Re: [AOLSERVER] Is Aolserver vulnerable?

2003-01-23 Thread Branimir Dolicki
Before rushing to patch all your servers so that they never respond to TRACE
requests make sure you read this posting by Marc Slemko on the topic:

http://marc.theaimsgroup.com/?l=bugtraqm=104328339022104w=2

 -- Branimir



Re: [AOLSERVER] Is Aolserver vulnerable?

2003-01-23 Thread Rob Mayoff
+-- On Jan 23, Nathan Folkman said:
 What portions do you think would make the most sense to support, and what
 benefits would supporting those features provide?

Keep-alive enabled by default - allows persistent client/server
connections without negotiation.

Chunked transfer coding - allows streaming content within persistent
connections.

Byte ranges - allows a client to resume an interrupted transfer.



Re: [AOLSERVER] Is Aolserver vulnerable?

2003-01-23 Thread Jim Davidson
In a message dated 1/23/2003 6:24:22 PM Eastern Standard Time, [EMAIL PROTECTED] writes:

What portions do you think would make the most sense to support, and what
benefits would supporting those features provide?

Keep-alive enabled by default - allows persistent client/server
connections without negotiation.

Chunked transfer coding - allows streaming content within persistent
connections.

Byte ranges - allows a client to resume an interrupted transfer.



Are byte ranges useful outside big static file downloads? 

-Jim


Re: [AOLSERVER] Is Aolserver vulnerable?

2003-01-23 Thread Rob Mayoff
+-- On Jan 23, Jim Davidson said:
 Are byte ranges useful outside big static file downloads?

I don't know.  One level of possibly useful support would be simply to
have AOLserver parse the byte-range request and make it available via an
API.  For example, a site that stores large binary objects in a database
could use the API to return a byte range.

Another level of support would be to make fastpath and ns_returnfile use
the byte-range info to return just the requested portion of a file. API.
A site that delivers large binary files from a database might find this
useful.  I implemented this in 3.3+ad12.  At ArsDigita we only used
AOLserver - we didn't have a separate server for static files.



Re: [AOLSERVER] Is Aolserver vulnerable?

2003-01-23 Thread Scott Goodwin
Adobe's Acrobat Viewer supports byte range serving when installed as a plug-in for Netscape Navigator, or as an ActiveX control for Microsoft's Internet Explorer. It'll pull down a page at a time as you move through the document.

/s.


On Thursday, January 23, 2003, at 06:47  PM, Jim Davidson wrote:

In a message dated 1/23/2003 6:24:22 PM Eastern Standard Time, [EMAIL PROTECTED] writes:

>What portions do you think would make the most sense to support, and what
>benefits would supporting those features provide?

Keep-alive enabled by default - allows persistent client/server
connections without negotiation.

Chunked transfer coding - allows streaming content within persistent
connections.

Byte ranges - allows a client to resume an interrupted transfer.





Are byte ranges useful outside big static file downloads? 

-Jim


[AOLSERVER] Is Aolserver vulnerable?

2003-01-22 Thread Jade Rubick
Does Aolserver implement the TRACE command?

http://www.extremetech.com/article2/0,3973,841047,00.asp



Re: [AOLSERVER] Is Aolserver vulnerable?

2003-01-22 Thread Dossy
On 2003.01.22, Jade Rubick [EMAIL PROTECTED] wrote:
 Does Aolserver implement the TRACE command?

 http://www.extremetech.com/article2/0,3973,841047,00.asp

$ telnet www.panoptic.com 80
Trying 216.25.146.66...
Connected to www.panoptic.com.
Escape character is '^]'.
TRACE / HTTP/1.1
Host: www.panoptic.com:80

HTTP/1.0 404 Not Found
MIME-Version: 1.0
Date: Wed, 22 Jan 2003 21:27:30 GMT
Server: AOLserver/3.5.0
Content-Type: text/html
Content-Length: 548
Connection: close

Not by default.  You could always register a filter that
handled TRACE requests.  I might just do that to see what
kind of exploits are being used out there ... log any
TRACE attempts. ;-)

Thanks for mentioning this.

-- Dossy

--
Dossy Shiobara   mail: [EMAIL PROTECTED]
Panoptic Computer Network web: http://www.panoptic.com/
  He realized the fastest way to change is to laugh at your own
folly -- then you can let go and quickly move on. (p. 70)



Re: [AOLSERVER] Is Aolserver vulnerable?

