Unfortunately no one can be told what fun_plug is - you have to see it for yourself.
You are not logged in.
jdoering wrote:
Some of the excuses for not expecting security from "low-end" devices are interesting; imagine if Vista Home Basic had an identified security bug that allowed access to any file on the system from within a LAN and MSFT didn't issue a hotfix within a few days. After all Vista Home Basic costs less that $100 dollars... most home users probably don't mind sharing all of their files within their LAN anyway; right?
High-end devices are expected to have fancy and robust features; but even low-end devices need to achieve some basic level of functionality - particularly in the area of security. With a hole like this one all of the user permission features of the DNS-323 are worthless since it doesn't actually provide user-level security at all. FTP at least can be disabled via supported mechanisms. A security bug like this should either warrant a very fast patch or a revocation of the impacted firmware version until a fixed version can be released.
-Jeff
Actually - if you get out there and take a look at what prevails you just might be in for an unpleasant surprise.
In my experience (which really does not include Vista), the average home user doesn't even have the system configured to require a sign-in (it assumes the same user every time) and passwords are considered more of a hindrance than anything else - so the average home user really does not mind sharing all of their files within their LAN - outside of the LAN is something else.
This is also quite common in small business, especially those where a work station is doing double duty as a server, and I've even found some small businesses with servers running MS Small Business Server 2003 where all users have administrative rights and know one another's passwords - I hasten to point out that this last is not through ignorance, but by choice, since in one of these cases, I set the server up myself and had it locked down and only the firm's senior partner had administrative access.
I've even seen large business with NT4 (back when NT4 was topdog) with the server administrator password at password, and an IBM AS400 system where the user's passwords all took the form of user:<name>, password:<eman> (which is something that IBM used to teach in the operator training at the time)
No - my friend - in the world of home and small business networks, security is primarily physical - and even when the system is capable of providing greater security, it is typically not utilized.
Last thing - don't forget - there's nothing to stop anyone with physical access from removing a drive and installing it elsewhere and plundering the treasure contained therein - unless you expect it to be in a locked rack cabinet, in a locked server room as well.
Last edited by fordem (2008-06-03 15:52:21)
Offline
There is also one major flaw in your continues comparisons with Miscrosoft and the DNS. The DNS is designed intentionally to be a server to allow others access to its files, and windows is designed as a client application, which intentionally disallows remote access to its files (with small exception).
Last edited by bq041 (2008-06-04 14:43:00)
Offline
bq041 wrote:
There is also one major flaw in your continues comparisons with Miscrosoft and the DNS. The DNS is designed intentionally to be a server to allow others access to its files, and windows is designed as a client application, which intentionally disallows remote access to its files (with small exception).
I actuallly agree with 'fordem', he is perfectly right in his conclusion. DNS is not intended to be a secure server by any means. It is NAS which stands for Network Attached Storage. Server capabilities are a bonus to differentiate DNS-323 from competition. In other words, the ability to "hack" into DNS-323 doesn't necessarly mean it is was intended to be a secure sever.
-- Andrey
Offline
andrey wrote:
bq041 wrote:
There is also one major flaw in your continues comparisons with Miscrosoft and the DNS. The DNS is designed intentionally to be a server to allow others access to its files, and windows is designed as a client application, which intentionally disallows remote access to its files (with small exception).
I actuallly agree with 'fordem', he is perfectly right in his conclusion. DNS is not intended to be a secure server by any means. It is NAS which stands for Network Attached Storage. Server capabilities are a bonus to differentiate DNS-323 from competition. In other words, the ability to "hack" into DNS-323 doesn't necessarly mean it is was intended to be a secure sever.
-- Andrey
Andrey - I could be wrong, but I don't think bq041 was disagreeing with me, way I saw it was he didn't agree with jdoering who was comparing security in Vista Home Basic and the DNS-323.
Offline
I don't see why there is still discussion about this. Being able to access all files on your DNS-323/CH3SNAS through a web browser without the option to restrict access to certain files/directories is a huge security hole which - no matter how 'accessible' the device is - needs to be fixed.
It took me less than 5 minutes to write a mail to Conceptronic to inform them about the issue and I'm confident that they're looking into it.
I'll poke them some more if no results are seen in future firmware updates, until they do provide some sort of solution.
Offline
And that's what i have been trying to show trough all of my replies. All functionality, usages, WAN, LAN, ports aside, knowing that there is a way to access or DELETE all of my files using web form does not sound right, right? Or it is a feature, not a bug?
