Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

bilbo--baggins

macrumors 6502a
Original poster
Jan 6, 2006
783
130
UK
We have had to get our home network scanned internally for PCI compliance. The only "high risk" problem that is flagged (causing us to fail the scan) is that Airport Utility sends the Airport Extreme administration password across the network effectively unencrypted.

What's really surprising is that this problem has existed since 2003.

The scanning tool I'm using suggests the solution is to 1) block port 5009, and 2) administer the Airport Extreme only via a direct connection with a cross-over cable.

However, another security site suggest that Apple's response to the vulnerability is that the Airport Extreme should only be administered using an encrypted Airport connection, but that the security site disagrees (presumably because at the time this involved WEP) and says a wired connection is required.

I'm fairly new to this PCI compliance stuff - but my interpretation is that we need to pass the scan to comply. However, there seems to be no way to configure the Airport Extreme to block port 5009. Therefore even if I only administer the unit securely (with via WPA2 or by crossover cable so that the password is not sent around the network unencrypted) it will still fail the internal scan.

The network is very small, in a domestic property, so in reality there is almost zero risk, so it doesn't feel like it warrants buying another brand of router.

Has anyone dealt with this scenario of Airport Extreme failing Internal Network Vulnerability Scans? Is there any way of configuring it to block port 5009? When I try to use port mapping it tells me that the port conflicts with a configuration port.
 
I know it's not ideal, but I've found that by using WaterRoof to add the following rule to the firewall

deny tcp from any to any dst-port 5009

I'm now to complete the scan without the high risk warning. I suppose the main thing is to be aware of this risk, and to set the password and administer through a direct connection, i.e.. by crossover cable or a WPA2 encrypted wifi connection.

Can't imagine it would be that difficult to for Apple, after 8 years, to come up with a more secure solution.
 
I know it's not ideal, but I've found that by using WaterRoof to add the following rule to the firewall

deny tcp from any to any dst-port 5009

I'm now to complete the scan without the high risk warning. I suppose the main thing is to be aware of this risk, and to set the password and administer through a direct connection, i.e.. by crossover cable or a WPA2 encrypted wifi connection.

Can't imagine it would be that difficult to for Apple, after 8 years, to come up with a more secure solution.

This isn't making your network more secure, its just blocking the scanner on your machine connecting to the AEBS using tcp port 5009.

What happens if someone connects another Mac to the network ?
 
This isn't making your network more secure, its just blocking the scanner on your machine connecting to the AEBS using tcp port 5009.

What happens if someone connects another Mac to the network ?

I know that's the case, but that's the recommended fix by the security company. Basically the only 'safe' way of entering the admin password is either over WPA2 or a crossover cable - but that won't stop it from failing the scan the rest of the time. I know it's daft but I have two objectives 1) pass the scan (ie. blocking the port) and 2) only accessing the Airport Extreme securely. The two objectives are effectively unrelated - 1 to comply with the box ticking requirement, and 2 to actually carry out the intended purpose of the whole exercise!

If someone else connects a Mac to the network it doesn't matter because I won't be sending the password over the network in future (which has nothing to do with blocking the port, I know).
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.