Lucene search

K

webramp-M3.txt

🗓️ 17 Aug 1999 00:00:00Reported by Packet StormType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 54 Views

WebRamp M3 has a remote access bug impacting network monitoring and timeout functionality.

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`Date: Thu, 21 Jan 1999 01:18:50 -0800  
From: John Stanley <[email protected]>  
To: [email protected]  
Subject: WebRamp M3 remote network access bug  
  
I have not seen this problem mentioned on this list. I defer to the  
moderator's memory and hope this is valuable information...  
  
The WebRamp M3 is a small SOHO router with 4 10baseT ports on the local  
side and three serial ports on the remote side. It acts as the net gateway  
and makes dial-up PPP connections automatically when necessary. It also  
has NAT functions, so you can use a non-routable local network address and  
still communicate worldwide. It monitors the load through the first modem  
and will make a second dialup connection if the load is higher than a  
configurable value. It will make a third connection if the first two are  
reaching capacity. It will not split one connection across two modems,  
however, so when you ftp the latest source from somewhere, you are stuck  
with single-modem speeds.  
  
You can define what they call a "visible computer", which is simply a  
default local IP address to which the M3 will pass all otherwise unknown  
packets from the outside. Unless you configure the M3 otherwise, smtp,  
nfsd, routed, etc connections from the outside go to the visible computer.  
You can also disable visible computer.  
  
The M3 has a rather cryptic command language that can be accessed via a  
command serial port or via a telnet connection. It also has a web-based  
admin capability.  
  
All in all, it is a rather nice little box, EXCEPT...  
  
I had a visible computer enabled so I could track where outside packets  
were coming from. I started doing this because the M3 has a problem  
determining activity. It is supposed to time out after a set time if there  
is no activity, but it counts the reception of any packet from the outside  
as activity, even if the packet is never sent to the local side of the  
net. I wanted to see where the activity was coming from[%].  
  
Then I turned "visible computer" off. To test that it was really off, I  
tried telnetting into my network from outside. I expected a timeout. I was  
surprised to see the WebRamp M3 answer the telnet request with a login  
prompt.  
  
Part of the "visible computer" configuration web page is a check-box that  
determines if outside telnet packets are to be redirected to the M3. This  
box was not checked. Just to be sure, I sent the unchecked configuration  
back to the M3. I did this MANY times, just to be sure.  
  
There was nothing I could do to stop the M3 from answering telnet requests  
>from outside except to turn "visible computer" back on with a non-existant  
local IP address as the destination. (Using an active local IP address  
would mean the local system would get the telnet request, as well as any  
connections to nfsd or mountd or SMTP...)  
  
The customer support[*] at RampNet has continued to tell me that this is  
simply a configuration error on my part, that I am confused by the check  
boxes in the web form, and that the web browser is caching pages. "This is  
not a bug." The customer support[*] person asked me to send her my remote  
IP address and admin password for the box so she could log into the box  
and examine my configuration. I tried explaining that dialup IP means I  
can get a different IP address every time the M3 dials in, that my M3 was  
not dialed in so there was no IP address for it at the current time, and  
that sending passwords over the net in the clear wasn't a bright idea.  
("Here's the IP address of my computer, and the root password is...").  
  
Finally, the customer support[*] person sent me a series of commands to  
send to the M3 over the command serial port that would set my  
configuration properly. I sent the commands, and, of course, the M3 still  
accepted my remote telnet request and allowed me to log in.  
  
WebRamp/RampNet customer support[*] has had sufficient time to respond to  
the problem, and frankly, I am tired of being told that I am too stupid to  
configure their hardware properly. This is the same answer I got when I  
reported that they were counting packets that were being thrown away as  
valid activity and keeping the dialup connection up longer than it should  
be. ("Just shut if off when you are done." The fact that they are selling  
a box that allows automatic, unattended dialup-on-demand must have slipped  
their minds.)  
  
IF YOU ARE USING THIS BOX, you should test it for this problem. All you  
need to do to see if your M3 has this problem is to try telnetting to it  
>from a system on a remote network. The telnet packets must come to the M3  
via the modem; the M3 will always accept telnet connections coming from  
the local network. If you see the prompt "WebRamp login: " your M3  
is letting anyone in the world connect to it. Work down the web admin  
pages through Advanced/Applications/Visible Computer and make sure you  
have not checked the "Divert" options, unless you really want your M3  
talking to the world (and vice versa.)  
  
