
XEROX WorkCentre
3550
Information Assurance Disclosure Paper
18
Ver. 1.3, March 2011 Page 18 of 32
2.8.2.5. Port 88, Kerberos
This port is only open when the evice is communicating with the Kerberos server to authenticate a user, an is only
use only to authenticate users in conjunction with the Network Scanning feature. To isable this port,
authentication must be isable , an this is accomplishe via the Local User Interface.
This version of software has Kerberos 5.1.1 with DES (Data Encryption Stan ar ) an 64-bit encryption. The Kerberos
co e is limite to user authentication, an is use to authenticate a user with a given Kerberos server as a vali user
on the network. Please note that the Kerberos server (a 3r party evice) nee s to be set up for each user. Once the
user is authenticate , the Kerberos software has complete its task. This co e will not an cannot be use to encrypt
or ecrypt ocuments or other information.
This feature is base on the Kerberos program from the Massachusetts Institute of Technology (MIT). The Kerberos
network authentication protocol is publicly available on the Internet as freeware at
http://web.mit.e u/kerberos/www/. Xerox has etermine that there are no export restrictions on this version of the
software. However, there are a few eviations our version of Kerberos takes from the stan ar Kerberos
implementation from MIT. These eviations are:
1) The evice oes not keep a user’s initial authentication an key after the user has been authenticate . In a
stan ar Kerberos implementation, once a user is authenticate , the evice hol s onto the authentication for a
programme timeout (the usual efault is 12 hours) or until the user removes it (prior to the timeout perio ). In
the Xerox implementation, all traces of authentication of the user are remove once they have been
authenticate to the evice. The user can sen any number of jobs until the user logs off the system, either
manually or through system timeout.
2) The evice ignores clock skew errors. In a stan ar implementation of Kerberos, authentication tests will fail if a
evice clock is 5 minutes (or more) ifferent from the Kerberos server. The reason for this is that given enough
time, someone coul reverse engineer the authentication an gain access to the network. With the 5-minute
timeout, the person has just 5 minutes to reverse engineer the authentication an the key before it becomes
invali . It was etermine uring the implementation of Kerberos for our evice that it woul be too ifficult for
the user/SA to keep the evice clock in sync with the Kerberos server, so the Xerox instantiation of Kerberos has
the clock skew check remove . The isa vantage is that this gives malicious users unlimite time to reverse
engineer the user’s key. However, since this key is only vali to access the Network Scanning features on a
evice, possession of this key is of little use for nefarious purposes.
3) The evice ignores much of the information provi e by Kerberos for authenticating. For the most part, the
evice only pays attention to information that in icates whether authentication has passe . Other information
that the server may return (e.g. what services the user is authenticate for) is ignore or isable in the Xerox
implementation. This is not an issue since the only service a user is being authenticate for is access to an e-
mail irectory. No other network services are accessible from the Local UI.
Xerox has receive an opinion from its legal counsel that the evice software, inclu ing the implementation of a
Kerberos encryption protocol in its network authentication feature, is not subject to encryption restrictions base on
Export A ministration Regulations of the Unite States Bureau of Export A ministration (BXA). This means that it
can be exporte from the Unite States to most estinations an purchasers without the nee for previous approval
from or notification to BXA. At the time of the opinion, restricte estinations an entities inclu e terrorist-
supporting states (Cuba, Iran, Libya, North Korea, Su an an Syria), their nationals, an other sanctione entities
such as persons liste on the Denie Parties List. Xerox provi es this information for the convenience of its customers
an not as legal a vice. Customers are encourage to consult with legal counsel to assure their own compliance with
applicable export laws.
2.8.2.6. Ports 137, 138, 139, NETBIOS
For print jobs, these ports support the submission of files for printing as well as support Network Authentication
through SMB. Port 137 is the stan ar NetBIOS Name Service port, which is use primarily for WINS. Port 138
supports the CIFS browsing protocol. Port 139 is the stan ar NetBIOS Session port, which is use for printing. Ports
137, 138 an 139 may be configure in the Properties tab of the evice’s web page.
For Network Scanning features, ports 138 an 139 are use for both outboun (i.e. exporting scanne images an
associate ata) an inboun functionality (i.e. retrieving Scan Templates). In both instances, these ports are only
open when the files are being store to the server or templates are being retrieve from the Template Pool. For these
features, SMB protocol is use .