99.999% High Availability A Dream?
Well, let's conclude that it was great marketing. But if you look
under the covers, it usually was not all it was cracked up to be.
If one investigates the exact service level guarantees, the penalty
to a vendor for not achieving guaranteed uptime typically consisted
of a service credit. Big Deal.
More over, most of these guarantees were just focused on the OS.
And we just saw last week that over 40% of downtime is caused by
apps, and a good chunk by hardware or natural disasters. The gulf
between the promise of 99.999% uptime and reality was often quite
large.
High availability is still a top concern for system admins though.
Outfits that require five-nine, or even 100 percent uptime ? such
as financial institutions or 911 centers ? usually choose vendors
with specific fault-tolerant machines: Tandem or Stratus usually.
But for mere mortals like us that can live with a little bit of
downtime and not get killed for it, W2K demonstrates higher uptime
levels than NT. The Aberdeen Group, looking at 10 enterprises in
2001, estimated that W2K servers averaged 99.964% uptime. And MS
promises a real 99.999% uptime provided you use Datacenter Server
with a proper configuration.
Being part of the Windows Datacenter Program means stringent rules
that OEMs must live up to. These include hardware compatibility,
support centers staffed by both OEM and Windows specialists, and
added to that an active software maintenance program. It really
looks a lot like an IBM mainframe type of setup, so you cannot
hook up just anything you want to these puppies, or plug in cards
you like. Last but not least, the disaster recovery issue has
still not been solved by MS, even with Datacenter. Getting your
data off-site, real time, to a safe place that can be backed up
and/or used to rebuild servers in case the office building goes
up in flames or apps crash fatally is still solved by third party
tools like Double-Take:
http://www.w2knews.com/rd/rd.cfm?id=021216TP-Double-Take
Comptia Unveils Basic Security Certification
Need a measure of basic (and cheap) security knowledge? The Computer
Technology Association (CompTIA) this week unveiled its new Security+
credential, a vendor-neutral certification for first line defenders
of the information security world. They call the new Security+ as a
baseline for hands-on security knowledge in areas such as authentication, encryption and countering external attacks.
"This is the GED of security, or maybe the associate's degree," says
Fran Nielsen, deputy director of the Computer Security Division of
the National Institute of Standards and Technology (NIST). NIST
helped develop the credential and the certification test. (For people
outside the USA, "GED" is the equivalent of a high school diploma)
Security+ is the 11th certification developed by CompTIA, and its
first focused on security only. Fran Linhart, CompTIA's director of
certification, says the organization began developing the test in
the summer of 2001, after a security vendor asked for a baseline test.
The tests have an international focus, which of course should be
the case, seen the fact that a lot of attacks come from "rogue IT"
countries like China and Russia.
Security+ will help IT professionals in general, not just security
experts. System Admins, Network admins and Database Admins definitely
get a basic understanding of network security issues. This is a good
startup course for younger people, but if you are mid-career and want
to get into the security business, this is a great first step.
Security+ tests are administered by NCS Pearson's VUE unit and Thomson
Learning's Prometric division. The test costs $225, (CompTIA members
receive discounts that can cut the price to $125). Here are some
details on that to expect on the exam:
http://www.w2knews.com/rd/rd.cfm?id=021216TP-Comptia
New Vulnerability Warning In Christmas Carol Format
PNG (Portable Network Graphics) Deflate Heap Corruption Vulnerability
Release Date: December 11, 2002 Severity: High (Code Execution)
Twas the night before Christmas, and deep in IE
A creature was stirring, a vulnerability
MS02-066 was posted on the website with care
In hopes that Team eEye would not see it there
But the engineers weren't nestled all snug in their beds,
No, PNG images danced in their heads
And Riley at his computer, with Drew's and my backing
Had just settled down for a little PNG cracking
When rendering an image, we saw IE shatter
And with just a glance we knew what was the matter
Away into SoftICE we flew in a flash
Tore open the core dumps, and threw RFC 1951 in the trash
The bug in the thick of the poorly-written code
Caused an AV exception when the image tried to load
Then what in our wondering eyes should we see
But our data overwriting all of heap memory
With heap management structures all hijacked so quick
We knew in a moment we could exploit this $#!%
More rapid than eagles our malicious pic came --
The hardest part of this exploit was choosing its name
Derek Soeder
Software Engineer
eEye Digital Security
Systems Affected:
We have specifically tested the following software and verified the
potential for exploitation: Microsoft Internet Explorer 5.01 Microsoft
Internet Explorer 5.5 Microsoft Internet Explorer 6.0. Note: We have
also successfully exploited this vulnerability via the IE web control
for Microsoft Outlook.
