EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

11.23.08

Another Novell Flaw?

Posted in Novell, Security at 10:24 am by Dr. Roy Schestowitz

We’ve already seen Novell ignoring alleged security problems, despite reports from users. There have also been some new articles recently about kids that take control of their school’s network, probably thanks to loopholes in Novell’s software. Here is a video that came to YouTube a few hours ago.

Ogg Theora

Direct link

If it is not appropriate to have this video in here, we’ll remove it.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

37 Comments

  1. Ian said,

    November 23, 2008 at 1:03 pm

    Gravatar

    From what I can tell, there’s no direct hacks for Novell software in those videos, or the videos it’s responding to. The only flaws or exploits are for local windows machine privs.

    Roy, what Novell flaws do you see?

  2. Dan O'Brian said,

    November 23, 2008 at 1:11 pm

    Gravatar

    It looks like you also need to be the network admin with administrator rights on all the workstations to pull this off. Can you say “well, duh?”

  3. Dan O'Brian said,

    November 23, 2008 at 1:22 pm

    Gravatar

    Watching this again, the guy who made the video is showing how /unhackable/ Novell is, not how it /is/ hackable.

    The video is disproving what he calls “stupid” people that have supposedly explained how to hack a Novell network.

    For example, if you scan to 1:21, he says:

    C) A Keylogger can’t crack Novell encryption

    He then goes on to explain what his software is (called Stinger X-Series) which is software that runs on top of the Novell software which helps him dynamically defend against hackers in case they find something he hasn’t secured.

    This is not a video showing how insecure Novell is, it is a positive review of Novell.

  4. Dan O'Brian said,

    November 23, 2008 at 1:24 pm

    Gravatar

    Roy: I suggest you finish watching the video and understand what it’s talking about before you make a fool of yourself like you just did.

  5. Roy Schestowitz said,

    November 23, 2008 at 3:04 pm

    Gravatar

    iI already know this because I watched it twice. Compromise of local machines still seems possible. Also see the previous video/post that I link to.

  6. Dan O'Brian said,

    November 23, 2008 at 3:08 pm

    Gravatar

    Uh… how would it be possible? The video doesn’t prove that what you say is possible, it suggests that it isn’t.

    The video is in no way shape or form supporting evidence to your claim.

  7. Roy Schestowitz said,

    November 23, 2008 at 3:11 pm

    Gravatar

    Pay attention to the end. Also see:
    http://boycottnovell.com/2008/06/01/novell-security-vanity/

  8. biasedUser said,

    November 23, 2008 at 3:19 pm

    Gravatar

    after viewing you web site for months, it is fairly clear that your views are biased by some pathological hate for Novell,? Jealousy.
    you post a video that is an advertisement for a company to help secure Novell. They must have liked it enough to put time and energy into developing their product.
    Novell is moving away from its netware and here you are in 2008 showing netware, do you have any positive comments about Novell?
    what? did they not hire you for some job and you can’t get over it.
    Your site becomes more and more irrelevant as your one sidedness blinds you to a number of the positive contributions that Novell provides. Not everyone is Good or Evil. balance it out a bit you will feel better. forgiveness will give you some peace.

  9. Dan O'Brian said,

    November 23, 2008 at 3:20 pm

    Gravatar

    Here’s the end:

    BUT to hack the Network is not possible
    only DDOS attacks are the common
    forms of
    working hacks these days with Novell
    (6+)
    So remember: Workstation can be hacked, network can’t, Servers and internet proxies can be DDOS’ed

    As explained in the previous frame, Workstations can only be hacked if the admins are stupid (his words, not mine) and don’t secure them properly (e.g. if the admin allows users to install software or allow users to run software on a USB key or network drive.

  10. Dan O'Brian said,

    November 23, 2008 at 3:22 pm

    Gravatar

    Overall the video you linked is a testament to how secure Novell’s NetWare product is. Afterall, he says it cannot be hacked from the network – only workstations can be hacked and even then, only if the user has physical access to the machine (well, duh).

