with telnet enabled? Obviously the answer is "no", but vendors seem to be slow to get this message.
Why the hell not? Installation of Solaris is not exactly an "end user" type of operations. More likely it would be performed by an IT professional. Having telnet enabled initially makes it easy to setup the system from another location without worrying about making ssh or anything else work
Re: (Score:2)
So the convenience of the admin is more important than the security of the system? Your logic is the reason security is such a problem. Besides, what's the big deal in "making ssh work"? I've never had any trouble.
Incidentally, Solaris 11 will be shipped with all unnecessary services (including telnet) disabled by default.
Re: (Score:2)
So the convenience of the admin is more important than the security of the system?
The security of the system is of FUNDAMENTAL importance. It is a failure of the administrator which turns telnet into a vulnerability. Security ultimately derives from actions taken by human beings. If humans don't do what is appropriate and security is compromised, it is the humans who have failed, not the system.
Re: (Score:2)
Telnet is an obsolete protocol that nobody needs. If you want to show your "responsibility", take the trouble to learn how to use SSH. Or if you must use telnet, live with the fact that OS vendors are going to make you turn it on, instead of leaving an insecure protocol enabled by default.
Re: (Score:2)
Re:Yep. (Score:4, Insightful)
MOD PARENT UP (Score:2)
Exactly. All these comments to the effect of "telnetd should be off by default" are missing the point. Yes, telnetd should be off by default, but that's just so that dumb users don't get used to typing in their passwords over a cleartext connection.
It makes me wonder about how much original thought there is on Slashdot, versus how many comments are just clueless people using technical terms in a syntactically-correct fashion without really understanding what they're saying.
If I went back into the Slas
Re: (Score:2)
For those of you who don't realize this...you can break into *any* vanilla sshd by guessing the right password...just the same as if you were running telnetd. The *only* difference is somewhat greater protection over having your password sniffed over the network while in transit. Unless, of course, you're running some sort of PKI infrastructure with cli
SSHD DOES give you magical powers - real passwords (Score:3, Insightful)
At least they do come with a binch of stuff disabled by default, and with a fairly recent version of SSH.
I *DO* have numerous Solaris hosts happily floating in the effuent of an unfirewalled Internet connection, and they are probe
Woah nelly... (Score:2)
in
CRYPT_DEFAULT=__unix__ => CRYPT_DEFAULT=1
This makes Solaris PAM compatible with Linux/BSD-style MD5 shadow hashes distributed via file, NIS, LDAP, or whatever. It will process an arbitrarily long password.
And in that case, you should edit your
Re: (Score:2)
We use public key authentication, with passwords, and bypass password authentication completely, shoudl have said that.
Oh well, won't be the first time I go
Re: (Score:2)
You must be new here.
That's because obvious truths == positive moderation. Inobvious truths and
Re: (Score:2)
Keeping user accounts secure provides for the protection of the system. It's usually a lot easier to escalate from a local user to root than to simply get remote root.
Re: (Score:2)
Correction (Score:3, Interesting)
Correction: that's one of the first things any good distro never turns on.
Linux and BSD had it for a long time before Solaris had it in the standard install. And you can't even enable telnetd on OS X since about 10.2 or so, unless you know how to edit the right config files in /etc.
Re: (Score:2)
Re: (Score:2)
I kind of thought that ssh had replaced telnet a long time ago.
Then again on a server maybe nothing should be turned on by default.
Re: (Score:2)
I have to admit to being amazed that telnetd is turned on at all in an installation of Solaris. In any Linux distro you have to enable it - heck, you usually have to do some digging for telnet and install it.
I remember a couple years ago in my role as a Linux admin I had to help an outside vendor access a specialized Solaris box one of our research groups used, and they wanted telnet access to it. They were shocked (and remember, this was only a couple years ago) that my network team wouldn't put an exc
Re: (Score:2)
Re: (Score:2)
Oh no (Score:4, Funny)
Re: (Score:2)
(Nowhere does it say that the solaris servers are running telnet. But our IT organization has a connection to a state agency, and today the state agency warned us they had a virus on the rampage. That agency has one of those solaris servers running in one of our mini data centers.)
Free software to the rescue? (Score:1)
-uso.
Re: (Score:2, Informative)
It won't help because the vulnerability is in login (that telnetd calls) and not with telenetd. Since this is almost a month old and everyone should know by now, here it is -
telnet -l "-froot" [hostname]
Re: (Score:2)
Also, "Free software to the rescue" is rather misleading as well; the telnetd shipping in Solaris has been open source for almost 2 years. In any case, the bug has already been fixed and patches are available.
Re: (Score:2)
I've read the code and the history in question and I probably understand the problem far better than you do. Assumption of ignorance on the part of those with whom you disagree is the very kind of "knee-jerk reaction" you assert I've had.
Did you even bother to do a "man login" to see what parms it takes? You expect login to not check for such things?
The man pages document those interfaces which are Public; that is, those which are intended for use by user
Mine is! (Score:3, Insightful)
Re: (Score:2)
Although in those cases I'd hope that they'd have everything nicely automated so that pushing out updates is just a matter running some utility that executes the update on all the machines. As Zed Shaw [zedshaw.com] says, "if you're ssh'ing in to your servers more than once a week, you haven't automated things enough."
Of course there will be exceptions - custom installations and whatnot - but hopefully a change like this could just b
Re: (Score:2)
Dude, many data centers have thousands of servers. Sun itself sells a blade system [sun.com] that puts 20 servers in a single rack. In that kind of environment, if you ever ssh into your systems, you haven't automated things enough!
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Sun itself sells a blade system that puts 20 servers in a single rack.
