NetWare includes a security feature called NCP packet signature that protects servers and clients using the NetWare Core ProtocolTM (NCP) services.
NCP packet signature prevents packet forgery by requiring the server and the client to sign each NCP packet. The packet signature changes with every packet.
Without NCP packet signature installed, a user could pose as a more privileged user and send a forged NCP request to a NetWare server. By forging the proper NCP request packet, an intruder could gain the Supervisor object right and access to all network resources.
NCP packets with incorrect signatures are discarded without breaking the client's connection with the server. However, an alert message about the invalid packet is sent to the error log, the affected client, and the server console. The alert message contains the login name and the station address of the affected client.
If NCP packet signature is installed on the server and all of its workstations, it is virtually impossible to forge a valid NCP packet.
For additional information about packet signature, see:
To implement packet signature, see Using NCP Packet Signature.
NCP packet signature is recommended for security risks such as
NCP packet signature is not necessary for every installation. You might choose not to use NCP packet signature if you can tolerate security risks in situations such as
Because the packet signature process consumes CPU resources and slows performance both for the client and the NetWare server, NCP packet signature is optional.
Several signature options are available, ranging from never signing NCP packets to always signing NCP packets. NetWare servers and NetWare clients each have four settable signature levels.
The signature options for servers and clients combine to determine the level of NCP packet signature on the network.
You can choose the packet signature level that best meets both your system performance needs and network security requirements.
NOTE: Some combinations of server and client packet signature levels can slow performance. However, low-CPU-demand systems might not show any performance degradation.
The NCP packet signature levels for the server and the client interact to create the effective packet signature for the network. Some combinations of server and client levels do not allow logging in.
The following figure shows the interactive relationship between the server packet signature levels and the client signature levels.
Figure 1
Effective Packet Signature of Server and Client
The default NCP packet signature level is 1 for clients and 1 for servers. In general, this setting provides the most flexibility while still offering protection from forged packets. Following are some examples of situations requiring different signature levels.
For information on implementing NCP Packet Signature, see Using NCP Packet Signature.