[Prev][Next][Index][Thread]

[SLUG] Massive NT failure!




(comp.risks):



Date: Thu, 12 Feb 1998 11:23:36 -0500

From: mandrews@fd9ns01.okladot.state.ok.us

Subject: Risk: Massive NT Outage due to Registry corruption



  [This was sent me by someone at a Fortune-100 manufacturer, and is

  anonymized and sanitized at the original sender's request.  It is genuine.]



> The recent power fluctuations here in [placename] corrupted the NT

> registries in our [server-community-names].  As a result, our entire NT

> network (>10K machines) is down, and has been since 5 am this

> morning. (I'm doing direct IP to [product-name] to do mail. Thank God.)

> Once the registries got corrupted, the databases of user signons went,

> too. And, of course, the tape backups won't load because NT requires a

> timestamp somewhere in the guts that the tape image doesn't match to the

> clock. So every NT server, and most NT workstations, won't do anything

> except local work.



> If this were just office workers, it would be annoying enough. But the

> [product name] servers require such close tie-ins to the machine accounts

> that they are dead -- guess what helps run our factories? Can you say loss

> of $1M+ per hour?"



> Why am I telling you? Because our NT guys have suddenly realized that this

> is a good candidate for a denial of service attack: once the registries

> get corrupted, the entire resource domain has to be reloaded by hand --

> and that apparently includes desktops. If you have ideas on how to go

> check the registries on your NT servers, I'd suggest you go do so.



In another letter, the original sender elaborates:



> If you are recovering from this, every desktop user will have to

> delete/disable their <user>.pwl file to be able to get back on the

> network, because that file hardcodes which domain server they are

> on. HOWEVER, if they do that, they can then not get into any other service

> on their desktop for which they've stored the password, because they're

> all in that file. if the user doesn't remember the password, they're SOL,

> because the latest patch from MS keeps the *.pwl files from being hackable

> by the "standard" hacker and pwledit tools -- but it is also rendered

> unreadable to the MS standard pwl editor, too.



The total outage was in excess of 12 hours, and the loss-of-revenue from

the outage is estimated to be more than $10 million.



Mike Andrews, D.P. Director, Okla. Dept. of Transportation

mandrews@fd9ns01.okladot.state.ok.us



--

Rachel Polanskis                 Kingswood, Greater Western Sydney, Australia 

grove@zeta.org.au                http://www.zeta.org.au/~grove/grove.html

r.polanskis@nepean.uws.edu.au    http://www.nepean.uws.edu.au/ccd/

 "Yow!  Am I having fun yet?!" - John Howard^H^H^H^H^H^H^H^H Zippy the Pinhead



--

SLUG - Sydney Linux Users Group Mailing List - http://www.slug.org.au

To unsubscribe send email to slug-request@slug.org.au with

unsubscribe in the text




Follow-Ups:



Banner.Novgorod.Ru