Maintaining the NetWare server

Preventing packet forgery

NetWare Services includes a security feature, NCP packet signature, that protects servers and clients using the NetWare Core Protocol.

NCP packet signature prevents packet forgery by requiring the server and the client to ``sign'' each NCP packet. The packet signature changes with every packet.

NCP packets with incorrect signatures are discarded without breaking the client's connection with the server. However, an alert message about the invalid packet is sent to the error log, the affected client, and the message monitor. The alert message contains the login name and the station address of the affected client.

NCP packet signature options

Because the packet signature process consumes CPU resources and slows performance, both for the client and the NetWare server, NCP packet signature is optional.

Several signature options are available, ranging from never signing NCP packets to always signing NCP packets. NetWare servers and clients both have four settable signature levels.

The signature options for servers and clients combine to determine the level of NCP packet signature on the network.


NOTE: Some combinations of server and client packet signature levels may slow performance. However, systems with low CPU-demand may not show any performance degradation. Network supervisors can choose the packet signature level that meets both their performance needs and their security requirements.

When to use NCP packet signature

NCP packet signature is not required for every installation. Some network supervisors may choose not to use NCP packet signature because they can tolerate security risks in the following types of situations:

NCP packet signature is recommended for security risks such as the following:

Server security

Security is a major concern for administrators and users when working with files and directories on the network. Several types of security exist in NetWare Services:

Use this procedure at the UnixWare desktop to prevent packet forgery, enforce password encryption, and prevent job servers from creating a window for security breach.

The following list describes the prerequesites:

Carry out the following steps:

  1. From scoadmin, select NetWare, then select the NetWare Setup utility.

  2. Select NetWare Server.

  3. Select Security.

    The ``NetWare Server Security'' window appears.

  4. Set the following variables as appropriate.

  5. Click OK.

Server signature levels

Use ``NCP Packet Signature Option'' in the previous procedure to assign server packet signature levels.

Client signature levels

Client signature levels are assigned in the NET.CFG file at the client workstation as follows:

signature level = number

To replace the existing number with Disabled (0), Enabled (1), Preferred (2), or Required (3), use NetWare Settings for NUC at the UnixWare desktop; use a text editor for DOS, Windows, or OS/2 clients. The default is Enabled (1). The levels are explained in the following list:

Disabled (0)
Client does not sign packets.

Enabled (1)
Client signs packets only if the server requests it (server option is 2 or higher).

Preferred (2)
Client signs packets if the server is capable of signing (server option is 1 or higher).

Required (3)
Client signs packets and requires the server to sign packets (or logging in will fail).

Effective packet signature

The packet signature levels for the server and the client interact to create the ``effective packet signature'' for the network. Some combinations of server and client levels do not allow logging in.

``Effective packet signature of server and client'' shows the interactive relationship between the server packet signature levels and the client signature levels.

Effective packet signature of server and client

Examples of signature levels in different situations

The default NCP packet signature level is Enabled (1) for clients and Preferred (2) for servers. In general, this setting provides the most flexibility while still offering protection from forged packets.

The following are examples of using different signature levels:

Assigning the server packet signature option

The default server packet signature option is Preferred (2). To change the option, use the ``NCP Packet Signature Option'' in the scoadmin NetWare Setup utility. See ``Server signature levels''.

Assigning the DOS or Windows workstation packet signature level

The default client packet signature level is Enabled (1). To change the level, add the following parameter to the NET.CFG file of each DOS or Windows workstation:

signature level = number

Replace number with 0 (Disabled), 1 (Enabled), 2 (Preferred), or 3 (Required).

Assigning the OS/2 workstation packet signature level

The default client packet signature level is Enabled (1). To change the level, add the following parameter to the NetWare Requester area of the NET.CFG file for each OS/2 workstation:

signature level number

Replace number with 0 (Disabled), 1 (Enabled), 2 (Preferred), or 3 (Required).

Assigning the NUC workstation packet signature level

This signature level applies to all NUC clients unless it is set in a user-specific NET.CFG file.

The default packet signature level is Enabled. To change the level, use the nwsignatures(1Mnuc) utility.


© 1999 The Santa Cruz Operation, Inc. All rights reserved.
UnixWare 7 Release 7.1.1 - 5 November 1999