  11. Roy Schestowitz said,

    November 23, 2008 at 3:26 pm

    Gravatar

    Yes, duh. And see that previous video too.

  12. Jose_X said,

    November 23, 2008 at 3:58 pm

    Gravatar

    I think this got posted to show that, on a Netware setup, there may be some problems somewhere which can be exploited with nessus or with any other tool that might work similarly.

    There is also the other link which, unless staged or a lie, would indicate that Netware does have a real problem.

    Otherwise, the video does seem to be an ad attempting to sell Netware on its positives.. or else to be an ad of Nessus to show that it could penetrate and otherwise “solid” Netware.

    For the real truth, you’ll probably need to know more about Netware. Maybe this video was intended as a joke?

  13. Roy Schestowitz said,

    November 23, 2008 at 4:03 pm

    Gravatar

    To say that this promotes Netware is a little like saying that a Symantec ad indicates that Windows is secure.

  14. Jose_X said,

    November 23, 2008 at 4:31 pm

    Gravatar

    >> To say that this promotes Netware is a little like saying that a Symantec ad indicates that Windows is secure.

    I looked over it more carefully, and it does seem the video claims that you can hack the server basically by referencing the other link (JCT).

    I skimmed lightly over the actual exploit part the first time because:
    – I got distracted by all the noise earlier (that music was awesome),
    – I didn’t read the fine print early on,
    – I did not realize what JCT was,
    – Dan claimed it was about a client side only exploit (pass on the blame, sure),
    – everyone else said it was meaningless (…),
    – Dan also added that it was a positive for Netware (if you missed some of the crucial details, that is the impression given),
    – the blog entry wasn’t that clear over what “JCT” was or the that there was a dependency to that other link in order to understand the exploit,

    and (…drum roll…)

    – I didn’t bother to look more carefully.

    .. excuses excuses.

    From the second link, we find out JCT stands for “Jared, Camron, Tarron”. I’m guessing these are the three that discovered this problem.

    ***

    I hope others rebuttle or else silently recognize they made a mistake (as I did) and keep it in mind before the next attack.

    biasedUser? Dan?

    [Ian] >> Roy, what Novell flaws do you see?

    This response I’m writing and the one I left at the other link may help.

  15. Jose_X said,

    November 23, 2008 at 4:35 pm

    Gravatar

    >> I hope others rebuttle or else silently recognize they made a mistake (as I did) and keep it in mind before the next attack.

    In other words, before the next inevitable verbal attack on Roy and BN.

    Also, there is no need to be silent. A public statement recognizing a mistake would work for everyone.

    A *legitimate* rebuttal that doesn’t change the subject would also work.

  16. Dan O'Brian said,

    November 23, 2008 at 4:51 pm

    Gravatar

    Jose: this may be news to you, but if I have physical access to a Linux machine, I can bypass ACL’s too.

    Does this make Linux fundamentally insecure? Is this an exploit in Linux? No.

  17. Roy Schestowitz said,

    November 23, 2008 at 4:56 pm

    Gravatar

    I find this laughable. Heck, why not just give kids machines with complete and full privileges because ‘they can be cracked anyway’^TM.

    Speaking of which:

    http://www.securityfocus.com/archive/1/498471

    Kernel vulnerability found in Vista

    http://news.cnet.com/8301-1009_3-10106173-83.html

    Symantec warned about the new stack back in 2006.

    They pulled out BSD code, put in their own garbage.

    Priceless.

  18. Jose_X said,

    November 23, 2008 at 5:00 pm

    Gravatar

    Dan, we are talking about compromising other servers on the network from a client where you presumably don’t have rights to do so. Or at least that is my understanding of what Netware blah blah server and the JCT was about.

  19. Dan O'Brian said,

    November 23, 2008 at 5:32 pm

    Gravatar

    Jose: then you very clearly didn’t understand what he was talking about.

    He said it’s possible to hack WORKSTATIONS but not the servers.

