> For a particular user, his 10/100 bucks and personal
> data is all that
> matters. When it comes to virus-protection/security,
> it is important
> to defend against *all* forms of possible attacks to
> the best extent.

This is true; agreed.

> Possible vulnerabilities only increases with the
> software stack. Not
> always should it be in the kernel or the database.
> 
> Some of the below reports should help one recognise
> it(for solaris):
> [1]
>  http://support.bb4.com/archive/200105/msg00218.html
> [2]
>  http://www.virus.org/news/unix-security/solaris-telne
> -worm.html
> [3]
>  http://blogs.sun.com/security/entry/solaris_in_telnet
> _worm_seen
> [4] http://www.chkrootkit.org -> Check the long
>  list of rootkits.
> any of the rootkits are applicable for Solaris.
> 
> I keep receiving the CERT advisories related to some
> of the platforms
> (including Solaris) that mention about the
> vulnerabilities and the
> patches to apply. This doesn't seem to indicate that
> Solaris systems
> are unbreakable inspite of user following all the
> correct practices.
> Check the number of security patches that are
> released every two
> months.

Surely you jest!

The sadmind attack is *ancient*; the telnet hole has been patched a long time 
ago -- in a network security world, that's *eons*.

The only thing that counts is a 0-day attack that's unpublished.

rootkits must exploit a hole in the service running on an open port -- but what 
will you exploit if the only thing that's running on a system is an 
unvulnerable version of sshd?

You have two choices -- either you start a brute force attack, which will take 
ages, and will light up the monitoring system like a x-mas tree, or you try to 
find a previously undiscovered hole in sshd.

And of course, what good will a brute force attack do on an sshd which is 
configured to only accept keys and has passwd auth specifically disabled? 
Better hope for a buffer overrun, since sshd is still one of the few services 
running as root.

That said, let's presume you are successful and land into the system. But, the 
only thing you find is a "blind" system that can't go anywhere and can't "see" 
anything -- in other words, you landed into a trap, a jail that you might be 
able to get in, but can't get out of.

As of for the links you posted, I knew of those when they first "came out" -- 
what kind of a security engineer would I be if I didn't? Not very good one, I'd 
say.

Remember: there is currently no technology to compensate for human stupidity. 
If the sysadmin is stupid enough not to lock the system down, no engineer can 
compensate for that.
 
 
This message posted from opensolaris.org
_______________________________________________
opensolaris-discuss mailing list
opensolaris-discuss@opensolaris.org

Reply via email to