similar to: Prevent NULL Session

Displaying 20 results from an estimated 10000 matches similar to: "Prevent NULL Session"

2002 Nov 19
1
IPC$ share accessible with arbitrary usernames/passwords
MM = M Maki (1 Oct 2002) AB = Andrew Bartlett (2 Oct 2002) MM > I have a couple of Samba (2.0.7 & 2.2.0) servers I scanned with > Nessus and they reported a security hole of "Possible to login > to the remote host using a NULL session" I have a couple of NT > servers I disabled with a registry edit. Is there a way to > prevent this on the Samba
2003 Dec 16
3
Results of nessus scan
I run samba 2.2.8a on my openbsd 3.4 box, installed from a package. All i need is the ability to mount disks form winxp boxes so i only run smbd, at 139/tcp. I tried scanning the box with nessus, and it came up with some results that got me curious. Since i dont know very much about the smb protocol I thought i should ask here. Have searched the archives but found only old posts, concering
2004 Mar 07
1
3.0.2a: SID, User Enumeration
I'm runninng samba 3.0.2a on a few machines, ADS security mode, domain member roles. I throw nessus at it, and it can fetch the SID and then list all of the users on the system. I view this as a security problem, is there a way to prevent this?
2014 Oct 04
1
LDAP NULL BASE Search Access to Samba4
Recently, i scanned my samba4.1 server by Nessus (a vulnerability scanner tool - http://www.tenable.com/products/nessus) Nessus says that Samba4 is vulnerable to "LDAP NULL BASE Search Access" as "The remote LDAP server may disclose sensitive information." Further it says that - The remote LDAP server supports search requests with a null, or empty, base object. This allows
2001 Dec 04
4
Samba 3.0 Alpha
Does net rpc join work in SAMBA (using HEAD from CVS compiled this morning) Configured with ACL, with PAM, and with WINBIND. It seems that I cannot rejoin my domain (PDC is NT4sp6a) after I turfed machine.sid and secrets.tdb. I tried using smbpasswd first and was informed to use net join rpc instead. Logs available if needed. Thanx Hans
2006 Feb 09
1
Running nessus on freebsd...
I'm trying to get nessus setup for doing some internal security checking. I installed the ports for nessus and nessus-plugins, and everything worked as expected. I then registered for the full feed of plugins, which got me up to over 10,000 plugins. I restarted nessus, and it didn't work at all. I am running without X11, so I'm doing batch runs. I already have nmap installed, so I
2004 Jun 23
2
samba security question - samba vulnerable to any WindowsExploits?
Hi Ryan, I am not authenticating to any Windows server, I just have the samba server itself set up with 3 users who an login. ...Paul Ryan Frantz wrote: >Paul, > >Are you using a Windows PDC or ADS to authenticate your Samba shares? >If so, the problem would not be with Samba, but with the authenticating >server. > >Ryan > >-----Original Message----- >From:
2002 Mar 05
2
Problems with Samba 2.2.3a DC and PAM
Basically, this is going to be just a question to see if what I want to do can be done, since I have had no luck in doing it so far... I have set up a 2.2.3a domain controller, and I can join Windows XP clients to the domain, and log in as domain users. I want to use PAM to enforce account restrictions, such as login time using pam_time. I currently have the *stacked* version of the
2005 Mar 12
4
Shorewall 2.2.1 and open ports
Hello all, I’m running Shorewall 2.2.1 on linux kernel 2.6.10 with iptables 1.2.11. I recently ran a nessus scan of my firewall from a machine outside of the firewall and the nessus report told me that there are some ports open that I did not specify to be open. The ports are 32772/udp, 123/udp, 111/tcp, 32772/udp, and 53/udp. Why are these ports open when I did NOT specify them to be open
2004 Apr 23
3
SSL Ciphers
I have dovecot running as a pop3s server on port 995 it works great with sendmail and I run nessus to check security issues nessus reports this The SSLv2 server offers 3 strong ciphers, but also 0 medium strength and 2 weak "export class" ciphers. The weak/medium ciphers may be chosen by an export-grade or badly configured client software. They only offer a limited protection against
2005 Aug 16
1
Nessus Installation Failure
I'm trying to get get nessus 2.2.5 to install on my centos 3.5 system. It errors out with this error: Press ENTER to continue x - Compiling the libraries x -- Configuring the sources for your system configure: error: Could not find OpenSSL and OpenSSL headers on your system **** An error occured :/ Do you want to save the compilation log to analyze what went wrong ? [y] Where should I save
2015 Jul 08
2
Samba 4 - disabling SSLv3 to mitigate POODLE effects
Good Day All Sorry if this is a repeated email, but I need some information about how to disable SSL on a Samba4.2.2 AD domain controller as the nessus scanner is reporting the POODLE vulnerability and we are not allowed to have any of that in our environment. the nessus scan reports poodle vulnerability on all these ports: 443, 636, 3269 I had a look at previous posts but couldn't find a
2003 Oct 04
1
Security Fix Confusion
Hi, I'm wondering if anybody could enlighten me about the effect of tracking RELENG? When the Openssh advisory came out (SA-03:12) I allowed a few days for all issues to get ironed out and then used CVSUP to rebuild my boxes with RELENG_4_7 or RELENG_4_8 (as appropriate). The advisory says that the problem with OpenSSH is fixed by 4.7-RELEASE-p16 and a 'uname -a' of one of my 4.7
2013 Oct 31
7
[Bug 870] New: Iptables cannot block outbound packets sent by Nessus
https://bugzilla.netfilter.org/show_bug.cgi?id=870 Summary: Iptables cannot block outbound packets sent by Nessus Product: iptables Version: 1.4.x Platform: x86_64 OS/Version: Ubuntu Status: NEW Severity: normal Priority: P5 Component: iptables AssignedTo: netfilter-buglog at lists.netfilter.org
2002 Sep 19
1
Samba 2.2.6pre2 doesn't try to lookup for user user name by SID + pdbedit
I have instaled samba 2.2.6pre2 (due problems with printr drivers download in 2.2.5) and I have also tried to install it using ldapsam backend. It seems be working, but there are two problems: - if I try to display directory ACL (file - properties - security) I show only the user name, group name and others field are shown only as SIDs. There is no hit to LDAP (OK, groups seems be supported
2005 Nov 08
1
ADS Join and Insufficient Access
My agency is moving all users and computers to a new domain. Our current domain uses AD and the new domain will use AD. My current samba servers are running 3.0.20a with ADS security with winbind on Debian Stable (Sarge) with no problems. I set up a test samba server using 3.0.20b, the new krb5.conf and smb.conf. kinit works fine. ("Authenticated to Kerberos v5") I prestage the server
2013 Aug 06
2
Openssl vulnerability - SSL/ TLS Renegotion Handshakes
Hi, I'm currently at CentOS 5.8. I'm using openssl version openssl-0.9.8e-22.el5. The following vulnerability was reported by a Nessus security scan: "SSL/ TLS Renegotion Handshakes MiTm Plaintext Data Injection" As per following link, Redhat has introduced openssl-0.9.8m which fixes this specific issue:
2002 Jul 19
1
Howto open NULL session with samba clients ?
Hi samba gurus, I'm actually writing a security audit tool, so as to see if our Windows computers are well configured. Basicly, here are the steps of the tool, given an IP address: 0. Ping the computer... 1. Get all names associated to that IP (nmblookup -A IP) 2. Open a null session to the computer to get the user list and share list. 3. Attempt to connect to each share, using each
2002 Nov 15
1
null session and winbindd questions
Hello, I am running Samba 2.2.5 (built from source) on a Linux 7.3 machine. I have samba setup to use domain authentication and everything is working fine. The security administrator did a scan on the Windows 2000 server being used for authentication. He found a vulnerability attributed to the fact that winbindd needs null sessions on the W2k machine to be enabled (since winbindd sends a null
2015 Jul 08
2
Samba 4 - disabling SSLv3 to mitigate POODLE effects
Thanks Kelvin I'm a bit confised tho, is this patch already avaiable? if yes, what is the parameter that disable ssl into the smb.conf? Maybe the guys from Enterprise samba have already included the patch into their releases so it's just a maatter of enabling the flag. I'm using sernet-samba-4.2.2 Thanks!