2003-01-22 Thread Nathan Folkman
In a message dated 1/22/2003 4:29:34 PM Eastern Standard Time, [EMAIL PROTECTED] writes:

Not by default. You could always register a filter that
handled TRACE requests. I might just do that to see what
kind of exploits are being used out there ... log any
TRACE attempts. ;-)

I believe TRACE is an HTTP/1.1 option, which would mean AOLserver is NOT vulnerable since we're still only HTTP/1.0 compliant.

- Nathan


Re: [AOLSERVER] Is Aolserver vulnerable?

2003-01-22 Thread Scott Goodwin
After looking through the 3.4.2 source code, the answer is no. TRACE is
not a supported HTTP method in AOLserver. I used cscope to find all
occurences of TRACE and found none. Also checked the Tcl module that
come with the server.

It might be wise to register a proc to log that a TRACE request was
made to your server, if you're interested to identify attempts.

/s.


On Wednesday, January 22, 2003, at 03:04  PM, Jade Rubick wrote:


Does Aolserver implement the TRACE command?

http://www.extremetech.com/article2/0,3973,841047,00.asp




Re: [AOLSERVER] Is Aolserver vulnerable?

2003-01-22 Thread Andrew Piskorski
Incidentally, Apache/1.3.26, the version shipped with Debian 3.0, DOES
implement TRACE.

On Wed, Jan 22, 2003 at 01:04:36PM -0800, Jade Rubick wrote:
 Does Aolserver implement the TRACE command?

 http://www.extremetech.com/article2/0,3973,841047,00.asp

On Wed, Jan 22, 2003 at 04:29:26PM -0500, Dossy wrote:
 On 2003.01.22, Jade Rubick [EMAIL PROTECTED] wrote:
  Does Aolserver implement the TRACE command?
 
  http://www.extremetech.com/article2/0,3973,841047,00.asp

 $ telnet www.panoptic.com 80
 Trying 216.25.146.66...
 Connected to www.panoptic.com.
 Escape character is '^]'.
 TRACE / HTTP/1.1
 Host: www.panoptic.com:80

 HTTP/1.0 404 Not Found
 MIME-Version: 1.0
 Date: Wed, 22 Jan 2003 21:27:30 GMT
 Server: AOLserver/3.5.0
 Content-Type: text/html
 Content-Length: 548
 Connection: close

--
Andrew Piskorski [EMAIL PROTECTED]
http://www.piskorski.com



Re: [AOLSERVER] Is Aolserver vulnerable?

2003-01-22 Thread Scott Goodwin
On Wednesday, January 22, 2003, at 03:48  PM, Andrew Piskorski wrote:

Incidentally, Apache/1.3.26, the version shipped with Debian 3.0, DOES
implement TRACE.

On Wed, Jan 22, 2003 at 01:04:36PM -0800, Jade Rubick wrote:
Does Aolserver implement the TRACE command?

http://www.extremetech.com/article2/0,3973,841047,00.asp


I just pointed that out to my management chain and the other groups in my organization who use Apache and IIS. Here's the message I sent:


= CUT HERE 

If you aren't already aware, there appears to be a serious cross-site vulnerability that uses the TRACE HTTP method to do its dirty work. This vulnerability is not affected by SSL.

Please read:

http://www.extremetech.com/article2/0,3973,841047,00.asp

I know Apache uses the TRACE method (I just looked at the source code for Apache), but it may not be vulnerable depending on how Apache is configured. I can't determine if IIS is vulnerable, because, well, I don't have the source code.

We use AOLserver for EMIS, which is not vulnerable. I've added extra checking to the EMIS request processor 5 minutes ago to log any attempts to use  HTTP methods that we don't accept so we can identify attempts to use TRACE. Here's the piece of code I added to do that:

if {! [regexp -nocase {get|post|head} $http_method]} {
   ns_log warning "BAD HTTP METHOD: $http_method from $peer_addr: HTTP REQ=$request"
   ns_return 403 text/html [ns_adp_parse -file /emis/pages/errors/errorframe.adp 403]
   return filter_return
} else {
   ns_log notice "$http_method request for $request from $peer_addr"
}

AOLserver is such a *sweet* web server. You should really consider switching :)

/s.

=== CUT HERE ==

So, thank you AOL, the AOL dev team, and everyone in the community who uses and has helped maintain and improve AOLserver. You've made my life so much easier.

