Phantom print jobs, Carbon Black from VM Ware

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • Hoosierken
    Junior Member
    • Mar 2023
    • 6

    #1

    Phantom print jobs, Carbon Black from VM Ware

    I have looked at Copytechnet for years, I never joined until today. I finally ran across something that might be a interest to others. I went to a call where the IT person had received a complaint from users that when they arrived for work the copier would have an error light flashing and it had received multiple print jobs in the middle of the night. The control panel displayed the message "Could not execute because the file contains unsupported data". I met their local IT person at the location and we found that 3 Canon IR Advanced C50xx copiers and 2 check printers, sorry not mine so I didn't get the brand of their check printers, all were experiencing the same issue. He stated that they had recently installed a 'sensor' that is network security, VM Ware's Carbon Black.

    Is anyone else seeing or heard about anything like this? If not maybe just keep this in mind as a 'heads up'.
  • blackcat4866
    Master Of The Obvious

    Site Contributor
    10,000+ Posts
    • Jul 2007
    • 22943

    #2
    Re: Phantom print jobs, Carbon Black from VM Ware

    It's not unheard of to have a piece of software sending data to printers that it cannot print. I think the most common for me is meter collecting software. It polls all IP addresses, seeking out meter data. If the printer cannot understand the data, you can get firmware errors on the machine. Theoretically, any software that polls all the IP addresses can cause this. =^..^=
    If you'd like a serious answer to your request:
    1) demonstrate that you've read the manual
    2) demonstrate that you made some attempt to fix it.
    3) if you're going to ask about jams include the jam code.
    4) if you're going to ask about an error code include the error code.
    5) You are the person onsite. Only you can make observations.

    blackcat: Master Of The Obvious =^..^=

    Comment

    • rthonpm
      Field Supervisor

      2,500+ Posts
      • Aug 2007
      • 2847

      #3
      Re: Phantom print jobs, Carbon Black from VM Ware

      Security scanners often do this. I've seen it with Nessus and other tools as well. It's a bit of an annoyance, but it also be a positive as it can highlight open ports that aren't necessarily needed, or devices that aren't properly configured.

      Get it touch with whomever does security and give them the IP address of any devices spitting out jobs. They can then filter those out of their scans, or work to mitigate the issue by getting the ports on the printer triggering the scan disabled.

      In larger environments, I'm seeing more clients moving printers to their own network segment to better control access to them, and to also better classify network devices.

      Printers tend to stay around for a long time and often support long dead protocols that can offer a means of getting deeper into a network. As much as possible before putting a machine in place, I'll work with the customer to determine what can be disabled. Things like WINS, LLMNR, FTP, and other ports aren't needed on modern networks.

      Sent from my Pixel 6 Pro using Tapatalk

      Comment

      • PrintWhisperer
        Trusted Tech

        250+ Posts
        • Feb 2018
        • 454

        #4
        "Being ignorant is not so much a shame, as being unwilling to learn" - Benjamin Franklin

        Comment

        • BillyCarpenter
          Field Supervisor

          Site Contributor
          VIP Subscriber
          10,000+ Posts
          • Aug 2020
          • 16308

          #5
          Re: Phantom print jobs, Carbon Black from VM Ware

          Originally posted by rthonpm
          Security scanners often do this. I've seen it with Nessus and other tools as well. It's a bit of an annoyance, but it also be a positive as it can highlight open ports that aren't necessarily needed, or devices that aren't properly configured.

          Get it touch with whomever does security and give them the IP address of any devices spitting out jobs. They can then filter those out of their scans, or work to mitigate the issue by getting the ports on the printer triggering the scan disabled.

          In larger environments, I'm seeing more clients moving printers to their own network segment to better control access to them, and to also better classify network devices.

          Printers tend to stay around for a long time and often support long dead protocols that can offer a means of getting deeper into a network. As much as possible before putting a machine in place, I'll work with the customer to determine what can be disabled. Things like WINS, LLMNR, FTP, and other ports aren't needed on modern networks.

          Sent from my Pixel 6 Pro using Tapatalk

          I like the idea of placing all the copiers/printers on their own network segment. I'm assuming that you're talking about VLANS? If so, I'm also assuming that inter-vlan routing would need to be implemented?


