To prevent security incidents, the ICT security team scans the UGent network for vulnerabilities.
As the software connects to your system and tries to reveal the vulnerability of your system, you will see messages appearing in your log files. You can ignore these. If necessary, you will have to adapt your own monitoring software to take this into account. If the scanning performance causes a nuisance, you can report this to the helpdesk.
The scans are done from the following hostnames. The IPs may change and the list may be expanded in the future:
We also ask for connections from the scanners that cannot be disabled because vulnerable systems cannot be disabled.
The list is compiled based on the information in netadmin and who has access to a virtual server. It is the responsibility of these persons to keep the server up to date.
If you believe that you are not responsible, we ask that you do one of the following:
For virtual servers, you can set who has access to a virtual machine via ICT self-service.
Commonly, false positives in vulnerability scanning occur when the scanner can access only a subset of the required information, which prevents it from accurately determining whether a vulnerability exists.
To help reduce the number of false positives, we can configure our scanners with the appropriate credentials. The scans need access to all of the asset information required information from assets so that you can accurately determine whether a vulnerability exists.
A false positive might occur when the scanner can read only the configuration information from service banners. For example, a scanner that reads an Apache banner can detect that only version 2.2.15 is installed from the HTTP banner, even when version 2.2.15-39 is also installed and that the version contains a software fix that was backported.
Another example is when the scanner reads the banner and detects the version of SSH that is installed, but can't detect the patch level or the operating system. If the scanner detects that SSH-2 is installed but can't determine the operating system, the scanner can't accurately determine whether a vulnerability exists in some instances. The vulnerability might be correctly identified on one asset but is a false positive on the other asset because SSH vulnerabilities on Red Hat SSH might not be the same for other Linux® operating systems.
Vulnerability scanners can't always access the information that they need to accurately determine whether a vulnerability exists. This limitation commonly results in false positives.
Password authentication for SSH is less secure than key-based authentication for several reasons:
In summary, key-based authentication offers a significantly higher level of security through strong cryptography, better access control, and reduced vulnerability to attacks and human error.
ssh <hostname> -o PreferredAuthentications=password -o PubkeyAuthentication=no
Performing a vulnerability scan yourself or consulting the results directly is not provided as standard. Within our organisation, such scans are reserved for the ICT department in order to guarantee a uniform approach and optimal security.
For IT contacts who have to manage a large number (>10) of machines, access can be provided under certain conditions.
If you would like to request a scan or receive more information about the options for your environment, please contact the helpdesk.