BTW, looking at the goahead soouce code makes me wonder what were they thinking. There is so much more bugs and errors.
If only i could compile it, but no, they made it impossible to do..
D-Link (and Conceptronic) should fix this, period.
Last edited by SilentException (2008-06-04 19:27:06)
Offline
I agree - there's no need to discuss it.
If you have a LAN environment which includes hacker wannabees and need bulletproof security then this is not the device for you - there are many more secure devices to choose from and all with a considerably higher price tag. This on the other hand was designed for a low security environment and priced accordingly.
It's your data, it's your money - it's your choice.
Offline
I think we should all send e-mails to Dlink (or whoever) asking the web server vulnerabilities be fixed. Doing so definitely won't hurt anything. Heck it may eventually reach the right person there.
In the meantime, I tend to think that devices like these are nothing more than a souped-up external hard disk that happens to have network and RAID capabilities. Securing your home network would be much more productive.
Offline
Be careful what you ask for. They may make it so secure you won't be able to fun_plug any more. ( That truly would be no fun!
Cheers!
bspvette86
Offline
I don't understand the references to fun_plug being a security hole. The DNS-323 isn't a trusted computing platform that needs to restrict what software an AUTHORIZED user is allowed to run on the device.
As long as the device allows you to set sufficient permissions so unauthorized users can't access (create, modify, read) the fun_plug script itself; the existence of the feature is not a security hole by itself. It's a secure backdoor for authorized users to extend the functionality of the device. Now if you do things in your fun_plug script that run insecure extensions; that's your choice and not the responsibility of the device. But that's a user's choice and can easily be disabled if needed.
-Jeff
Offline
Yes, fordem is correct.
Offline
jdoering wrote:
I don't understand the references to fun_plug being a security hole. The DNS-323 isn't a trusted computing platform that needs to restrict what software an AUTHORIZED user is allowed to run on the device.
As long as the device allows you to set sufficient permissions so unauthorized users can't access (create, modify, read) the fun_plug script itself; the existence of the feature is not a security hole by itself. It's a secure backdoor for authorized users to extend the functionality of the device. Now if you do things in your fun_plug script that run insecure extensions; that's your choice and not the responsibility of the device. But that's a user's choice and can easily be disabled if needed.
-Jeff
Talk about an oxymoron - a secure backdoor for authorized users
Offline
fordem wrote:
Talk about an oxymoron - a secure backdoor for authorized users
Fordem,
Just because it's an "undocumented feature" doesn't make it a back door. And since when have back doors been a security risk anyway????
Cheers!
bspvette
Offline
bspvette86 wrote:
fordem wrote:
Talk about an oxymoron - a secure backdoor for authorized users
Fordem,
Just because it's an "undocumented feature" doesn't make it a back door. And since when have back doors been a security risk anyway????
Cheers!
bspvette
Look again buddy - I'm not the one calling it a backdoor,
For what it's worth - the very term backdoor implies unauthorized access, which in turn implies a security violation - hence my calling the previous poster's statement an oxymoron.
Last edited by fordem (2008-06-05 00:43:34)
Offline
I should have said "undocumented feature"; but I believe that my intent in the original statement was clear anyway.
Offline
fordem wrote:
I agree - there's no need to discuss it.
If you have a LAN environment which includes hacker wannabees and need bulletproof security then this is not the device for you - there are many more secure devices to choose from and all with a considerably higher price tag. This on the other hand was designed for a low security environment and priced accordingly.
It's your data, it's your money - it's your choice.
That's the wrong attitude, one way or the other.
It's not like D-Link tells the user _anywhere_ that the device will behave like that.
Where does it say that it's secure? Where does it say that it's NOT secure?
I sincerely doubt that the fact that the included web server allows access to every and all files on the device is in any way intentional. It's just an oversight by someone which should be looked into.
Offline
fordem wrote:
Look again buddy - I'm not the one calling it a backdoor,
For what it's worth - the very term backdoor implies unauthorized access, which in turn implies a security violation - hence my calling the previous poster's statement an oxymoron.
Fordem,
I think you missed my wink.... Maybe I should have used [sarcasm] [/sarcasm] and lol as well.
CHEERS!
bspvette
PS: I wasn't joking about them getting the idea to remove fun_plug to secure the device.
Last edited by bspvette86 (2008-06-05 02:59:55)
Offline
Let me put it this way - for many months prior to purchasing my DNS-323 I looked at NAS solutions - fiddled with some linux based software solutions (security sucked, performance sucked and no integration with Windows AD domains), I looked at some turnkey solutions - ever heard of "powered by Windows"? - it's now called Windows Storage Server - integrates into a Windows AD domain flawlessly, hardware RAID, beautiful, but I couldn't afford it for my small home based business.