/s.





Re: [AOLSERVER] Is Aolserver vulnerable?

2003-01-22 Thread Jerry Asher
Jade Rubick wrote:


Does Aolserver implement the TRACE command?

http://www.extremetech.com/article2/0,3973,841047,00.asp


Here's what RFC 2616 says about TRACE.  This is just about all it says
about TRACE.  The other mentions are about issues that couldn't cause an
exploit:

http://www.ietf.org/rfc/rfc2616.txt

9.8 TRACE

   The TRACE method is used to invoke a remote, application-layer loop-
   back of the request message. The final recipient of the request
   SHOULD reflect the message received back to the client as the
   entity-body of a 200 (OK) response. The final recipient is either the
   origin server or the first proxy or gateway to receive a Max-Forwards
   value of zero (0) in the request (see section 14.31). A TRACE request
   MUST NOT include an entity.

   TRACE allows the client to see what is being received at the other
   end of the request chain and use that data for testing or diagnostic
   information. The value of the Via header field (section 14.45) is of
   particular interest, since it acts as a trace of the request chain.
   Use of the Max-Forwards header field allows the client to limit the
   length of the request chain, which is useful for testing a chain of
   proxies forwarding messages in an infinite loop.

   If the request is valid, the response SHOULD contain the entire
   request message in the entity-body, with a Content-Type of
   message/http. Responses to this method MUST NOT be cached.

I am printing out WhiteHat's WhitePaper now (on my own highly patented
WritePaper (TM)):
http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf.

But this is exploit is evidently related to cross site scripting.

Anyway, my own initial thoughts are that I am thinking the problem is
not reflecting back the messages, but including all the cookies and
headers in the message.  If so, there is nothing in the RFC that I can
see that suggests an HTTP 1.1 server needs to send anything other than a
200 header.  The VIA header IS an information leak, but if I recall from
the past, lots of actual proxies don't implement that header anyway
 And it would be a reasonable thing to do to NOT implement it.

If the problem is sending anything at all and not just the headers, well
I confess thinking: Wow.  Cool.  Bad.

Jerry



Re: [AOLSERVER] Is Aolserver vulnerable?

2003-01-22 Thread Roberto Mello
On Wed, Jan 22, 2003 at 04:07:18PM -0600, Scott Goodwin wrote:

 AOLserver is such a *sweet* web server. You should really consider
 switching :)

:-D

 So, thank you AOL, the AOL dev team, and everyone in the community who
 uses and has helped maintain and improve AOLserver. You've made my life
 so much easier.

Speaking of that, is 4.0 going to support at least part of HTTP 1.1?

-Roberto

--
+|Roberto Mello   -http://www.brasileiro.net/  |--+
+   Computer Science Graduate Student, Utah State University  +
+   USU Free Software  GNU/Linux Club - http://fslc.usu.edu/ +
For sale: Hourglass for timing Windows.



Re: [AOLSERVER] Is Aolserver vulnerable?

2003-01-22 Thread Jerry Asher
Below you can see that Apache 2.0 (RH 8) does echo back all the headers
that you send to it with your TRACE command.

And rereading the RFC, I gather that is just what it should be doing.

According to the whitepaper then

The exploit then is one that allows a client side script to read
information (cookies for now) that are already in the client but that
are supposed to be hidden from the script.  The script uses some
technology within the browser to generate its own HTTP request.  The
browser goes along with the game and fills in the cookie information
that should be hidden.  The script sends the request and gets to read
the response.  Since the request is a TRACE, the response includes the
hidden cookie information.

It goes away entirely if the server doesn't implement TRACE.  It will
not cause cross site leakage unless your browser already has a cross
site leakage bug in it.  IE currently does.  Other browsers may or may
not have bugs.  When will you be secure that your browser has none of
these bugs?

If your browser has a cross site scripting bug, if you visit multiple
websites with trace on, you can have a cross site scripting exploit.  So
the short term fix for YOU the webuser is to have your proxy remove all
TRACE requests.  Let's give that one an unlikely tag.

The news article claims that Apache needs a patch and can't just be
configured to not implement TRACE.  Does anyone know if that is so?


