[BlueOnyx:04501] Re: PCI scans -trying again without the report
Michael Stauber
mstauber at blueonyx.it
Sat May 15 16:43:22 -05 2010
Hi webmaster,
> The moderator held the post with the report.
Hey, there is no moderation. The list software is simply configured not to
allow any attachments. For security reasons.
I see Jeff has already helped you out, but I also got to say a few things here
about the issue:
PCI compliance checks are not entirely useless, but the report you got from
your audtitor indicates that the auditor is an entirely clueless bunch that
shouldn't be allowed to practice their voodoo-shamanism near IT related gear.
And with that statement I'm trying to my best to be overly polite. :o)
RPM based distributions like CentOS, RedHat, or SuSE have - as long as they've
been around - had the habbit of freezing version numbers of programs and
daemons after a major release of their OS.
Since CentOS5 came out it's version of Apache has been 2.2.3. BUT: This is not
the "stock" and unpatched Apache-2.2.3. If you check the RPM database, then
you'll see that it's now the 43th release:
[root at cbx web]# rpm -q httpd
httpd-2.2.3-43.el5.centos
Means: It has been patched 43 times already and tons of known vulnerabilities
have been fixed in between.
Run this command ...
rpm -q --changelog httpd
... to see what was fixed and when.
Of course your especially capable (in other fields) PCI complicance auditor
just "talks" to Apache to query the version number, sees that it reports 2.2.3
and spits out a lengthy list of vulnerabilities that his own database
attributes to Apache 2.2.3. Without looking further.
Likewise he makes wild claims which are entirely rubbish:
"Port: snpp (tcp/444) "
That's the Admin interface of the server, NOT the service "snpp".
I just went through the entire report and it contains so much garbage that I
can't even be bothered to refute them one by one.
The only question mark (as far as CentOS or BlueOnyx is concerned!) is that
our Sendmail allows VERIFY, but even *that* is not such a big deal as there
are other (still supported and possible!) ways to determine if a user exists
on a system - even if VERIFY is disabled. Hence disabling VERIFY doesn't give
you one inch of extra security.
The other thing - as far as you are concerned - is: What do you run on port
10000? Because a "stock" CentOS + BlueOnyx doesn't use this port for any
service.
Other than that: ANYONE is well advised to NOT store credit card details on a
server that's used for shared hosting, that is NOT behind a firewall and NOT
in housed in a physically well secured location. These are three DO NOT's.
Otherwise you're not doing yourself or your customers a favour there and it
may be best to offload the credit card processing to a company that does it
for a living.
--
With best regards
Michael Stauber
More information about the Blueonyx
mailing list