If you are using this box, and you see this bug, and you have NOT changed  
the admin password from the default, DO SO IMMEDIATELY.  
  
If you aren't using this box now, don't.  
  
  
  
[*] ROTFL  
  
[%] A PowWow user had registered the dialup port IP address, and the  
PowWow client for a user in Alaska was trying to locate his "buddy" on my  
system -- several times a minute for hours at a stretch. I've also seen  
Windows networking name service packets leaking through the terminal  
server, as well as cracker port scanning attempts.  
  
----------------------------------------------------------------------------  
  
Date: Wed, 3 Feb 1999 09:19:50 -0800  
From: Robert Ward <[email protected]>  
To: [email protected]  
Subject: WebRamp M3 Perceived Bug  
  
  
In response to John Stanley's posting on January 21, 1999.  
  
1) The perceived problem is that upon manualling disabling the diversion of  
incoming telnet requests to the webramp, and not setting up a Visible  
Computer, or telnet Local Server, telnet traffic continues to divert to the  
Webramp.  
  
This is largely due to the Webramp's logic. Upon receiving incoming traffic  
on port 23 the WebRamp checks it's divert port options, notices that telnet  
diversion is off, then looks for a visible computer or local server to pass  
the traffic to. Failing this the WebRamp then defaults back to diverting  
the port 23 traffic to itself.  
  
We designed this box with being able to access the CLI or HTTP interface  
>from the WAN in mind. This feature allows for remote management and trouble  
shooting of the WebRamp, and has proved to be an essential tool to our  
support department. If security is a concern change the Administrative  
password on your WebRamp, and do so frequently.  
  
The Divert Port options were never intended to be a security feature, rather  
they are there so that you can bypass the webramps built in telnetd and  
httpd and pass packets to your in-house server.  
  
2) This is true for every M3/M3t/M3i/300 user who is not using Visible  
Computers or telnet Local Servers. I would approximate this number to be in  
the 90% or higher range. The number of customers who have actively tried to  
disable incoming telnet sessions that we are aware of is much lower than 1%.  
  
3) There are workarounds readily available.  
  
The easiest way to prevent unwanted access to your WebRamp is to change the  
Admin Password, and as with all things security related, change it often.  
  
To completely block telnet access (so that the session can't even be  
initiated) from the WAN you have two options.  
  
Method 1: Enable a Visible Computer for each active modem port and pointing  
to IP addresses that are not being used in your LAN (e.g. 192.168.1.254 is a  
good place to start as DHCP is not likely to ever pass it out), and uncheck  
both of the divert incoming boxes.  
  
Method 2: Enable a Local Server of the Telnet and Web type and point them  
to an IP address that is not in use on your network. Then telnet into the  
webramp and use the divertport to disable all incoming diversions. This  
will only work for modem 1. If you are using 2 or more modems use method  
one.  
  
4) Last but not least, engineering has agreed to incorporate a change in  
the M3 families code to mimic the 310. This would allow the user to simply  
check one box to disallow WAN access to the httpd and telnetd processes.  
Since there are workarounds available, and useability/functionality is not  
impaired, this is considered to be a priority 4 and may be incorporated in  
the next point release.  
  
Robert Ward  
Senior Customer Support Engineer  
Ramp Networks  
  
----------------------------------------------------------------------------  
  
Date: Thu, 4 Feb 1999 13:26:06 -0800  
From: John Stanley <[email protected]>  
To: [email protected]  
Subject: Re: WebRamp M3 Perceived Bug  
  
Regarding the subject, am I to assume that since this is only a  
"perceived" bug, your supervisor of customer service was fibbing to me  
when he admitted on the phone that this was, indeed, a problem that needed  
to be fixed? He hasn't called me back like he promised he was going to,  
nor has he sent me email like he promised he would. Since he's gone mute,  
are you the official Rampnet spokesman now?  
  
On Wed, 3 Feb 1999, Robert Ward wrote:  
  
> 1) The perceived problem is that upon manualling disabling the diversion of  
> incoming telnet requests to the webramp, and not setting up a Visible  
> Computer, or telnet Local Server, telnet traffic continues to divert to the  
> Webramp.  
  
This is not a "perceived" problem, it actually happens. I would echo your  
words "manually disabling the diversion of incoming telnet requests to the  
webramp". When I disable something, it is not supposed to happen.  
However...  
  
> This is largely due to the Webramp's logic. Upon receiving incoming traffic  
> on port 23 the WebRamp checks it's divert port options, notices that telnet  
> diversion is off, then looks for a visible computer or local server to pass  
> the traffic to. Failing this the WebRamp then defaults back to diverting  
> the port 23 traffic to itself.  
  
In other words, the M3 says "the user has told me not to divert port 23  
traffic to myself, but I know better than he does where it should go, and  
he couldn't possibly want anything as important as a telnet connection on  
port 23 to be ignored. I'll go ahead and make the connection anyway."  
  
> We designed this box with being able to access the CLI or HTTP interface  
> from the WAN in mind. This feature allows for remote management and trouble  
> shooting of the WebRamp, and has proved to be an essential tool to our  
> support department.  
  
This is a straw man. The complaint is not that you have a way of allowing  
this remote access to take place, it is that the remote connection WILL be  
allowed even when you tell the M3 NOT TO ALLOW IT. If there are people  
who will tell your customer service people their admin passwords and IP  
addresses via email (as your customer service person wanted me to do),  
that's their problem. That your box continues to offer a login prompt to  
anyone who happens by after being told NOT TO, that's the problem.  
  
> If security is a concern change the Administrative  
> password on your WebRamp, and do so frequently.  
  
Security says you do not allow connections to services you do not want  
active, not that you just put a password on them. Security says that you  
do not give out information about your systems that doesn't need to be  
known, such as "Hi! I'm an M3 and I'm ready to let you log in, even though  
you might not be able to."  
  
In case you aren't aware of this, there are DoS attacks that don't require  
passwords, just a connection. I haven't tried any of them against the M3,  
but given the attitude expressed by Rampnet about this problem, I wouldn't  
doubt that you can shut an M3 off remotely. I wouldn't doubt that there is  
a stack smashing expoit of some kind, or who knows what else. And when  
these show up, they will be branded "perceived" problems and assigned a  
"level 4 priority".  
  
I wouldn't doubt that we will learn as time goes by that there is a  
backdoor that customer service uses to get into an M3 when the user  
forgets his admin password. If the ability for Rampnet customer service to  
connect via the WAN is so critical, it is almost a certainty. Cisco, as I  
recall, had this problem. The difference is that Cisco did something about  
it.  
  
> I would approximate this number to be in  
> the 90% or higher range. The number of customers who have actively tried to  
> disable incoming telnet sessions that we are aware of is much lower than 1%.  
  
"It isn't a security problem because very few people see it as one."  
Remember, this M3 is aimed at a non-technical audience, intended for use  
by people who are setting up a small office network connection to an ISP  
using a modem. Most people won't think to try telnetting into their own  
network, assuming that the boxes that disable diversion mean what they  
say, or from pure ignorance. _I_ didn't even realize it was happening  
until I disabled the visible computer and wanted to make sure it really  
was disabled.  
  
> 3) There are workarounds readily available.  
  
Yes, I had to waste an evening looking for one. I wouldn't call them  
"readily" available, however. YOUR technical support people denied that  
it was happening. Then they told me the commands to use to "fix" the  
problem, which were actually the commands that caused the problem to  
appear in the first place.  
  
> To completely block telnet access (so that the session can't even be  
> initiated) from the WAN you have two options.  
>  
> Method 1: Enable a Visible Computer for each active modem port and pointing  
> to IP addresses that are not being used in your LAN (e.g. 192.168.1.254 is a  
> good place to start as DHCP is not likely to ever pass it out), and uncheck  
> both of the divert incoming boxes.  
  
This is the solution I told you about. Thanks for putting your official  
stamp of approval on it. Your example address is a bit poor, since 254 is  
a common address for gateways, and in my case isn't even on my network.  
  
> 4) Last but not least, engineering has agreed to incorporate a change in  
> the M3 families code to mimic the 310.  
  
How nice. I suppose a change that results in the M3 ignoring telnet  
connections when it is told not to divert telnet connections to itself was  
too much like an admission of a mistake.  
  
> This would allow the user to simply  
> check one box to disallow WAN access to the httpd and telnetd processes.  
  
There is already a checkbox that is supposed to do this, at least for  
telnet.  
  