    Do you even know how NetWare client works? You know, the part that runs on top of Windows?

    The /server/ runs the NetWare kernel and complete stack. Workstations run Windows and have added security added on top by the NetWare client.

    If you have physical access to the machine, you can force it to boot from a USB key, a cdrom, whatever and therefor bypass any ACL’s the system would normally boot with.

    You can do the same thing with any Linux box.

    The video linked says nothing about the server being hackable from a workstation.

  20. Roy Schestowitz said,

    November 23, 2008 at 5:39 pm

    Gravatar

    Hack or crack? Regardless: bypassing access restrictions by booting or opening up boxes ain’t the same thing as this.

  21. Jose_X said,

    November 23, 2008 at 6:13 pm

    Gravatar

    I don’t use Netware or know much about it.

    Here are two questions.

    1 — What is Zenworks?

    If you watch the end of the JCT detailed video, you’ll see a comment: “… full control over workstation and all Novell services.”

    My best guess for the meaning of “Novell services” would be of something provided by the network (meaning, to potentially include servers not on this host), but I suppose it could be talking about client services only.

    2 — Can you comment on this “Novell services” thing?

    [min 1:33 http://boycottnovell.com/2008/06/01/novell-security-vanity/ ]

  22. Josh Bell said,

    November 23, 2008 at 6:53 pm

    Gravatar

    Jose,

    Zenworks is a bunch of products but what I believe this guy or girl is talking about is Zenworks for Desktops. ZfD is a Novell product that distributes applications, allows admins to remote control PCs, and even invetories PCs. Zenworks allows and admin to find a user no matter where they are on the network.

    The Novell services he is talking about are those services that run on top of a Windows workstation not the NetWare server itself. The NetWare server itself can be secured a number of ways from using Secure.ncf which disables unloading DOS from memory, hence making it much more difficult to reboot the server by typeing the down command, will only allow you to load Netware loadable modules from the system path, making it difficult if not impossible for someone to put something on the server that shouldn’t be there and other security measures.

    You can buy third party products that will secure the console so unless you know the admin password you can’t get on the console to reboot it. You can set bios passwords so that even if the server reboots unless you know the bios password you can’t go further.

    What do you do to secure you Linux boxes? How do you harden them. The same things work on NetWare boxes.

  23. Jose_X said,

    November 23, 2008 at 7:42 pm

    Gravatar

    Josh, what does “admin” mean. Admin just for that box? If so, then that is a client only issue.

    However, if “admin” allows you to access services anywhere on the network as “admin”, then this is a real flaw either in the auth part of the protocol (for giving “admin” rights to a client that didn’t authenticate legitimately) or in part of the implementation.

  24. Ian said,

    November 23, 2008 at 7:57 pm

    Gravatar

    Jose,

    From what I could gather from the video, it was for the local windows machine. Every eDirectory tree is created with an admin user, literally named “admin”. That user by default has all rights to the directory tree, all NCP resources, and Novell NSS and TFS storage. There is no direct connection between a Windows local Administrator account and an eDirectory admin account, none. Having admin rights on the network doesn’t necessarily mean you have admin rights on the local machine(zenworks dynamic local users aside) and conversely, having administrator rights doesn’t mean you have admin rights “on the network”.

    This isn’t a Netware exploit, it’s a windows exploit. The computing.net thread followed up by one of the preceding videos has no mention of remote exploits, just social engineering about getting server room access. And even that won’t help you because even if you have direct access to a Novell server console, you can’t make any eDirectory and/or password changes without having the admin password anyway.

    The title of this post should be fixed to read this way: “Another Novell Flaw? No.”

  25. Josh Bell said,

    November 23, 2008 at 8:01 pm

    Gravatar

    For the video purposes it means admin rights on the box. Similar to Linux there is a root type account called admin that has authentication rights to everything. Just like a network admin knows the root passwords or the LDAP password that is used on Linux on the network admin knows the “admin” password to the entire e-Directory tree.

