Re: scrollkeeper loading external (online) DTD

2003-01-09 Thread berin

> 
> From: Hubert Chan <[EMAIL PROTECTED]>
> Subject: Re: scrollkeeper loading external (online) DTD
> Date: 10/01/2003 6:33:22

snip

> DTDs cannot introduce any vulnerabilities (unless the XML parser is
> horribly buggy).  The worst that can happen is that the file doesn't
> validate, and scrollkeeper complains.

snip

Is this strictly true?  There have been a few articles
on bugtraq recently around this kind of thing.
One in the area of "bugs", and one around external
entities and the potential for a "rogue" DTD to
specify bad URIs.  In particular an external
reference might cause a parser to open a connection
to a site that the user would not wish.

Alternately, an entity reference might translate
to some form of control string for the 
application that is later using the parsed XML.

And even if the only concern is around bugs,
surely experience would indicate that given
the growing use of XML parsers in a wide range
of applications, we should be careful of all input?

External Entities :

http://online.securityfocus.com/archive/1/297714

and

DTD DoS bug :

http://www.macromedia.com/v1/handlers/index.cfm?ID=23559

(Doesn't say much).



This message was sent through MyMail http://www.mymail.com.au



replyAll
Description: PGP signature


unsubscribe

2003-01-09 Thread Tom Huff



 


Re: scrollkeeper loading external (online) DTD

2003-01-09 Thread berin

> 
> From: Hubert Chan <[EMAIL PROTECTED]>
> Subject: Re: scrollkeeper loading external (online) DTD
> Date: 10/01/2003 6:33:22

snip

> DTDs cannot introduce any vulnerabilities (unless the XML parser is
> horribly buggy).  The worst that can happen is that the file doesn't
> validate, and scrollkeeper complains.

snip

Is this strictly true?  There have been a few articles
on bugtraq recently around this kind of thing.
One in the area of "bugs", and one around external
entities and the potential for a "rogue" DTD to
specify bad URIs.  In particular an external
reference might cause a parser to open a connection
to a site that the user would not wish.

Alternately, an entity reference might translate
to some form of control string for the 
application that is later using the parsed XML.

And even if the only concern is around bugs,
surely experience would indicate that given
the growing use of XML parsers in a wide range
of applications, we should be careful of all input?

External Entities :

http://online.securityfocus.com/archive/1/297714

and

DTD DoS bug :

http://www.macromedia.com/v1/handlers/index.cfm?ID=23559

(Doesn't say much).



This message was sent through MyMail http://www.mymail.com.au




replyAll
Description: PGP signature


unsubscribe

2003-01-09 Thread Tom Huff



 


Re: Gnutella? (was Re: TCP port 6352?)

2003-01-09 Thread Cristian Ionescu-Idbohrn
On Wed, 8 Jan 2003, Javier Fernández-Sanguino Peña wrote:

> You will see that the listing for many servers/clients in the network are
> usually port 6346 [1]. But it seems port 6352 is also used sometimes.

That seems to be the case. I found some more info on this page:

  http://outpostfirewall.com/guide/rules/preset_rules/p2p.htm

(search for "Gnotella outgoing connection" on that page).


Cheers,
Cristian



Re: ssh and lastlog

2003-01-09 Thread Johannes Franken
* Thomas Gebhardt <[EMAIL PROTECTED]> [2003-01-07 16:23 +0100]:
> as far as I can see, one can get at least 2 out of the following 3 items:
  ^"most"? otherwise trivial :-)
> * sshd Privilege Separation
> * /var/log/lastlog not world readable
> * users get a lastlog message at ssh login

If you 
- set UsePrivilegeSeparation=yes in /etc/ssh/sshd_config,
- chmod o-r /var/log/lastlog,
- configure sudo ("%users ALL=NOPASSWD:/usr/bin/lastlog -u *"), and
- add "[ ${-//[^i]/} ] && sudo /usr/bin/lastlog -u $LOGNAME" 
  to /etc/profile,
the user's bash will display the date and origin of your last login
for interactive sessions.