          Inter-VLAN routing is the ability to route, or send, traffic between VLANs that are normally blocked by default. Switches and VLANs work at the MAC address Layer (Layer 2). Traffic can't be routed between VLANs at Layer 2 based on MAC addresses.

          PS - I had to double check because it's been a while since I've set this up. But a broadcast signal can't make it past a router...even with inter-vlan routing enabled. There is a workaround if you're using a central DHCP server and that is to use IP-Helper. This allows the DHCP broadcast signal to go past the router.
          Adversity temporarily visits a strong man but stays with the weak for a lifetime.

          Comment

          • rthonpm
            Field Supervisor

            2,500+ Posts
            • Aug 2007
            • 2847

            #6
            Re: Phantom print jobs, Carbon Black from VM Ware

            Correct: a dedicated VLAN. Many of my larger clients have started implementing VLANs to segment out traffic or to identify what it is by location or device type.

            For a printer VLAN, my recommendation is generally to only allow inbound printing (9100 and 515) from a print server, restrict web interface access to a dedicated management machine and only allow outbound SMB access to servers used for scan to folder, and SMTP access to either a relay server or the mail server for the environment (generally Microsoft 365). This allows some of those ancient devices with insecure TLS versions or other issues to remain in place and also prevent WSD or other features from causing issues, as well as preventing peer to peer printing.

            Sent from my Pixel 6 Pro using Tapatalk

            Comment

            • slimslob
              Retired

              Site Contributor
              25,000+ Posts
              • May 2013
              • 36890

              #7
              Re: Phantom print jobs, Carbon Black from VM Ware

              Originally posted by rthonpm
              Correct: a dedicated VLAN. Many of my larger clients have started implementing VLANs to segment out traffic or to identify what it is by location or device type.

              For a printer VLAN, my recommendation is generally to only allow inbound printing (9100 and 515) from a print server, restrict web interface access to a dedicated management machine and only allow outbound SMB access to servers used for scan to folder, and SMTP access to either a relay server or the mail server for the environment (generally Microsoft 365). This allows some of those ancient devices with insecure TLS versions or other issues to remain in place and also prevent WSD or other features from causing issues, as well as preventing peer to peer printing.

              Sent from my Pixel 6 Pro using Tapatalk
              I used to service the Ricoh MFP at Western Regional Office in Bakersfield. Their Corporate IT had setup their switches to only allow printing to specific ports. Normally was not a problem as new equipment was always reinstalled to the same jack as the old model. When the Bakersfield office got big enough to have their own IT staff, corporate failed to inform the Bakersfield IT of the switch settings. It became a problem when one weekend they had everything moved out of the motor maintenance garage office for repainting the office and replacing the flooring. When the moved the equipment back in, there were 2 jacks near the Ricoh and they plugged into the wrong one.

              Comment

              • Hoosierken
                Junior Member
                • Mar 2023
                • 6

                #8
                Re: Phantom print jobs, Carbon Black from VM Ware

                Originally posted by rthonpm
                Security scanners often do this. I've seen it with Nessus and other tools as well. It's a bit of an annoyance, but it also be a positive as it can highlight open ports that aren't necessarily needed, or devices that aren't properly configured.

                Get it touch with whomever does security and give them the IP address of any devices spitting out jobs. They can then filter those out of their scans, or work to mitigate the issue by getting the ports on the printer triggering the scan disabled.

                In larger environments, I'm seeing more clients moving printers to their own network segment to better control access to them, and to also better classify network devices.

                Printers tend to stay around for a long time and often support long dead protocols that can offer a means of getting deeper into a network. As much as possible before putting a machine in place, I'll work with the customer to determine what can be disabled. Things like WINS, LLMNR, FTP, and other ports aren't needed on modern networks.

                Sent from my Pixel 6 Pro using Tapatalk
                I know of another customer that has had to move an Imagepress to its own subnet because when connected to the network it would constantly reboot. They had damaged more than one counter board this way. I think disabling ports might be the key. Most customers only use ports for printing, SMTP, and maybe SMB scan to file.

                Comment

                Working...