    Part of the reason the video explicitly states you need the teacher’s disk is you need more rights than a general student and if the network admin has any experience that still wouldn’t be enough rights to do any damage.

  26. G. Michaels said,

    November 23, 2008 at 8:02 pm

    Gravatar

    Sorry, this is patently (hah) ridiculous. Roy, did you actually watch and understand the whole thing?

    Note: writer of this comment adds absolutely nothing but stalking and personal attacks against readers, as documented here.

  27. Ian said,

    November 23, 2008 at 8:09 pm

    Gravatar

    I think the problem is a lack of basic technical knowledge by Roy as it relates to this issue and how Novell network, specifically edirectory rights, actually works. Couple that with the fact that the videos preceding the posted videos don’t actually make much sense with the mentions of “novell networks” and you get a murky message.

    Roy, I think you jumped the gun before you had a full understanding of what it meant.

  28. G. Michaels said,

    November 23, 2008 at 8:15 pm

    Gravatar

    But in true Fox News style, appending a question mark to the end of the headline gives him enough wiggle room to claim he’s just “informing” people.

    Evangelism at its best.

    Note: writer of this comment adds absolutely nothing but stalking and personal attacks against readers, as documented here.

  29. Jose_X said,

    November 23, 2008 at 8:28 pm

    Gravatar

    >> This isn’t a Netware exploit, it’s a windows exploit.

    OK. As I said, I assumed it was related to the network because of the terminology used and the fact I am not familiar with Netware/Zenworks/etc.

    If it is just client side, then.. well, the problem there is XP of course.

  30. Jose_X said,

    November 23, 2008 at 8:32 pm

    Gravatar

    >> If it is just client side, then.. well, the problem there is XP of course.

    FWIW, I don’t know enough to say that. I was just playing around.

  31. Dan O'Brian said,

    November 23, 2008 at 8:40 pm

    Gravatar

    Jose: See what happens when you *assume*? ;-)

    That’s the problem with this website, it makes assumptions all of the time which are simply not true.

    A little research would have gone a long way toward protecting you from making a fool of yourselves, but you stubbornly refused to spend any time in doing any. As always.

  32. Jose_X said,

    November 23, 2008 at 8:58 pm

    Gravatar

    >> A little research would have gone a long way toward protecting you from making a fool of yourselves, but you stubbornly refused to spend any time in doing any. As always.

    I don’t tend to feel like a fool, sorry to disappoint.

    I stated I don’t use Netware. I had to make assumptions.

    Even what I spoke of others possibly being wrong, I more than recognized that no surefire argument had been given my me. How could it since I started off by saying my information was very limited?

    Even now, I am taking the word of those posting here who claim they know better. No one has proved anything; however, I have no reason to doubt what little has been said by them because I know even less when it comes to Zenworks.

    I know how Kerberos works. I have no clue about any Netware products.

  33. Josh Bell said,

    November 23, 2008 at 9:06 pm

    Gravatar

    Jose,

    I’ve been using NetWare and it’s related products for over 20 years. Last year was my first using the Linux related products. I’ve been using Linux products for about 3 years or so.

  34. Jose_X said,

    November 23, 2008 at 9:35 pm

    Gravatar

    Like I said, I have no reason to doubt. Please don’t take my healthy skepticism personally (same thing, Dan and anyone else). It’s a defensive mechanism. If “I” don’t know, I have to be wary. You might be the most knowledgeable and honest person I will ever come across, and I doubt I will realize it.

  35. Dan O'Brian said,

    November 23, 2008 at 10:09 pm

    Gravatar

    Jose: and Roy knows even less than you do, but that didn’t stop him from making a fool of himself because he didn’t take the 5-10 minutes it would have taken to do some preliminary research would have prevented his mistake.

    We see this over and over again, this isn’t the first time Roy has made a blunder and it won’t be the last. Nearly every post he makes has such blunders.

    It should be embarrassing to him, but alas he keeps repeating his mistakes over and over.