-- 
Johannes Franken
 
Professional unix/network development
mailto:[EMAIL PROTECTED]
http://www.jfranken.de/



Re: scrollkeeper loading external (online) DTD

2003-01-09 Thread Hubert Chan
> "Sebastien" == Sebastien Chaumat <[EMAIL PROTECTED]> writes:

Sebastien> Hi, This a real example :

Sebastien>  The xbill package contains :
Sebastien> /usr/share/gnome/help/xbill/C/xbill.xml

Sebastien>  In this file the DTD is refered by an absolute external link
Sebastien> :

Sebastien>  V4.1.2//EN"
Sebastien> "http://www.oasis-open.org/docbook/xml/4.1.2/docbookx.dtd";

That is necessary for a DocBook file.

Sebastien>  Thus : scrollkeeper-update blindly connect to
Sebastien> www.oasis-open.org to get the docbookx.dtd.

Sebastien>  I can trust signed debian packages but I can't trust
Sebastien> www.oasis-open.org.

DTDs cannot introduce any vulnerabilities (unless the XML parser is
horribly buggy).  The worst that can happen is that the file doesn't
validate, and scrollkeeper complains.

Sebastien> More than 18 files in /usr/share/gnome/help/ induce this
Sebastien> download.

Sebastien> I'am about to make bug report against scrollkeeper (for
Sebastien> acting blindly, and dowloading the same file more than once)

IMHO, the severity of such a bug would be at most "wishlist".

Sebastien> and against packages that provides the xml files (for using
Sebastien> external DTD instead of provinding it)...

It should not be providing the DTD.  At most, it should depend on
docbook-xml, which provides the DTD, although I would suggest making it
a "Recommends" rather than "Depends".  AFAIK, if docbook-xml is
installed, scrollkeeper will use the local copy, rather than fetching it
over the network.  (If not, this should be another wishlist bug.)

(Hmm.  On my system (sid), scrollkeeper already depends on docbook-xml.)

-- 
Hubert Chan <[EMAIL PROTECTED]> - http://www.uhoreg.ca/
PGP/GnuPG key: 1024D/124B61FA
Fingerprint: 96C5 012F 5F74 A5F7 1FF7  5291 AF29 C719 124B 61FA
Key available at wwwkeys.pgp.net.   Encrypted e-mail preferred.


pgp3SadAAFnYh.pgp
Description: PGP signature


Re: Gnutella? (was Re: TCP port 6352?)

2003-01-09 Thread Cristian Ionescu-Idbohrn
On Wed, 8 Jan 2003, Javier Fernández-Sanguino Peña wrote:

> You will see that the listing for many servers/clients in the network are
> usually port 6346 [1]. But it seems port 6352 is also used sometimes.

That seems to be the case. I found some more info on this page:

  http://outpostfirewall.com/guide/rules/preset_rules/p2p.htm

(search for "Gnotella outgoing connection" on that page).


Cheers,
Cristian


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: ssh and lastlog

2003-01-09 Thread Johannes Franken
* Thomas Gebhardt <[EMAIL PROTECTED]> [2003-01-07 16:23 +0100]:
> as far as I can see, one can get at least 2 out of the following 3 items:
  ^"most"? otherwise trivial :-)
> * sshd Privilege Separation
> * /var/log/lastlog not world readable
> * users get a lastlog message at ssh login

If you 
- set UsePrivilegeSeparation=yes in /etc/ssh/sshd_config,
- chmod o-r /var/log/lastlog,
- configure sudo ("%users ALL=NOPASSWD:/usr/bin/lastlog -u *"), and
- add "[ ${-//[^i]/} ] && sudo /usr/bin/lastlog -u $LOGNAME" 
  to /etc/profile,
the user's bash will display the date and origin of your last login
for interactive sessions.

-- 
Johannes Franken
 
Professional unix/network development
mailto:[EMAIL PROTECTED]
http://www.jfranken.de/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: scrollkeeper loading external (online) DTD

2003-01-09 Thread Hubert Chan
> "Sebastien" == Sebastien Chaumat <[EMAIL PROTECTED]> writes:

Sebastien> Hi, This a real example :

Sebastien>  The xbill package contains :
Sebastien> /usr/share/gnome/help/xbill/C/xbill.xml

Sebastien>  In this file the DTD is refered by an absolute external link
Sebastien> :

Sebastien>  V4.1.2//EN"
Sebastien> "http://www.oasis-open.org/docbook/xml/4.1.2/docbookx.dtd";

That is necessary for a DocBook file.

