nanog mailing list archives

RE: Warning: Cisco RW community backdoor.


From: "Chris Hallman" <challman () cisco com>
Date: Tue, 27 Feb 2001 01:25:41 -0500


Yes, the info is due to be made public today. We have been making personal
calls to numerous ISPs as early of 2/20.



Regards,

Chris Hallman
NSE NSP North Florida
3660 Maguire Blvd., Suite 200
Orlando, Fl. 32803
407-897-8744 office
407-903-7591 off-site office
800-365-4578 pager
email: mailto:challman () cisco com


-----Original Message-----
From: owner-nanog () merit edu [mailto:owner-nanog () merit edu]On Behalf Of
John Fraizer
Sent: Monday, February 26, 2001 11:07 PM
To: Sean Donelan
Cc: nanog () merit edu
Subject: Re: Warning: Cisco RW community backdoor.



On 26 Feb 2001, Sean Donelan wrote:


It appears more than one vendor shared the same SNMP library (or
SNMP programmer).  Folks have sent me evidence at least two other
vendor's equipment has similar responses to the same SNMP community
string ILMI.

However, there are other non-related SNMP issues.  Many SNMP
implementations included the default community strings "public"
and "private".  If the operator doesn't change them, the defaults
may still work.  The other common SNMP implementation issue is if
no community string is specified, the SNMP agent accepts any
community string.

If you are checking your network, I'd suggest checking for all
three possibilities.




IMHO, if no communities are supplied, the SNMP daemon should not respond
at all.

While I agree that "public" and "private" are "wellknowns," in most
implementations, they at least show up in the code.  Cisco chose to hide
this one where it would not show up in the code.  That IMHO is a very bad
thing and does bad things to my confidence level in Cisco.


---
John Fraizer
EnterZone, Inc








Current thread: