Subj : Bugbear.A virus notes
To   : Mike Ruskai
From : Mike Luther
Date : Thu Oct 17 2002 12:38 am

Mike ..

MR> The user management screen has a set of radio buttons for making the
MR> password optional or required.  It defaults to optional for the GUEST
MR> account.  It defaults to required for all new accounts.

MR> I'm not sure if there are any command-line use management programs

MR> Basically, one should leave the GUEST account as is, and create new ones
MR> for password-protected access to resources.

There is such a button combination, including the 'expire password' check box
in the Shared Resources setup folder.  However in this case, when the two
attacks managed to get in, this was firmly set so the the GUEST required a
password.  It was not optional at all.

And in this case it only had USER rights checked.

I haven't got my notes in front of me, but from reading the Usegroups, I know
that there is a utility tool for command line use which will, I think I recall
it right, create a new user with ADMIN rights from the get go at command prompt
level.  Further I think I recall that you can also copy over the NET.ACC
account from the install directory into the appropriate place in the operations
game.  That will restore the standard OPERATOR - PASSWORD and GUEST with no
password game to get you back in if you can't remember this and that.

But doing this on a bust in Port 136/7 - 139 romp?  If that happened, my
customized access profiles would then be gone too and they hadn't changed at
all in re what had been set, despite the escapades.  No new goodes shown there
at all from what was there earlier.  Nor did the LAN register anyone logged in
when it was happening ...

As we noted in the discussion, OS/2 doesn't have any three strikes and you are
out or such password pranging block.  You can mash on it en mass trying to
break in.  And, in both cases, I wasn't around when it started.  But if there
wasn't anyone logged in when it was happeing in the logout, yet it was
happening, something had to be grossly wrong.  And we never found out what it
was that was bad.

As I think I recall all the discourse that went on at the time, NIMDA.A was
seeking the use of boxes with NETBIOS over TCP/IP which had a GUEST account
with no password, or an ADMIN account with no password, or a box on which the
pest could establish adminitrative rights and create shares on the fly via this
or that attack mode for what it wanted.

I even thought about the possibility that even though you might have had a
GUEST with no password, and created shared resources for it with read/write
capability, you could have then gotten rid of GUEST in LAN/UPM.  But you might
have still left GUEST defined in the shared resources folder and so on I think
you are citing here.  I can vizualize how that might get you into hot water
with NB over TCP/IP and far places.  However that wasn't the case here either
and the install admin plus password was gone too.


--> Sleep well; OS/2's still awake! ;)

Mike @ 1:117/3001

--- Maximus/2 3.01
* Origin: Ziplog Public Port (1:117/3001)