  36. Josh Bell said,

    November 23, 2008 at 11:05 pm

    Gravatar

    Jose,

    At the very least you admit when you don’t know something. It’s fine to be skeptical especially when you never used something and you don’t know me or most anyone else personally. I’m not taking anything personally on this site. I think FUD begats FUD. This site has become nothing more than a tabloid with blatant inaccuracies such as this piece and piecemeal reporting at best with many things taken out of context.

    As many have said this is Roy and Shane’s site and they can say what they want. However, there have been numerous occassions where Roy especially has been called out and then has to backtrack and doublespeak to get out of the hole he dug.

  37. Roy Schestowitz said,

    November 24, 2008 at 3:22 am

    Gravatar

    The post only asks a question. Thank you for the answer.

What Else is New


  1. Links 9/1/2017: Dell’s Latest XPS 13, GPD Pocket With GNU/Linux

    Links for the day



  2. Update on Patent Trolls and Their Enablers: IAM, Fortress, Inventergy, Nokia, MOSAID/Conversant, Microsoft, Intellectual Ventures, Faraday Future, A*STAR, GPNE, AlphaCap Ventures, and TC Heartland

    A potpourri of reports about some of the world’s worst patent trolls and their highly damaging enablers/facilitators, including Microsoft which claims that it “loves Linux” whilst attacking it with patents by proxy



  3. Mark Summerfield: “US Supreme Court Decision in Alice Looks to Have Eliminated About 75% of New Business Method Patents.”

    Some of the patent microcosm, or those who profit from the bureaucracy associated with patents, responds to claims made by Techrights (that software patents are a dying breed in the US)



  4. Eight Wireless Patents Have Just Been Invalidated Under Section 101 (Alice), But Don't Expect the Patent Microcosm to Cover This News

    Firms that are profiting from patents (without actually producing or inventing anything) want us to obsess over and think about the rare and few cases (some very old) where judges deny Alice and honour patents on software



  5. 2017: Latest Year That the Unitary Patent (UPC) is Still Stuck in a Limbo

    The issues associated with the UPC, especially in light of ongoing negotiations of Britain's exit from the EU, remain too big a barrier to any implementation this year (and probably future years too)



  6. Links 7/1/2017: Linux 4.9.1, Wine 2.0 RC4

    Links for the day



  7. India Keeps Rejecting Software Patents in Spite of Pressure From Large Foreign Multinationals

    India's resilience in the face of incredible pressure to allow software patents is essential for the success of India's growing software industry and more effort is needed to thwart corporate colonisation through patents in India itself



  8. Links 6/1/2017: Irssi 1.0.0, KaOS 2017.01 Released

    Links for the day



  9. Watchtroll a Fake News Site in Lobbying Mode and Attack Mode Against Those Who Don't Agree (Even PTAB and Judges)

    A look at some of the latest spin and the latest shaming courtesy of the patent microcosm, which behaves so poorly that one has to wonder if its objective is to alienate everyone



  10. The Productivity Commission Warns Against Patent Maximalism, Which is Where China (SIPO) is Heading Along With EPO

    In defiance of common sense and everything that public officials or academics keep saying (European, Australian, American), China's SIPO and Europe's EPO want us to believe that when it comes to patents it's "the more, the merrier"



  11. Technical Failure of the European Patent Office (EPO) a Growing Cause for Concern

    The problem associated with Battistelli's strategy of increasing so-called 'production' by granting in haste everything on the shelf is quickly being grasped by patent professionals (outside EPO), not just patent examiners (inside EPO)



  12. Links 5/1/2017: Inkscape 0.92, GNU Sed 4.3

    Links for the day



  13. Links 4/1/2017: Cutelyst 1.2.0 and Lumina 1.2 Desktop Released

    Links for the day



  14. Financial Giants Will Attempt to Dominate or Control Bitcoin, Blockchain and Other Disruptive Free Software Using Software Patents

    Free/Open Source software in the currency and trading world promised to emancipate us from the yoke of banking conglomerates, but a gold rush for software patents threatens to jeopardise any meaningful change or progress