Sun's Blade system aren't particularly impressive from a density perspective - IBM's, with 14 blades per 7U (84 servers in a rack), are much more interesting.
Re: (Score:2)
Uh, dude, I think the point is that they don't have to--we can just write a worm that installs the patch for them...
Re: (Score:2)
I dare say that most sysadmins who keep up with patches don't have telnetd running.
Re: (Score:2)
Looks like -02 says it required a reboot but didn't; -03 does it right (I didn't get -02, I just disabled in.telnetd).
-02 is quite hiliarious, it fixes bug "6523815 LARGE vulnerability in telnetd"
Re: (Score:2)
1) You have 1200 Solaris production systems running various levels of Solaris, 7 through 10. You have an identical test environment, same 1200 severs running exactly the same version of everything. Add to this 700 odd UAT systems and about 500 dev systems. So now we are looking at 3600 servers. Now it's time to throw some bureaucracy into the mix.
2) Patches must be TESTED in the dev
I might have missed something.... (Score:4, Informative)
http://blogs.sun.com/tpenta/entry/the_in_telnetd_
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
For a reasonable commercial system downtime is measured in thousands of dollars of lost revenue per hour. You will want to update your post after you have had a CEO, CTO, CFO etc... throwing a hissy fit because the system is down... 'automatic update' as an excuse will get you fired, and rightly so.
Re: (Score:2)
Re: (Score:2)
Which is why I wouldn't like to have a system that doesn't patches security holes ASAP.
Re: (Score:2)
Which is why I wouldn't like to have a system that doesn't patches security holes ASAP.
It's been a long day... (Score:5, Insightful)
Isn't twenty days long enough to disable a remotely exploitable and totally unnecessery, unsafe service that no admin in his right mind should have enabled on a box connected to the net anyway?
Re:It's been a long day... (Score:4, Funny)
They are still searching.
Re: (Score:2)
Re: (Score:2)
Isn't twenty days long enough to disable a remotely exploitable and totally unnecessery, unsafe service that no admin in his right mind should have enabled on a box connected to the net anyway?
Yes, but some people are a little slow... others are just overworked... and then there are the stupid ones...
Honestly, does anybody have a use for telnet anymore? It really shouldn't be enabled by default anyway. I guess if your system isn't connected to the Internet you have no fears, but who would do that?
Re: (Score:2)
Re: (Score:3, Interesting)
With that said, no one should be running any insecu
Re: (Score:2)
Re: (Score:2)
Should have happened... (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2)
Amazing... (Score:2)
telwhat? (Score:3, Funny)
What year is it?
Re: (Score:2)
Other Telnet vulnerabilities (Score:3, Insightful)
Re:Other Telnet vulnerabilities (Score:4, Funny)
Re: (Score:2)
Re: (Score:2)
What proverb is that? (Score:3, Informative)
I'm pretty sure I never heard my mother say, "Son, if you ever expose a Telnet port to the Internet, I'll fire a rocket up your ass!"
Re: (Score:2)
Re: (Score:2)
Bob 37:528 goes on to say. "Close down all your ports, and only open the ones truely needed, or the you will learn why you should fear the rocket."
Informative? (Score:2)
Telnet for transparency? (Score:4, Interesting)
Large financial institutions in Europe use telnet, as use of encryption is restricted on their trusted networks, for reasons of transparency to the stock regulating authorities. (Googling for this phrase should get you the
If this is true (and not the post of a random troll), can anyone shed some light on this? For it seems very strange... There are many other way to provide transparency to the financial authorities without having to compromise your network no!?
A new box won't have this problem... (Score:3, Insightful)
Existing boxes need to fix this, but a patch has been out for a while - are we dealing with the "short bus" hackers that it took this long to actually exploit? Why, oh why, doesn't Solaris warrant better hackers?
Re: (Score:2)
But, the installer does explain (in no uncertain terms) that you should probably disable Network Services - you can alway enable the services you need...
Thanks,
Re: (Score:2)
.
congradulations... (Score:2)
isn't even coming close to their trend on activity-by-ports page
So they finally secured sendmail and fingerd? (Score:2)
It's good to get the word out about this (Score:2)
So if you or someone you know runs Solaris, but uses SSH, make sure that telnet is 100% disabled for sure!
Telnet?! (Score:2)
Wecome back Morris (Score:2)
Why use telnet, anyway? (Score:2)
So besides the old argument of "I have legacy systems / applications wh
Re: (Score:3, Informative)
So besides the old argument of "I have legacy systems / applications which rely on telnet and other outdated modes of communication", why would people use telnet? Laziness? Ignorance? What else am I missing here?
People who use telnet on a large scale that I know of include:
And is this somehow different that other versions? (Score:2)
Pardon my ignorance, but doesn't Solaris use TCP port 23 like every other version of telnet in the universe, unless it's specifically redirected to a different port?
The real vulnerability... telnet enabled at all! (Score:2)
NOT.CHUFFING.WELL.TRUE. (Score:2)
And, as has been noted, the patch has been available for about 3 weeks now.
This is a terrible bug, which should never have got in to Solaris in the first place, but it did, and it was fixed.
OTOH, if you've
a) Chosen to run telnetd in the first place, and
b) Explicitly enabled remote root login for maximum damange
Then you can't really whine that "if a cracker can access the network, he can get root", because presumably "even if this bug did n
Re: (Score:3, Interesting)
Which is the default, these days.
No, a 0 day exploit means even if you patch every day, you're still at risk. But you know what? You're at risk every day simply by being alive. You could be hit by a meteor the next second! Oh noes!
Grow up and stop fearmongering. Th