I didn't care for the Linksys NSLU2 (no disk redundancy) but the price was right - and then I came across a product announcement for the DNS-323 - I liked it and I ordered one the first day it became available at the online retailers I do business with.
For the price I paid for it I'm prepared to live with it's shortcomings - I did my research before I made my choice - and I know how much redundancy and security sells for. It does what I need (well - with a little assistance from fun_plug) and it is as secure as THIS small business needs it to be.
And just so that this is very clear - I work in the IT industry and have done for the past thirty years, so it's not that I don't know about security or don't appreciate it, but rather, I know what it costs, I'd rather put the money in perimeter security, starting with the firewall - once I keep them out, then I don't need to worry about them getting access to my NAS.
I stand behind everything I said earlier ....
If you have a LAN environment which includes hacker wannabees and need bulletproof security then this is not the device for you - there are many more secure devices to choose from and all with a considerably higher price tag. This on the other hand was designed for a low security environment and priced accordingly.
It's your data, it's your money - it's your choice.
There was a question I asked the original poster - he never answered, I'll ask you now. If it cost 1000 (a figure he chose) would you have bought it?
In short - are you willing to put your money where your mouth is - he wasn't, as he made clear in a subsequent post.
Last edited by fordem (2008-06-05 04:06:09)
Offline
A security hole is a security hole is a security hole. Which needs to be fixed.
I don't see the relevance of price in this case of a security hole being revealed. When buying a device - any device - with a built-in web-server I don't expect it to provide access to all files on it by default. I just wouldn't think of the possibility that someone would (pre)configure a device like that.
Even if so, the manufacturer should inform you about this and also provide some means (configuration file) to enable restrictions.
D-Link never told us that the NAS behaves like this, now it has to take responsibility for it.
No, I wouldn't have bought the DNS-323 for 1000 bucks. But I wouldn't have bought any other device for that kind of money either. Such a product would provide more features than I (currently) need.
(PS: If I'm not mistaken the manual even tells you that you can put your own website in the /web share in order to use the device as a web server. Which in turn could mean that you can provide access from outside your LAN. Now the security hole is exposed to the outside).
Just to put an end to this, I encourage anyone here who owns such a device and can spare 3 minutes to write an e-mail to either D-Link or Conceptronic. The more people inform them about this, the higher priority it will hopefully get.
Offline
Well I for one see this as a security problem since right on the product overview page at http://www.dlink.com/products/?sec=0&pid=509 it states
Whether you are allowing access locally or over the Internet, keep data safe by only giving rights to specific users or groups. When configuring the DNS-323, you can create users and groups and assign them to folders with either read or read/write permissions.
If anyone can read every file on the box with little effort, where is the security in that?
Regards,
bspvette
Offline
Do your research - present your arguement from a position of knowledge - Windows Storage Server (WSS) will give you a lot less features for a lot more money, in fact, the only features that WSS has over the DNS-323 is security. in that it will integrate seamlessly in a Windows AD domain - no DHCP servers, no DNS servers, no web servers, no domain controllers, no print servers - and that will cost you quite a bit more than a 1000 - not that you care, you're not buying it - you want the security, but you're not prepared to pay for it.
Now - I'm quite sure there are other products priced in between these two that offer more security than the DNS- 323 (and possibly more features) for less than the cost of a WSS solution - which by the way is a hardware/software package only available from the likes of Dell, Gateway, HP/Compaq, IBM, IOmega, Maxtor - but you don't care you're not buying it - you want the security, but you're not prepared to pay for it.
One of the cost factors that pushes the price of a WSS solution up is the OS (IBM used to offer a WSS based on their xSeries 206 hardware, and the hardware itself retails at less than $1000) which forces the low end solutions to go open source - you want the security, you've got access to the source code, add it yourself, that's what open source is about.
So you see - you - like the original poster are standing on your soapbox preaching, without taking the time or doing the due diligence of researching the marketplace and finding out exactly what your dollar will buy you - he didn't see why he should "do their job", he went so far as to state it was software and could be a billion times more secure with no additional cost - well even software has an additional cost, as either one of you will find out if you attempt to fix it yourself.
As I have been saying from jump street, the security is available, you have to make the choice to pay for it.
By the way - unless you have a different manual to the one I have, there is no mention of hosting your own website on the DNS-323, so I think you are mistaken.
