I recently tested an Iomega NAS A300U and discovered that it has several
security and inter-operability issues as outlined in the following.
Affected Systems:
Device: Iomega NAS A300U
O/S: FreeBSD 3.5 (this has not been verified)
Manager Version: Iomega NAS Manager 1.2 (P0-080102)
Web Server: Apache v1.3.26
CIFS/SMB Server: UNIX Samba v2.0.10
NOTE: The vulnerabilities described may apply to
other models of the Iomega NAS line. It is
recommended that you test your system and
report any vulnerabilities to Iomega.
Iomega verified that the NAS has the latest
version of the O/S installed.
Un-Affected Systems:
Unknown - The Iomega NAS line is based on UNIX or Windows.
Only the A300U (UNIX based) was tested. The vulnerabilities
described may apply to other models of the Iomega NAS line.
It is recommended that you test your system and report any
vulnerabilities to Iomega.
Details:
Clear Text IDs and Passwords When Using NAS Administration
Web Page:
The Iomega NAS A300U is administered via a web page. The
documentation states that this can only be done using
Microsoft Internet Explorer. A sniff of the administrative
traffic revealed that all the administrative web pages are
in clear text including the admin logon. Anyone with a sniffer
can capture the administrator's user ID and password, and the
user ID and password of any accounts that are created or
modified.
The "Iomega NAS Family Brochure" states the following:
"The Iomega NAS Discovery Management
Tool provides an intuitive interface with remote
management flexibility and convenience.
Encrypted login for the administrator
protects against unauthorized access.
Access and manage all client data, NAS
backup and restore preferences from"
anywhere on the network.
CIFS/SMB Mounts Susceptible to Man-In-The-Middle Attack:
The Iomega NAS supports drive mounts using CIFS/SMB. By
default the NAS will allow plain text LANMAN authentication.
This makes the NAS susceptible to man-in-the-middle
attacks. The session can be hijacked and user IDs and
passwords can be compromised. The Iomega NAS A300U does not
provide an option for disabling plain text authentication.
FTP Can't be Disabled:
The Iomega NAS A300U allows access to the shared directories
via FTP. FTP access to the shared directories can be disabled,
however, this does not disable FTP access to the NAS but only
to the shared directories.
When a user connects to the NAS using FTP the FTP root
directory is the user's home directory. Any shared directories
that have FTP enabled appear as sub directories of the user's
home directory. When FTP access to a shared directory is
disabled, then that directory no longer appears in the user's
home directory.
FTP access to shared directories can be disabled on a per
share basis, but the FTP service can't be disabled.
IT departments wishing to disable FTP will not be able to do so.
When FTP access is disabled on all shared directories, users
can still connect to their home directories.
The interaction between storage quotas and content stored
in a user's home directory via FTP was not tested.
Interferes with Windows Browsing:
The Iomega NAS A300U participates in Windows Browser elections.
The NAS is configured in such a way that it always(1) wins the
election even though multiple Windows servers exist on the
same subnet.
The fact that the NAS won the browser election would not normally
be a problem except that the NAS does not correctly populate the
browse list. This breaks any services that depend on browsing.
In our case it disabled our Intel LanDesk server's ability
to administer machines in our Windows NT domain.
The NAS cannot be configured to disable participation
in browser elections, and since it doesn't populate the
browse list correctly it will disable any services that
rely on Windows browsing.
(1) The NAS can authenticate users against a Windows NT
Domain that it has joined. To join an Active Directory
domain the Active Directory must be running in mixed
mode. In order to join a Windows domain the NAS must
also be on the same subnet as the domain's Windows NT
Primary Domain Controller or Active Directory PDC
Emulator. So I put the NAS on the same subnet as our
servers.
The subnet that the NAS was tested on has over eleven
Windows servers including a Windows Backup Domain
Controller, a Windows Active Directory server, a Windows
Active Directory PDC Emulator, a Windows Active Directory
DNS server, several Exchange servers, a Blackberry
Enterprise server, an Intel LanDesk server and several
other test servers.
Since there were such a large number of servers on the
subnet I felt that the problem was significant enough
to warrant an alert without determining the conditions
under which the NAS could lose a browser election.
It is believed that the NAS won the browser election
because of the way Samba is configured. There isn't any
administrative option for changing Samba browser behavior.
Fixes and Work Arounds:
Iomega was notified of the problems on October 17, 2002. Iomega
stated that they are working on the problem but could not give
an estimated time for completion.
As an interim solution I tested the following:
1. Placed the NAS and an administrative workstation behind a NAT
firewall.
2. Specifically blocked HTTP and FTP access to the NAS and
only forwarded the ports required for the services
I wanted visible to users.
3. This also eliminated the problem of the NAS always winning
browser elections and interfering with other Windows
services.
Cons for the proposed work around:
1. It requires a dedicated NAT firewall and administrative
workstation.
2. The NAS will not be able to join a Windows NT domain
or an Active Directory Domain running in mixed mode so
it will have to authenticate users against the local
accounts database on the NAS instead of Windows domain
accounts.
Contact Information:
Keith R. Watson GTRI/ITD
Systems Support Specialist III Georgia Tech Research Institute
keith.watson (at) gtri.gatech (dot) edu [email concealed] Atlanta, GA 30332-0816
404-894-0836
-------------
Keith R. Watson GTRI/ITD
Systems Support Specialist III Georgia Tech Research Institute
keith.watson (at) gtri.gatech (dot) edu [email concealed] Atlanta, GA 30332-0816
404-894-0836
security and inter-operability issues as outlined in the following.
