From support@us.external.hp.com Wed Mar 13 00:50:48 1996
Date: Wed, 13 Mar 1996 00:59:48 -0800
From: HPSL Mail Service <support@us.external.hp.com>
Reply to: support-feedback@us.external.hp.com
To: Damien Sorder <jericho@netcom.com>
Subject: RE: send doc HPSBUX9602-030

--------
## Regarding your request:
   Send Doc HPSBUX9602-030

The following are the results of your request from the HP SupportLine mail
service.

===============================================================================
Document Id: [HPSBUX9602-030]
Date Loaded: [02-22-96]

Description: Security Vulnerability DCE Sec. Service session key gen'rtn.
===============================================================================

-------------------------------------------------------------------------
HEWLETT-PACKARD SECURITY BULLETIN: HPSBUX9602-030, 21 Feb 96
-------------------------------------------------------------------------

Hewlett-Packard recommends that the information in the following
Security Bulletin should be acted upon as soon as possible.  Hewlett-
Packard will not be liable for any consequences to any customer resulting
from customer's failure to fully implement instructions in this Security
Bulletin as soon as possible.

____________________________________________________________________
PROBLEM:  A vulnerability in the way that the DCE Security Service
          generates session keys.
PLATFORM: HP 9000/700 and 9000/800 systems running HP DCE/9000 and
          configured into DCE cells
DAMAGE:   The security of DCE services and DCE-based applications could
          be compromised.  If integrated login is in use, host security
          could also be compromised.

SOLUTION: Apply patch PHSS_6841 (HP-UX 9.x running HP DCE 1.2 or 1.2.1), or$
                      PHSS_6842 (HP-UX 9.x running HP DCE 1.4.2), or$
                      PHSS_6843 (HP-UX 10.01 running HP DCE 1.4), or$
                      PHSS_6844 (HP-UX 10.10 running HP DCE 1.4.1).$
          to any hosts running a DCE Security Servers (secd), and then
          perform additional followup actions documented here.

AVAILABILITY:
          All patches are available now.

____________________________________________________________________


I. Kerberos keygen

   A. Background
      DCE uses randomly-generated session keys as a part of the protocols
      it uses to authenticate and protect communication between various
      parties (such as hosts, users, and services).  A weakness in the
      way the DCE Security Service generates keys could allow an attacker
      to compromise DCE security.  Executing such an attack would require
      direct access to the network hosting a DCE cell.

   B. Fixing the problem
      A fix to the DCE Security Server (secd) eliminates this weakness.
      Cell administrators should obtain and install the fixed secd
      and then must also execute additional administrative procedures
      as documented below.

   C. Recommended Solution

   1.  Determine which patch is appropriate for your hardware platform
       and operating system:

          PHSS_6841 (HP-UX 9.x running HP DCE 1.2 or 1.2.1)
          PHSS_6842 (HP-UX 9.x running HP DCE 1.4.2)
          PHSS_6843 (HP-UX 10.01 running HP DCE 1.4)
          PHSS_6844 (HP-UX 10.10 running HP DCE 1.4.1)

   2.  Hewlett Packard's HP-UX patches are available via email
       and World Wide Web

        To obtain a copy of the HP SupportLine email service user's
        guide, send the following in the TEXT PORTION OF THE MESSAGE to
        support@us.external.hp.com (no Subject is required):

                      send guide

        The users guide explains the process for downloading HP-UX
        patches via email and other services available.

        World Wide Web service for downloading of patches
        is available via our URL:
        (http://us.external.hp.com)

   3.  Apply the patch to your HP-UX system.
        Check for warnings or errors per the patch installation
        instructions.  The logs are: /tmp/update.log (for 9.x) or
        /var/adm/sw/swinstall.log (for 10.x).  This can be done as
        follows:

       a. At the shell prompt, type "tail -60 /tmp/update.log | more"
          on 9.x or "tail -60 /var/adm/sw/swinstall.log | more" on 10.x.
       b. Page through the next three screens via the space bar,
          looking for WARNING or ERROR messages.

   4.  After installing the patch, execute the following additional
       administrative procedures:

        All the keys in all keytabs need to be changed.
        For every machine in the cell:
                1) Log in as root
                2) Start 'rgy_edit'
                3) Do a 'rgy_edit> ktlist'
                4) For every unique principal listed, do the following
                        rgy_edit> kta -p <unique_principal> -r -a
                5) Exit rgy_edit

   D. Impact of the patch and workaround

      The patches described above provide a new version of secd that
      fixes the vulnerability of subsequently-generated keys.  After
      installation of the patch, the administrative procedures described
      above must be executed to replace existing keys that may be
      vulnerable.

      No patches will be available for versions of DCE/9000 prior to 1.2.
      To protect those affected systems, we recommend upgrading to a
      currently supported release of HP DCE.


   E. To subscribe to automatically receive future NEW HP Security
      Bulletins from the HP SupportLine mail service via electronic
      mail, send an email message to:

      support@us.external.hp.com   (no Subject is required)

      Multiple instructions are allowed in the TEXT PORTION OF THE
      MESSAGE, here are some basic instructions you may want to use:

      To add your name to the subscription list for new security
      bulletins, send the following in the TEXT PORTION OF THE MESSAGE:

                  subscribe security_info

      To retrieve the index of all HP Security Bulletins issued to
      date, send the following in the TEXT PORTION OF THE MESSAGE:

                  send security_info_list

      To get a patch matrix of current HP-UX and BLS security
      patches referenced by either Security Bulletin or Platform/OS,
      put the following in the text portion of your message:

                  send hp-ux_patch_matrix

       World Wide Web service for browsing of bulletins
       is available via our URL:
       (http://us.external.hp.com)

       Choose "Support news", then under Support news,
       choose "Security Bulletins"


   F. To report new security vulnerabilities, send email to

          security-alert@hp.com

      Please encrypt exploit information using the security-alert PGP
      key, available from your local key server, or by sending a
      message with a -subject- of 'get key' (no quotes) to
      security-alert@hp.com.

________________________________________________________________________$