For the purpose of completeness we have included a listing of each
product that ships with the vulnerable pngfilt.dll version 6.0.2600.0
and prior. We obtained this list from Microsoft's DLL Help Database:
- Access 2000 SR1
- BackOffice 4.5
- Commerce Server 2000
- DirectX 6.0 SDK
- DirectX 6.0 SDK
- Internet Explorer 4.0
- Internet Explorer 4.01 SP1
- Internet Explorer 4.01 SP1
- Internet Explorer 4.01 SP2
- Internet Explorer 4.01 SP2
- Internet Explorer 5.0
- Internet Explorer 5.01
- Internet Explorer 5.5
- Internet Explorer 5.5 SP2
- Internet Explorer 6.0
- Microsoft Visual Studio .NET (2002) and many other development tools
- Windows 2000 and XP, all Server and Pro versions, 95,98, ME, NT
Overview:
During a review of the PNG image format implemented in Microsoft
Windows, two separate vulnerabilities were discovered related to
the interpretation of PNG image data. The first vulnerability deals
with the handling of the IDAT header and does not appear to be
of significant threat level. The second vulnerability can be
exploited to execute code when the malicious PNG image is viewed.
Due to the complexity of each of these vulnerabilities we have
decided only to describe the latter in detail.
Mitigating Factors:
It should be noted that due to memory management system behavior across
various Windows operating system environments, exploitation may become
extremely difficult and in some cases unreliable.
Protection:
Retina Network Security Scanner has been updated to check for this hole:
http://www.w2knews.com/rd/rd.cfm?id=021216TP-Retina
Vendor Status:
Microsoft was contacted in August 2002. Internet Explorer SP1
eliminates this vulnerability. Internet Explorer SP1 can be retrieved
using the following URL:
http://www.w2knews.com/rd/rd.cfm?id=021216TP-IE_SP1
Microsoft has released a security bulletin for this flaw. It is located
here:
http://www.w2knews.com/rd/rd.cfm?id=021216TP-Security_Bulletin
Credits: Discovery: Drew Copley, Research Engineer, eEye Digital Security
Exploitation: Derek Soeder, Software Engineer, eEye Digital Security
Riley Hassell, Research Engineer, eEye Digital Security
New sonicadmin V2.6 Now With Enhanced Features And Security
Planning on spending some time away from the office over the holidays?
Need to keep your pager and cellular phone strapped to your belt to
deal with any issues when they arise? Afraid to be more than 100
feet away from a wired terminal?
Relax over the holidays with the security of knowing you can handle
systems and network administration issues from your Blackberry or
wireless Pocket PC. Now you can feel comfortable going to the ski
hill and socializing with friends and family. These types of absences
from the office are when mobile systems administration solutions
are invaluable!
Sonic Mobility announced the shipment and general availability of
sonicadmin 2.6, a complete network and server administration utility
that allows you to perform complete server and network management on
a 24x7 basis from a handheld wireless device such as the HP iPAQ or
Blackberry from Research In Motion Limited (RIM.)
Version 2.6 is a significant upgrade to sonicadmin adding support
for the new Java based Blackberries (5810/20 and 6710/20) as well
as being certified for the Pocket PC Phone Edition or XDA. Larger
install sites can make use of valuable new functionality such as a
new server autodiscovery feature and NTLM authentication. The new
features complement sonicadmin's core functionality which includes
power cycling, server rebooting, user management, and command line
access. Customers using these powerful features are quickly realizing
reductions in systems downtime and increased organizational productivity levels.
"Sonic Mobility has succeeded in creating an extremely useful remote
management system which doesn't compromise security or ease of use."
said Peter Rysavy, president of Rysavy Research and columnist
with MyITForum.com.
Make sure that you can access all of your systems from anywhere
with your Blackberry or wireless Pocket PC using sonicadmin and
take advantage of our special holiday pricing! If you've been
thinking about sonicadmin there has never been a better time to
buy. Between now and the end of the year you can set up your
systems for full wireless remote access for only $249 per server
for the first ten servers, $199 per server for servers 11 through
50, and $149 per server for servers 51 through 100. If you want
to set up more than 100 servers, contact us for an unbeatable
special quote! sonicadmin Holiday Pricing:
- Servers: 1-10 $249.00 each
- Servers: 11- 50 $199.00 each
- Servers: 51-100 $149.00 each
- Servers 101+ Special Bid
- Telnet $75.00 each
Check eval here:
http://www.w2knews.com/rd/rd.cfm?id=021216TP-sonicadmin