On 3/20/22 22:02, gene heskett wrote:
On Sunday, 20 March 2022 15:10:00 EDT Manuel Wolfshant wrote:
On March 20, 2022 5:02:36 PM GMT+02:00, Roger Price
<ro...@rogerprice.org> wrote:
I received the following comment from the Independent Submissions
Editor (ISE):
  The command VER is hazardous because it encourages exploiting of
  implementation peculiarities that are not well documented in a
  protocol.  The best example of such a failure is the browser version
  field in HTTP.  A complete disaster.  You should warn against use of
  this command, or even better, deprecate it.

I was not aware of the disaster in the browser version field, but I
will warn against use of VER, and deprecate it, if you agree.

Roger
Hello

I do not know of anyone calling the situation of browsers  "a
disaster". It's true, the version field can be and is used - together
with other data that the browser sends (!!!) - to create an almost
unique signature of the user. But OTOH it is used to adapt the looks
of the site to the capabilities of the browser because , well, no two
browsers behave 100% the same and site developers try to make sites
that look as bright and shiny as possible in the eyes of the users .
For a start, that's how the desktop and mobile versions of
dynamic/responsive sites differentiate the clients and adapt
themselves to present the best look and feel to clients.

Leaving that aside, I see no issues in warning users about the
potential nefarious uses of any command. In this particular case I'd
also add a reference to restricting the communication between nut
servers and clients to the smallest possible subset of devices (by
using dedicated VLANs, firewalls etc) and ask them to reread the
security section.

wolfy
Even better, hide your local network by getting a good router, reflashing
it to something like dd-wrt or its ilk, and using it to NAT your local
net somewhere in the 192.168.xxx.yyy address space but which is not
transmitted thru a router without coming under the control of the NAT in
the router. All your stuff behind such a router is invisible to the black
hats, making all your machines at least 1000 times more secure unless you
leave the router passwd at its default, in which case you'll be powned by
10 seconds after its powered up and the modem cable plugged into it.

That's not really feasible for enterprise locations. At home I used dd-wrt since 2013 until 2 months ago when I replaced my router but I will certainly not insert such a router in my work environment when I could simply configure the enterprise-grade switches to use dedicated VLANs for the various equipment. I have one VLAN  for video cameras, another one for the management of the network equipment and so on . And yes, I know very well that VLAN's primary role is separating broadcast domains, not security. However coupled with proper firewall rules separating the VLANs, one can create a decent environment.

And no home user will dedicate a separate router for an UPS. On top of that, separating the UPS from the other devices is possible but not easy because any and all home-grade routers by default will inject a single rule that NATs the single class defined behind it. Separating the UPS from the rest requires manual intervention, many times directly in the CLI. And please do not imagine for a single second that you will be safe simply because you NAT everything,  as there are miriad of scripts that rely on UPNP or client vulnerabilities to propagate inside user networks, behind any firewalls.

For the record, I was referring to https://www.ietf.org/archive/id/draft-rprice-ups-management-protocol-07.html#name-security-considerations as a reply to ISE's comment on https://www.ietf.org/archive/id/draft-rprice-ups-management-protocol-07.html#name-ver

_______________________________________________
Nut-upsuser mailing list
Nut-upsuser@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/nut-upsuser

Reply via email to