[BlueOnyx:04496] Re: PCI scans - with link to report
Jeff Folk
jefffolk at mac.com
Sat May 15 13:48:33 -05 2010
On May 15, 2010, at 11:43 AM, webmaster wrote:
> Jeff,
>
> Thanks for your input.
What else do I have to do on a Saturday? Wait, I could mow the lawn,
fix the A/C, ride the motorcycle... No problem. ;-D
> I have posted that report here:
> www.oldcabin.net/Port-scan-resultst.doc &
This was blank...
> www.oldcabin.net/port-scan-results.txt
Okay, something to look at.
I'm not going to address every entry, these bonehead scans are
triggered on simple port scans and basic version calls...
#1 TCP port 10000 -- probably your Webmin install, get rid of it
#2 TCP port 22 -- research the CVE entries, report your COMPLETE ssh
release/patch level (mine is openssh-4.3p2-36.el5_4.4.i386), research
the release/patch level on CentOS or RHEL security sites to make sure
they address the CVE entries, DOCUMENT and assuage the auditors'
"fears". For example...
Last CVE in ssh list - Google 'CVE-2008-5161 redhat' finds this
page...
https://www.redhat.com/security/data/cve/CVE-2008-5161.html which
states the issue is addressed here...
https://rhn.redhat.com/errata/RHSA-2009-1287.html with release
openssh-4.3p2-36.el5
#3 TCP port 80 (PHP) -- same as no 2, current installed rpm is
php-5.1.6-24.el5_4.5
#4 TCP port 123 -- you have the ntp server running (my BX install does
not)?? Something else using port 123??
In my current business, I deal with retail establishments (brick and
mortar) and ALWAYS suggest they DO NOT store cc numbers. That way we
only have to show a physically separate internal network and a
COMPLETELY locked down public interface on the internet facing
firewall/router. I ALWAYS suggest PCI Complaint/Certified software
solutions. They are also instructed to have a written policy for
temporarily hand written or imprinted cards' destruction when the
network is down. I do have one non-profit that accepts credit card
donations on their website, but that is passed directly to a
Authorize.net page for entry and processing.
But basically, you are going to want to stay in the PCI SAQ categories
1-3 (scanning not mandatory) to avoid this nonsense. The only way you
can accomplish this is to move the page where the cc info is entered
off of your server (outsource). Otherwise, use a dedicated server for
the processing (consider putting that on PRIVATE address space using a
second NIC), and shut down ALL unnecessary services.
> My biggest concern is...... I though the BX systems were up to
> date? When yum runs it takes care of updates/patches and such?
They are, but simple scans will not reveal the release/patch level of
your software. You will have to do something similar to what I
explained about your BIND software (rpm -q "package"). This has
nothing to do with BlueOnyx, as it is all upstream with CentOS and
ultimately RHEL (RedHat). Certified/Compliant systems are going to be
complicated and EXPENSIVE. Open source plugins are going to go the way
of the dodo (or should) unless they pass off to mainstream providers
like PayPal and Authorize.net.
> ..snip..
> When you look at the report notice the first entry for bugzilla?
> I don't think I even have that on my system but the report says it
> needs to updated.
> Huh?
> Could their report be wrong?
Notice the port? 10000. There are 14 other references to this TCP port
in the scan results. Don't you have Webmin installed? That is what is
on port 10000. YOU did that, nothing to do with BlueOnyx... Explain it
to the auditors, or uninstall.
HTH;
Jeff
More information about the Blueonyx
mailing list