serenacat 83 Posted ... http://www.reuters.com/article/us-britain-security-hospitals-idUSKBN18820Shttps://krebsonsecurity.com/tag/wanna-decryptor/https://technet.microsoft.com/en-us/library/security/ms17-010.aspxLinux sysadms get to the pub on a Friday afternoon, and go home for the weekend. No Windows here 2 jean claud and OmniNegro reacted to this Quote Share this post Link to post
OmniNegro 155 Posted ... Thanks again Linux. Being immune to this bullshit is such a blessing. Wonder why this is such a clusterfuck? How did M$ fix this? Lets see... https://technet.microsoft.com/en-us/library/security/ms17-010.aspx And what does the "fix" of disabling SMB do? Lets see again... https://support.microsoft.com/en-us/help/2696547/how-to-enable-and-disable-smbv1,-smbv2,-and-smbv3-in-windows-vista,-windows-server-2008,-windows-7,-windows-server-2008-r2,-windows-8,-and-windows-server-2012 In Windows 7 and Windows Server 2008 R2, disabling SMBv2 deactivates the following functionality:Request compounding - allows for sending multiple SMB 2 requests as a single network requestLarger reads and writes - better use of faster networksCaching of folder and file properties - clients keep local copies of folders and filesDurable handles - allow for connection to transparently reconnect to the server if there is a temporary disconnectionImproved message signing - HMAC SHA-256 replaces MD5 as hashing algorithmImproved scalability for file sharing - number of users, shares, and open files per server greatly increasedSupport for symbolic linksClient oplock leasing model - limits the data transferred between the client and server, improving performance on high-latency networks and increasing SMB server scalabilityLarge MTU support - for full use of 10-gigabye (GB) EthernetImproved energy efficiency - clients that have open files to a server can sleepIn Windows 8, Windows 8.1, Windows 10, Windows Server 2012, and Windows Server 2016, disabling SMBv3 deactivates the following functionality (and also the SMBv2 functionality that's described in the previous list):Transparent Failover - clients reconnect without interruption to cluster nodes during maintenance or failoverScale Out – concurrent access to shared data on all file cluster nodes Multichannel - aggregation of network bandwidth and fault tolerance if multiple paths are available between client and serverSMB Direct – adds RDMA networking support for very high performance, with low latency and low CPU utilizationEncryption – Provides end-to-end encryption and protects from eavesdropping on untrustworthy networksDirectory Leasing - Improves application response times in branch offices through cachingPerformance Optimizations - optimizations for small random read/write I/O Yep. Basically half the networking fails to work. Symlinks die, instead of using HMAC SHA 256, you will be stuck with MD5 again at best, and plenty more bullshit. And on top of that, if you have a really fast connection, even locally, well, it will just plainly not work due to MTU being back to the 1500 cap from decades ago. Thanks M$... Quote Hide OmniNegro's signature Hide all signatures Debugging is at least twice as hard as writing the program in the first place.So if you write your code as clever as you can possibly make it, then by definition you are not smart enough to debug it. Share this post Link to post
zhang888 1066 Posted ... Exposing dangerous services to the internet is a risky thing. Not only on Windows.Lots of old *nix platforms were also included in that leak, although not that common these days, but it's not an OS specific issue.Most of IoT devices are on Linux these days and are still getting hacked when they are poorly isolated. 2 RidersoftheStorm and LZ1 reacted to this Quote Hide zhang888's signature Hide all signatures Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees. Share this post Link to post