Sebastien>  Thus : scrollkeeper-update blindly connect to
Sebastien> www.oasis-open.org to get the docbookx.dtd.

Sebastien>  I can trust signed debian packages but I can't trust
Sebastien> www.oasis-open.org.

DTDs cannot introduce any vulnerabilities (unless the XML parser is
horribly buggy).  The worst that can happen is that the file doesn't
validate, and scrollkeeper complains.

Sebastien> More than 18 files in /usr/share/gnome/help/ induce this
Sebastien> download.

Sebastien> I'am about to make bug report against scrollkeeper (for
Sebastien> acting blindly, and dowloading the same file more than once)

IMHO, the severity of such a bug would be at most "wishlist".

Sebastien> and against packages that provides the xml files (for using
Sebastien> external DTD instead of provinding it)...

It should not be providing the DTD.  At most, it should depend on
docbook-xml, which provides the DTD, although I would suggest making it
a "Recommends" rather than "Depends".  AFAIK, if docbook-xml is
installed, scrollkeeper will use the local copy, rather than fetching it
over the network.  (If not, this should be another wishlist bug.)

(Hmm.  On my system (sid), scrollkeeper already depends on docbook-xml.)

-- 
Hubert Chan <[EMAIL PROTECTED]> - http://www.uhoreg.ca/
PGP/GnuPG key: 1024D/124B61FA
Fingerprint: 96C5 012F 5F74 A5F7 1FF7  5291 AF29 C719 124B 61FA
Key available at wwwkeys.pgp.net.   Encrypted e-mail preferred.



msg08412/pgp0.pgp
Description: PGP signature


Re: scrollkeeper loading external (online) DTD

2003-01-09 Thread Daniel O'Neill
Thats absolutely ridiculous.

I would file one at once, that should definitely not go unchecked, at least.  I 
can appreciate the motivation, but for my own sanity I'm too paranoid to a) 
accept strange unknown files/connections or b) send out requests for such data. 
 Especially considering since it all happens without my knowledge, which 
thanks, now I know.  Who knows if the file is the original?  The checksum is 
verified, but that doesn't mean much all things considered, where did the 
checksum come from?

On 08 Jan 2003 22:54:12 +0100
Sebastien Chaumat <[EMAIL PROTECTED]> wrote:

> Hi,
> 
>  This a real example : 
> 
>  The xbill package contains : /usr/share/gnome/help/xbill/C/xbill.xml
> 
>  In this file the DTD is refered by an absolute external link :
> 
>  "http://www.oasis-open.org/docbook/xml/4.1.2/docbookx.dtd"; 
> 
>  Thus : scrollkeeper-update blindly connect to www.oasis-open.org to get
> the docbookx.dtd.
> 
>  I can trust signed debian packages but I can't trust 
> www.oasis-open.org.
> 
> More than 18 files in /usr/share/gnome/help/ induce this download.
> 
> I'am about to make bug report against scrollkeeper (for acting blindly,
> and dowloading the same file more than once) and against packages that
> provides the xml files (for using external DTD instead of provinding
> it)...
> 
> Your opinion?
> 
> Cheers,
> 
> SEb
> 
> 
> 
> 
> 
> 
> 
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 


pgpua9VQx6pEu.pgp
Description: PGP signature


Re: scrollkeeper loading external (online) DTD

2003-01-09 Thread Sebastian Henschel
hello sebastien..