Oh - on a security hole is a security hole is a security hole .....
Consider this - anyone with physical access to the DNS-323 has complete access to your data - so that too, is a security hole.
Offline
Fordem,
Well I for one am of the old school that believes if a manufacturer advertises a feature, it needs to provide those features or it could very well be considered a fraud. It is rather interesting that the product page for the DNS-343 says nothing about user/group security yet the DNS-323 page still touts all those wonderfull features and even glamourizes it by stating things like
This is ideal for an office environment with employee-specific sensitive data or for the home where you can ensure your children will only have access to age appropriate material.
Geesh. At least they could do is update their web page with a more accurate description, and as you have stated elsewhere, update the documentation to match what the box actually does. (for example: translate "new" to unpartitioned when inserting drives, remove EXT3 refrences, remove scandisk and defrag refrences)
I have relegated this box to only be anoter hack tool and a media server. Heck, I can't even use my HD content because files > 4GB do not get served up by the native UPnP server correctly (unsigned 32-bit filesize wrap on the media scan). So much for their other claim of:
Then, enjoy the benefits of the built-in UPnP AV media server as you stream digital content to compatible media players (such as those found in D-Link's MediaLounge™ product line). This feature is highly convenient as it allows you to turn off a computer that would normally be needed for the same function.
Ahh well, as you have inferred, -you get what you pay for- this is no EMC class device. As for spending $1000 on it to get those features working? No way Jose! That would build a fairly nice linux media server in component land that would run circles around this thing. An easy option for me since much like yourself, I have been and uber hack since earth cooled.
Cheers
bspvette
Offline
Everyone needs to stop and take a step back for a moment. You are preaching from a priveliged standpoint. For most users, this is secure.
You and I are all hackers. We are doing things and finding out things about it by intentionally going after weakpoints and using it for purposes not intended. The DNS has been around for years, but it takes until 2008 for a group of hackers to discover this??!! That means to the average person at home and their kids should take about 10 years to discover that they can do this, if they ever do at all. If the fun_plug was not part of this unit, I bet you would never have figured out the URL issue.
Why? Probably because it would not have been worth your time to play with it. Welcome to the 99% of the world.
bspvette86 wrote:
This is ideal for an office environment with employee-specific sensitive data or for the home where you can ensure your children will only have access to age appropriate material.
Come on, this statement is true. If these people's kids are that good to be hacking this and trying out URL's of specific known file, or even trying to run commands from in JS, then there are much bigger things at stake than the data on the drive. Same goes for the office.
No security is perfect, but for the group of users that this was marketed to, the security is adequate.
Now the next point. Quit complaining about it. Fix it, turn it off, throw it away, ignore it, I don't care what you do about it, but quit complaining. You informed D-Link and Comptronics, what? A few days ago? ...and you expect it to be fixed last week. That's a little unrealistic. Wait until they tell you they aren't going to do anything about it, then complain.
Offline
@fordem: that question didn't seem worth answering...
money you pay should never have influence on security. for example: would you be happy if the buffer overflow exploit was fixed in winamp pro (payable) and still there in free?
also physical security is whole another story and i don't see the point mixing it with this...
@bq041
noone is expecting d-link to fix it in a day (at least not me). what i do want is an acknowledgment and the words "we're working on it"
as a side note, i gave them proposed hotfix. which could be done one day..
btw, i have dns-323 for little more than a month, started actively playing with it a month ago (when i registered). didn't take me long to discover all this (1 day).. and i am not a hacker or security expert.
what i don't understand a bit is why the certain members here act like they do not want these holes to be fixed?
you want insecure device, you have one. i really don't understand why the thread grew into this. these security holes might bite you no matter how secure (you think) your lan or wlan is. i guess you're living the "it's not gonna happen to me" life...
i'm writing them email. if you care about security, you should too.
Last edited by SilentException (2008-06-05 11:49:11)
Offline
SilentException wrote:
what i don't understand a bit is why the certain members here act like they do not want these holes to be fixed?
you want insecure device, you have one. i really don't understand why the thread grew into this.
You are right. This whole discussion is getting boring. SECURITY HOLE IS A SECURITY HOLE. It should be fixed as fast as possible. It doesn't matter how much DNS-323 costed. For me it was expensive (+ european price is much higher than US). I didn't pay my hard earned money for the security illusion. Besides I wouldn't be surprised if all D-Link NAS line (DNS-313, DNS-321, DNS-343) had exactly the same problems (and that would be a total D-Link compromitation).
Last edited by Naoki (2008-06-05 12:35:07)
Offline