From proff Thu Sep 26 05:28:49 1996 Received: (proff@localhost) by suburbia.net (8.7.4/Proff-950810) id FAA02675 for best-of-security; Thu, 26 Sep 1996 05:28:49 +1000 Received: (sendmail@localhost) by suburbia.net (8.7.4/Proff-950810) id EAA02485; Thu, 26 Sep 1996 04:03:15 +1000 Received: from UNKNOWN(128.148.157.143), claiming to be "brimstone.netspace.org" via SMTP by suburbia.net, id smtpd02471aaa; Wed Sep 25 18:02:50 1996 Received: from netspace.org ([128.148.157.6]) by brimstone.netspace.org with ESMTP id <24376-32760>; Wed, 25 Sep 1996 13:33:23 -0500 Received: from netspace.org (netspace [128.148.157.6]) by netspace.org (8.7/8.6.12) with SMTP id NAA21977; Wed, 25 Sep 1996 13:29:51 -0400 Received: from NETSPACE.ORG by NETSPACE.ORG (LISTSERV-TCP/IP release 1.8b) with spool id 529011 for BUGTRAQ@NETSPACE.ORG; Wed, 25 Sep 1996 13:18:29 -0400 Received: from netspace.org (netspace [128.148.157.6]) by netspace.org (8.7/8.6.12) with SMTP id NAA20959 for ; Wed, 25 Sep 1996 13:18:11 -0400 Approved-By: ALEPH1@UNDERGROUND.ORG Received: from lux.levels.unisa.edu.au (lux.levels.unisa.edu.au [130.220.16.65]) by netspace.org (8.7/8.6.12) with SMTP id HAA22468 for ; Wed, 25 Sep 1996 07:51:10 -0400 Received: from (itudps@localhost) by lux.levels.unisa.edu.au (SMI-8.6/SMI-SVR4) id VAA01007; Wed, 25 Sep 1996 21:21:41 +0930 MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Approved-By: Dan Shearer Message-ID: Date: Wed, 25 Sep 1996 21:21:41 +0930 Reply-To: Dan Shearer Sender: Bugtraq List From: Dan Shearer Subject: NT 4.0 default permissions To: Multiple recipients of list BUGTRAQ Approved: proff@suburbia.net I do not think this is a bug in the normal sense of the word, ie I think that this message describes NT the way it was designed to be. Nevertheless I suspect that people on this list would be glad of the information. If you install an NT 4.0 workstation or server, the default permissions on the system partition as reported by Explorer are: Everyone Full Control (All) (All) This means that building a secure, restricted-use workstation is difficult, and that if a server becomes compromised at the share level (eg through SMB bugs) there is no underlying file permission protection. Note that the group Everyone includes the unpassworded Guest account (which should always be regarded with great suspicion in any case.) There have been several recipes developed for tightening up the security of NT 3.51 file permissions which list what files can and cannot be restricted. It seems that similar recipes need to be developed for NT 4.0, starting from scratch. -- Dan Shearer email: Dan.Shearer@UniSA.edu.au Information Technology Unit Phone: +61 8 302 3479 University of South Australia Fax : +61 8 302 3385