Jerry



KRUSTY$ telnet homer.theashergroup.com 16040
Trying 192.168.0.32...
Connected to homer.theashergroup.com.
Escape character is '^]'.
TRACE / HTTP/1.1
HOST: homer.theashergroup.com
COOKIE: foo=bar

HTTP/1.1 200 OK
Date: Wed, 22 Jan 2003 22:35:26 GMT
Server: Apache/2.0.40 (Red Hat Linux)
Content-Length: 68
Content-Type: message/http

TRACE / HTTP/1.1
HOST: homer.theashergroup.com
COOKIE: foo=bar

Connection closed by foreign host.
KRUSTY$



Re: [AOLSERVER] Is Aolserver vulnerable?

2003-01-22 Thread Jerry Asher
Scott Goodwin wrote:


have the source code.

We use AOLserver for EMIS, which is not vulnerable. I've added extra
checking to the EMIS request processor 5 minutes ago to log any attempts
to use HTTP methods that we don't accept so we can identify attempts to
use TRACE. Here's the piece of code I added to do that:

if {! [regexp -nocase {get|post|head} $http_method]} {
   ns_log warning BAD HTTP METHOD: $http_method from $peer_addr: HTTP
REQ=$request
   ns_return 403 text/html [ns_adp_parse -file
/emis/pages/errors/errorframe.adp 403]
   return filter_return
} else {
   ns_log notice $http_method request for $request from $peer_addr
}


This is a good idea.

You may wish to change this to return a TRACE specific error message
that mentions this exploit.  That way the user will be alerted to
dubious activity on his machine.

Jerry



Re: [AOLSERVER] Is Aolserver vulnerable?

2003-01-22 Thread David Walker
How do you register this filter?
I have a list of methods I check for but I would prefer to watch for all that
are not get/post/head

On Wednesday 22 January 2003 04:53 pm, Jerry Asher wrote:
 Scott Goodwin wrote:
  have the source code.
 
  We use AOLserver for EMIS, which is not vulnerable. I've added extra
  checking to the EMIS request processor 5 minutes ago to log any attempts
  to use HTTP methods that we don't accept so we can identify attempts to
  use TRACE. Here's the piece of code I added to do that:
 
  if {! [regexp -nocase {get|post|head} $http_method]} {
 ns_log warning BAD HTTP METHOD: $http_method from $peer_addr: HTTP
  REQ=$request
 ns_return 403 text/html [ns_adp_parse -file
  /emis/pages/errors/errorframe.adp 403]
 return filter_return
  } else {
 ns_log notice $http_method request for $request from $peer_addr
  }

 This is a good idea.

 You may wish to change this to return a TRACE specific error message
 that mentions this exploit.  That way the user will be alerted to
 dubious activity on his machine.

 Jerry



Re: [AOLSERVER] Is Aolserver vulnerable?

2003-01-22 Thread Roberto Mello
On Wed, Jan 22, 2003 at 02:47:58PM -0800, Jerry Asher wrote:

snip

 It goes away entirely if the server doesn't implement TRACE.  It will
 not cause cross site leakage unless your browser already has a cross
 site leakage bug in it.  IE currently does.  Other browsers may or may
 not have bugs.  When will you be secure that your browser has none of
 these bugs?

Ugh.

snip

 The news article claims that Apache needs a patch and can't just be
 configured to not implement TRACE.  Does anyone know if that is so?

Think I found a way to work around the problem using Apache's mod_rewrite
(something that may be good to add to OpenACS' request processor). By
adding the lines below (with mod_rewrite being loaded) to the VirtualHost
section, the server should send a Forbidden response.

Weirdly, I get a Bad request (the same request works fine if I take the
rewrite rules off), but at least the TRACE isn't completed.

# RBM: 2002-01-22. Kill TRACE exploits.
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^TRACE
RewriteRule .*   [F]


-Roberto

--
+|Roberto Mello   -http://www.brasileiro.net/  |--+
+   Computer Science Graduate Student, Utah State University  +
+   USU Free Software  GNU/Linux Club - http://fslc.usu.edu/ +
What you end up with, after running an operating system concept through
these many marketing coffee filters, is something not unlike plain hot
water.
-- Matt Welsh



Re: [AOLSERVER] Is Aolserver vulnerable?