Received at 2003-01-08 / 23:10 by Sebastien Chaumat:

>  The xbill package contains : /usr/share/gnome/help/xbill/C/xbill.xml
> 
>  In this file the DTD is refered by an absolute external link :
> 
>  "http://www.oasis-open.org/docbook/xml/4.1.2/docbookx.dtd"; 
> 
>  Thus : scrollkeeper-update blindly connect to www.oasis-open.org to get
> the docbookx.dtd.
> 
>  I can trust signed debian packages but I can't trust 
> www.oasis-open.org.
> 
> More than 18 files in /usr/share/gnome/help/ induce this download.
> 
> I'am about to make bug report against scrollkeeper (for acting blindly,
> and dowloading the same file more than once) and against packages that
> provides the xml files (for using external DTD instead of provinding
> it)...
>
> Your opinion?

file a bug report against xbill (and the others). there are (or were) some
issues with libxml2, check bug #153720.
you can tell the maintainer to include something like this in
debian/rules (target config.status):

find -name *.xml -exec perl -i -pe 
's,http://www.oasis-open.org/docbook/xml/4.1.2/docbookx.dtd,/usr/share/sgml/docbook/dtd/xml/4.1.2/docbookx.dtd,'
 {} \;

the gnome-applets package does it this way.

bye,
 sebastian

-- 
::: sebastian henschel
::: kodeaffe
::: lynx -source http://www.kodeaffe.de/shensche.pub | gpg --import


pgpKLwbKqZ2qm.pgp
Description: PGP signature


Re: scrollkeeper loading external (online) DTD

2003-01-09 Thread Daniel O'Neill
Thats absolutely ridiculous.

I would file one at once, that should definitely not go unchecked, at least.  I can 
appreciate the motivation, but for my own sanity I'm too paranoid to a) accept strange 
unknown files/connections or b) send out requests for such data.  Especially 
considering since it all happens without my knowledge, which thanks, now I know.  Who 
knows if the file is the original?  The checksum is verified, but that doesn't mean 
much all things considered, where did the checksum come from?

On 08 Jan 2003 22:54:12 +0100
Sebastien Chaumat <[EMAIL PROTECTED]> wrote:

> Hi,
> 
>  This a real example : 
> 
>  The xbill package contains : /usr/share/gnome/help/xbill/C/xbill.xml
> 
>  In this file the DTD is refered by an absolute external link :
> 
>  "http://www.oasis-open.org/docbook/xml/4.1.2/docbookx.dtd"; 
> 
>  Thus : scrollkeeper-update blindly connect to www.oasis-open.org to get
> the docbookx.dtd.
> 
>  I can trust signed debian packages but I can't trust 
> www.oasis-open.org.
> 
> More than 18 files in /usr/share/gnome/help/ induce this download.
> 
> I'am about to make bug report against scrollkeeper (for acting blindly,
> and dowloading the same file more than once) and against packages that
> provides the xml files (for using external DTD instead of provinding
> it)...
> 
> Your opinion?
> 
> Cheers,
> 
> SEb
> 
> 
> 
> 
> 
> 
> 
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 



msg08411/pgp0.pgp
Description: PGP signature


Re: scrollkeeper loading external (online) DTD

2003-01-09 Thread Sebastian Henschel
hello sebastien..

Received at 2003-01-08 / 23:10 by Sebastien Chaumat:

>  The xbill package contains : /usr/share/gnome/help/xbill/C/xbill.xml
> 
>  In this file the DTD is refered by an absolute external link :
> 
>  "http://www.oasis-open.org/docbook/xml/4.1.2/docbookx.dtd"; 
> 
>  Thus : scrollkeeper-update blindly connect to www.oasis-open.org to get
> the docbookx.dtd.
> 
>  I can trust signed debian packages but I can't trust 
> www.oasis-open.org.
> 
> More than 18 files in /usr/share/gnome/help/ induce this download.
> 
> I'am about to make bug report against scrollkeeper (for acting blindly,
> and dowloading the same file more than once) and against packages that
> provides the xml files (for using external DTD instead of provinding
> it)...
>
> Your opinion?

file a bug report against xbill (and the others). there are (or were) some
issues with libxml2, check bug #153720.
you can tell the maintainer to include something like this in
debian/rules (target config.status):

find -name *.xml -exec perl -i -pe 
's,http://www.oasis-open.org/docbook/xml/4.1.2/docbookx.dtd,/usr/share/sgml/docbook/dtd/xml/4.1.2/docbookx.dtd,'
 {} \;

the gnome-applets package does it this way.

bye,
 sebastian

-- 
::: sebastian henschel
::: kodeaffe
::: lynx -source http://www.kodeaffe.de/shensche.pub | gpg --import



msg08410/pgp0.pgp
Description: PGP signature