Affected Systems:
Device: Iomega NAS A300U
O/S: FreeBSD 3.5 (this has not been verified)
Manager Version: Iomega NAS Manager 1.2 (P0-080102)
Web Server: Apache v1.3.26
CIFS/SMB Server: UNIX Samba v2.0.10
NOTE: The vulnerabilities described may apply to
other models of the Iomega NAS line. It is
recommended that you test your system and
report any vulnerabilities to Iomega.
Iomega verified that the NAS has the latest
version of the O/S installed.
Un-Affected Systems:
Unknown - The Iomega NAS line is based on UNIX or Windows.
Only the A300U (UNIX based) was tested. The vulnerabilities
described may apply to other models of the Iomega NAS line.
It is recommended that you test your system and report any
vulnerabilities to Iomega.
Details:
Clear Text IDs and Passwords When Using NAS Administration
Web Page:
The Iomega NAS A300U is administered via a web page. The
documentation states that this can only be done using
Microsoft Internet Explorer. A sniff of the administrative
traffic revealed that all the administrative web pages are
in clear text including the admin logon. Anyone with a sniffer
can capture the administrator's user ID and password, and the
user ID and password of any accounts that are created or
modified.
The "Iomega NAS Family Brochure" states the following:
"The Iomega NAS Discovery Management
Tool provides an intuitive interface with remote
management flexibility and convenience.
Encrypted login for the administrator
protects against unauthorized access.
Access and manage all client data, NAS
backup and restore preferences from"
anywhere on the network.
CIFS/SMB Mounts Susceptible to Man-In-The-Middle Attack:
The Iomega NAS supports drive mounts using CIFS/SMB. By
default the NAS will allow plain text LANMAN authentication.
This makes the NAS susceptible to man-in-the-middle
attacks. The session can be hijacked and user IDs and
passwords can be compromised. The Iomega NAS A300U does not
provide an option for disabling plain text authentication.
FTP Can't be Disabled:
The Iomega NAS A300U allows access to the shared directories
via FTP. FTP access to the shared directories can be disabled,
however, this does not disable FTP access to the NAS but only
to the shared directories.
When a user connects to the NAS using FTP the FTP root
directory is the user's home directory. Any shared directories
that have FTP enabled appear as sub directories of the user's
home directory. When FTP access to a shared directory is
disabled, then that directory no longer appears in the user's
home directory.
FTP access to shared directories can be disabled on a per
share basis, but the FTP service can't be disabled.
IT departments wishing to disable FTP will not be able to do so.
When FTP access is disabled on all shared directories, users
can still connect to their home directories.
The interaction between storage quotas and content stored
in a user's home directory via FTP was not tested.
Interferes with Windows Browsing:
The Iomega NAS A300U participates in Windows Browser elections.
The NAS is configured in such a way that it always(1) wins the
election even though multiple Windows servers exist on the
same subnet.
The fact that the NAS won the browser election would not normally
be a problem except that the NAS does not correctly populate the
browse list. This breaks any services that depend on browsing.
In our case it disabled our Intel LanDesk server's ability
to administer machines in our Windows NT domain.
The NAS cannot be configured to disable participation
in browser elections, and since it doesn't populate the
browse list correctly it will disable any services that
rely on Windows browsing.
(1) The NAS can authenticate users against a Windows NT
Domain that it has joined. To join an Active Directory
domain the Active Directory must be running in mixed
mode. In order to join a Windows domain the NAS must
also be on the same subnet as the domain's Windows NT
Primary Domain Controller or Active Directory PDC
Emulator. So I put the NAS on the same subnet as our
servers.
The subnet that the NAS was tested on has over eleven
Windows servers including a Windows Backup Domain
Controller, a Windows Active Directory server, a Windows
Active Directory PDC Emulator, a Windows Active Directory
DNS server, several Exchange servers, a Blackberry
Enterprise server, an Intel LanDesk server and several
other test servers.
Since there were such a large number of servers on the
subnet I felt that the problem was significant enough
to warrant an alert without determining the conditions
under which the NAS could lose a browser election.
It is believed that the NAS won the browser election
because of the way Samba is configured. There isn't any
administrative option for changing Samba browser behavior.
Fixes and Work Arounds:
Iomega was notified of the problems on October 17, 2002. Iomega
stated that they are working on the problem but could not give
an estimated time for completion.
As an interim solution I tested the following:
1. Placed the NAS and an administrative workstation behind a NAT
firewall.
2. Specifically blocked HTTP and FTP access to the NAS and
only forwarded the ports required for the services
I wanted visible to users.
3. This also eliminated the problem of the NAS always winning
browser elections and interfering with other Windows
services.
Cons for the proposed work around:
1. It requires a dedicated NAT firewall and administrative
workstation.
2. The NAS will not be able to join a Windows NT domain
or an Active Directory Domain running in mixed mode so
it will have to authenticate users against the local
accounts database on the NAS instead of Windows domain
accounts.
Contact Information:
Keith R. Watson GTRI/ITD
Systems Support Specialist III Georgia Tech Research Institute
keith.watson (at) gtri.gatech (dot) edu [email concealed] Atlanta, GA 30332-0816
404-894-0836
-------------
Keith R. Watson GTRI/ITD
Systems Support Specialist III Georgia Tech Research Institute
keith.watson (at) gtri.gatech (dot) edu [email concealed] Atlanta, GA 30332-0816
404-894-0836
[ reply ]