> Since there are workarounds available, and useability/functionality is not  
> impaired, this is considered to be a priority 4 and may be incorporated in  
> the next point release.  
  
I'm sure I'll rush right out and buy the next "point release". Has anyone  
else noticed that Rampnet does not provide free fixes, you have to pay for  
every update to your firmware? Has anyone else noticed that companies like  
Lantronix provide lots of free support and upgrades to firmware?  
  
Now tell me how you are dealing with the problem of counting every packet  
that comes in the modem as "activity" when it comes to timing out the  
connection. This IS a usability issue, since your failure to disconnect  
when there is no activity can lead to excess use charges and, in some  
cases, inability to connect due to overuse. (Yes, one of the places I can  
dialup has a quota, and you don't get on after you use more than X hours  
in a month.) Why do you count a packet from, say, aPowWow client, that  
comes in the modem and is promptly thrown away BY THE M3 itself, as valid  
activity on the modem line? Why do you count leaking net-bios packets that  
have no destination as valid traffic?  
  
Right after I reported this problem, I got a few pieces of mail about it.  
One was from someone who said "yeah, Rampnet support isn't very good." Two  
were from people telling me this wasn't a problem, both of whom it turned  
out were Rampnet dealers with a vested interest in protecting the product.  
One was from the supervisor of customer support wanting to talk to me on  
the phone. We talked about the problem, which he admitted was a problem,  
and he promised me all sorts of status reports. I've not heard from him  
since.  
  
Every company is a good company when there is no problem. How they react  
to problems is how you sort them out.  
  
----------------------------------------------------------------------------  
  
Date: Thu, 4 Feb 1999 19:59:12 -0500  
From: Kragen Sitaker <[email protected]>  
To: [email protected]  
Subject: Re: WebRamp M3 Perceived Bug  
  
On Wed, 3 Feb 1999, Robert Ward wrote:  
> We designed this box with being able to access the CLI or HTTP interface  
> from the WAN in mind. This feature allows for remote management and trouble  
> shooting of the WebRamp, and has proved to be an essential tool to our  
> support department. If security is a concern change the Administrative  
> password on your WebRamp, and do so frequently.  
  
IMHO, when you ship someone a preconfigured machine of some kind, and  
they don't express any particular interest or knowledge about the  
possibilities of that machine being controlled remotely, the default  
should be for that machine not to be controllable remotely -- not for  
anyone in the world to be able to control that machine remotely.  
  
> 2) This is true for every M3/M3t/M3i/300 user who is not using Visible  
> Computers or telnet Local Servers. I would approximate this number to be in  
> the 90% or higher range. The number of customers who have actively tried to  
> disable incoming telnet sessions that we are aware of is much lower than 1%.  
  
This is probably a good rule of thumb. 99% or more of the people out  
there won't even think about security. It's a betrayal, a fraud, an  
injustice to put backdoors into your products by default, then give  
people the ability to turn them off -- knowing that more than 99% of  
them will never use it.  
  
Imagine getting a new car. Like more than 99% of car owners, you don't  
read the owner's manual. After six months, the car's brakes stop  
working in traffic; it kills your wife and kids, along with the  
occupants of several dozen other cars of the same model in that city  
block. You call the manufacturer to complain. "Didn't you read the  
manual?" they say. "On page 66, it explains that the car is rigged to  
disable the brakes when it receives a particular radio signal, but you  
can turn it off with a switch inside the glove compartment. It's not  
our fault if terrorists use this feature to blow up buildings, and if  
you didn't bother to read the manual. We put it in to help our  
mechanics when the brake pedals get stuck."  
  
> 3) There are workarounds readily available.  
  
. . . which, as you point out, more than 99% of your customers don't  
even know about, and therefore more than 99% of your customers are wide  
open.  
  
I hope you get your irresponsible sorry asses hauled into court for  
this, you pathetic slimeballs.  
  
--  
<[email protected]> Kragen Sitaker <http://www.pobox.com/~kragen/>  
Computers are the tools of the devil. It is as simple as that. There is no  
monotheism strong enough that it cannot be shaken by Unix or any Microsoft  
product. The devil is real. He lives inside C programs. -- [email protected]  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
17 Aug 1999 00:00Current
7.4High risk
Vulners AI Score7.4
54
.json
Report