Any views expressed within media held on this service are those of the contributors, should not be taken as approved or endorsed by the University, and do not necessarily reflect the views of the University in respect of any particular issue.

Computing Systems

Computing Systems

Informatics Computing Staff jottings

Self-managed machines, particularly with firewall holes

Users of self-managed machines are reminded that School policy requires that they should make all reasonable efforts to secure those machines.  This applies particularly to those which have firewall holes.

Machines must be running a current OS version, and patching must be kept up-to-date.  If you have any services running, please make sure that you have turned off unnecessary options, and have changed all default passwords.  For example, in one recent hack to a self-managed machine a default tomcat manager account was used to install botnet modules which were then used to attack other systems.

You should not assume that just because your system is not actively advertised (e.g. in the DNS or through links on the web) that it won’t be found.  On the contrary, scanning is widespread.  Our own logs show that any IP address, even one which has never been used for externally-visible machines, is likely to be probed several dozen times per day.

The University has subscribed to the JANET ESISS penetration-testing service. We now use it to scan all managed and self-managed machines with external firewall holes, and will be following up its warnings with machines’ managers.  However, it won’t catch everything, so you should still take care with your configurations.

Please contact Support in the usual way if you would like to discuss your self-managed machine.

Leave a reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

css.php

Report this page

To report inappropriate content on this page, please use the form below. Upon receiving your report, we will be in touch as per the Take Down Policy of the service.

Please note that personal data collected through this form is used and stored for the purposes of processing this report and communication with you.

If you are unable to report a concern about content via this form please contact the Service Owner.

Please enter an email address you wish to be contacted on. Please describe the unacceptable content in sufficient detail to allow us to locate it, and why you consider it to be unacceptable.
By submitting this report, you accept that it is accurate and that fraudulent or nuisance complaints may result in action by the University.

  Cancel