  15. New Article From Heise Explains Erosion of Patent Quality at the European Patent Office (EPO)

    To nobody's surprise, the past half a decade saw accelerating demise in quality of European Patents (EPs) and it is the fault of Battistelli's notorious policies



  16. Insensitivity at the EPO’s Management – Part V: Suspension of Salary and Unfair Trials

    One of the lesser-publicised cases of EPO witch-hunting, wherein a member of staff is denied a salary "without any notification"



  17. Links 3/1/2017: Microsoft Imposing TPM2 on Linux, ASUS Bringing Out Android Phones

    Links for the day



  18. Links 2/1/2017: Neptune 4.5.3 Release, Netrunner Desktop 17.01 Released

    Links for the day



  19. Teaser: Corruption Indictments Brought Against Vice-President of the European Patent Office (EPO)

    New trouble for Željko Topić in Strasbourg, making it yet another EPO Vice-President who is on shaky grounds and paving the way to managerial collapse/avalanche at the EPO



  20. 365 Days Later, German Justice Minister Heiko Maas Remains Silent and Thus Complicit in EPO Abuses on German Soil

    The utter lack of participation, involvement or even intervention by German authorities serve to confirm that the government of Germany is very much complicit in the EPO's abuses, by refusing to do anything to stop them



  21. Battistelli's Idea of 'Independent' 'External' 'Social' 'Study' is Something to BUY From Notorious Firm PwC

    The sham which is the so-called 'social' 'study' as explained by the Central Staff Committee last year, well before the results came out



  22. Europe Should Listen to SMEs Regarding the UPC, as Battistelli, Team UPC and the Select Committee Lie About It

    Another example of UPC promotion from within the EPO (a committee dedicated to UPC promotion), in spite of everything we know about opposition to the UPC from small businesses (not the imaginary ones which Team UPC claims to speak 'on behalf' of)



  23. Video: French State Secretary for Digital Economy Speaks Out Against Benoît Battistelli at Battistelli's PR Event

    Uploaded by SUEPO earlier today was the above video, which shows how last year's party (actually 2015) was spoiled for Battistelli by the French State Secretary for Digital Economy, Axelle Lemaire, echoing the French government's concern about union busting etc. at the EPO (only to be rudely censored by Battistelli's 'media partner')



  24. When EPO Vice-President, Who Will Resign Soon, Made a Mockery of the EPO

    Leaked letter from Willy Minnoye/management to the people who are supposed to oversee EPO management



  25. No Separation of Powers or Justice at the EPO: Reign of Terror by Battistelli Explained in Letter to the Administrative Council

    In violation of international labour laws, Team Battistelli marches on and engages in a union-busting race against the clock, relying on immunity to keep this gravy train rolling before an inevitable crash



  26. FFPE-EPO is a Zombie (if Not Dead) Yellow Union Whose Only de Facto Purpose Has Been Attacking the EPO's Staff Union

    A new year's reminder that the EPO has only one legitimate union, the Staff Union of the EPO (SUEPO), whereas FFPE-EPO serves virtually no purpose other than to attack SUEPO, more so after signing a deal with the devil (Battistelli)



  27. EPO Select Committee is Wrong About the Unitary Patent (UPC)

    The UPC is neither desirable nor practical, especially now that the EPO lowers patent quality; but does the Select Committee understand that?



  28. Links 1/1/2017: KDE Plasma 5.9 Coming, PelicanHPC 4.1

    Links for the day



  29. 2016: The Year EPO Staff Went on Strike, Possibly “Biggest Ever Strike in the History of the EPO.”

    A look back at a key event inside the EPO, which marked somewhat of a breaking point for Team Battistelli



  30. Open EPO Letter Bemoans Battistelli's Antisocial Autocracy Disguised/Camouflaged Under the Misleading Term “Social Democracy”

    Orwellian misuse of terms by the EPO, which keeps using the term "social democracy" whilst actually pushing further and further towards a totalitarian regime led by 'King' Battistelli


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts