Everyone,

Just to be clear about the Remedy environment and passwords:

1) There are absolutely NO backdoor passwords that are used for system access 
that
   are not visible and under the control of the Administrator.
2) Since about 7.0, we have REQUIRED that you supply a password for the system
   users -- Remedy Application Password, DSO  (there is no password for 
Escalator)
3) Yes, there is a default Database password to get started -- and you are
   encouraged to change it immediately.
4) Yes, there is a default user installed (Demo) to give a starting point -- and
   you are encouraged to change it or delete this user immediately  (and all of 
the
   installers have been corrected for several years now to not look for a user
   named Demo)

So, there are no secret back doors to the system that would provide access and
there are only two cases where there is even a temporary default password -- if 
WE
create the DB, we need to do something and then you change it and this can be
worked around if you create the DB and give us the information  AND  the Demo 
user
that is loaded to give you initial access into the system (you have to get in
somehow the first time).


Again, if you have not changed either of the two passwords noted here, you 
should
do that immediately and on every system.  Otherwise, there is no issue within 
the
product around this topic.

Now, there are a bunch of other security settings that I encourage you to use --

-- restrict where run processes can run processes
-- control the shell under which processes can run
-- use the password management feature to enforce password rules
-- use the feature that disables an account after x bad password attempts
      (and make x a relatively small number like 5 or at most 10)
-- disallow blank passwords (except for AREA cross-reference situations)
--  and a number of other things

We encrypt passwords on the wire.  We in fact default encrypt the entire traffic
on the wire (with higher levels of encryption than the default available if
desired).  We use a connectionless protocol with user validation at every call 
to
ensure that you are who you say you are to prevent piggybacking connections.


Remedy should not be vulnerable to attack of the kind described unless you have
opened your systems to the outside and have not followed suggestions of changing
the to key initial passwords (I would consider changing the DB name from ARAdmin
as well just to make it that much harder to find -- and that is fully 
supported).

Doug Mueller

-----Original Message-----
From: Action Request System discussion list(ARSList) 
[mailto:arslist@ARSLIST.ORG] On Behalf Of Pierson, Shawn
Sent: Thursday, January 30, 2014 5:31 AM
To: arslist@ARSLIST.ORG
Subject: Re: Target Attack and BMC Software ITSM?

I read the article and clicked on the link to the Krebs on security site.  
Based on that site, which may or may not be correct, it's saying that the 
potential BMC product is BMC Performance Assurance Agent.  Since this isn't a 
part of Remedy I really have no idea how it works and if there is a back door 
or if it was installed and they forgot to change a default password.

In any case, it's not Remedy, so that's a good thing.

Thanks,

Shawn Pierson
Remedy Developer | Energy Transfer

-----Original Message-----
From: Action Request System discussion list(ARSList) 
[mailto:arslist@ARSLIST.ORG] On Behalf Of Jeff Lockemy
Sent: Thursday, January 30, 2014 7:23 AM
To: arslist@ARSLIST.ORG
Subject: OT: Target Attack and BMC Software ITSM?

This news article hit today...

http://www.startribune.com/business/242688511.html

It says that a default password in a BMC ITSM product may have contributed to 
the target attack.

Jeff


 
Jeff Lockemy
Lead Engineer, NAVY 311
Enterprise Service Management PMW-240
ITIL V3 Foundation Certified
QMX Support Services Inc.

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org "Where the Answers 
Are, and have been for 20 years"

Private and confidential as detailed here: 
http://www.energytransfer.com/mail_disclaimer.aspx .  If you cannot access the 
link, please e-mail sender.

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org "Where the Answers 
Are, and have been for 20 years"

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
"Where the Answers Are, and have been for 20 years"

Reply via email to