% How does NT allow anyone to read and write to the registry? Could you
% also forward the address for the listserv for the ntsecurity list? We
% are looking to use commercial firewalls (Raptor's and FW-1) under NT
% and are curious to see other's experience with either of these.
Well, by default, NT allows guest read and write access to the
registry, and by default, NT has a guest account, with no password
which often remains there on many installations.
However, even if guest has a passowrd, any other user on that
NT box could edit the registry.
There are a few things one can do to sorta secure NT, but
there are so many, one starts to think the only way to make
NT secure is to disconnect it from the network... or put it
behind its own firewall (which stiill makes it vunerable to
people who have access to it...)
Global Internet (Gi.net) have a firewall, and a TNT package
for NT, which can secure NT from tcp/ip networks, but
merely by making it a wrapper, which basically acts like
a tcpwrapper under unix, which only allows access to it
to hosts which are specified.
The firewall is based on gauntlet....
I unfortuneatly have not had the time to evaluate these packages
extensively, or any of the competing packages, for that matter...
Because NT has even more security holes than Irix *duck*,
I wont list them here, but rather I suggest you subscribe
to the ntsecurity mailing list @ iss.net.. the details are:
mail majordomo @
net with "subscribe ntsecurity" as the body
of the message (usual majordomo speel)
If I can be of any assistance, send me some e-mail and I'll
see what I can do (but be warned, you will prolly be e-mail >#200
in the que :( )
John Betts, Aztec Internet Services Port Elizabeth, South Africa
za, Tel. +27(0)41 303 475, Fax. +27(0)41 301 052
The world is complex. The Sendmail configuration reflects this.