2003-01-22 Thread Scott Goodwin
I actually don't have to perform the 'if' check regexp -- we register two handlers, one for accepted method, the other for unacceptable methods:

ns_register_filter preauth GET /* rp_handler
ns_register_filter preauth POST /* rp_handler
ns_register_filter preauth PUT /* rp_handler_other
ns_register_filter preauth HEAD /* rp_handler_other
ns_register_filter preauth DELETE /* rp_handler_other
ns_register_filter preauth TRACE /* rp_handler_other
ns_register_filter preauth OPTIONS /* rp_handler_other
ns_register_filter preauth CONNECT /* rp_handler_other

rp_handler_other handles "bad" methods. So I can go in and simplify the code :)

/s.

On Wednesday, January 22, 2003, at 05:08  PM, David Walker wrote:

How do you register this filter?
I have a list of methods I check for but I would prefer to watch for all that
are not get/post/head

On Wednesday 22 January 2003 04:53 pm, Jerry Asher wrote:
Scott Goodwin wrote:
have the source code.

We use AOLserver for EMIS, which is not vulnerable. I've added extra
checking to the EMIS request processor 5 minutes ago to log any attempts
to use HTTP methods that we don't accept so we can identify attempts to
use TRACE. Here's the piece of code I added to do that:

if {! [regexp -nocase {get|post|head} $http_method]} {
ns_log warning "BAD HTTP METHOD: $http_method from $peer_addr: HTTP
REQ=$request"
ns_return 403 text/html [ns_adp_parse -file
/emis/pages/errors/errorframe.adp 403]
return filter_return
} else {
ns_log notice "$http_method request for $request from $peer_addr"
}

This is a good idea.

You may wish to change this to return a TRACE specific error message
that mentions this exploit.  That way the user will be alerted to
dubious activity on his machine.

Jerry



Re: [AOLSERVER] Is Aolserver vulnerable?

2003-01-22 Thread Scott Goodwin
I think a registered filter put in before any other filter would be
better, unless you have a specific error page you want to show that's
in OpenACS. My code is returning our error page; I wouldn't want to
rely on a more complex module to perform this function for me. A bug in
your rewrite code could make you vulnerable again.

/s.


On Wednesday, January 22, 2003, at 05:19  PM, Roberto Mello wrote:


On Wed, Jan 22, 2003 at 02:47:58PM -0800, Jerry Asher wrote:

snip


It goes away entirely if the server doesn't implement TRACE.  It will
not cause cross site leakage unless your browser already has a cross
site leakage bug in it.  IE currently does.  Other browsers may or may
not have bugs.  When will you be secure that your browser has none of
these bugs?


Ugh.

snip


The news article claims that Apache needs a patch and can't just be
configured to not implement TRACE.  Does anyone know if that is so?


Think I found a way to work around the problem using Apache's
mod_rewrite
(something that may be good to add to OpenACS' request processor). By
adding the lines below (with mod_rewrite being loaded) to the
VirtualHost
section, the server should send a Forbidden response.

Weirdly, I get a Bad request (the same request works fine if I take the
rewrite rules off), but at least the TRACE isn't completed.

# RBM: 2002-01-22. Kill TRACE exploits.
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^TRACE
RewriteRule .*   [F]


-Roberto

--
+|Roberto Mello   -http://www.brasileiro.net/  |--+
+   Computer Science Graduate Student, Utah State University  +
+   USU Free Software  GNU/Linux Club - http://fslc.usu.edu/ +
What you end up with, after running an operating system concept through
these many marketing coffee filters, is something not unlike plain hot
water.
-- Matt Welsh




Re: [AOLSERVER] Is Aolserver vulnerable?

2003-01-22 Thread Fred Yankowski
On Wed, Jan 22, 2003 at 04:19:05PM -0700, Roberto Mello wrote:
 RewriteEngine on
 RewriteCond %{REQUEST_METHOD} ^TRACE
 RewriteRule .*   [F]

That almost works, but the RewriteRule is missing the substitution
string (even though that string seems to be ignored in this case):

RewriteRule .*  -  [F]

That code needs to be repeated for each Apache VirtualHost, or
inherited with this (also in each VirtualHost):

RewriteEngine on
RewriteOptions inherit

--
Fred Yankowski  [EMAIL PROTECTED]   tel: +1.630.879.1312
OntoSys, IncPGP keyID: 7B449345fax: +1.630.879.1370
www.ontosys.com 38W242 Deerpath Rd, Batavia, IL 60510-9461, USA



Re: [AOLSERVER] Is Aolserver vulnerable?

2003-01-22 Thread Roberto Mello
On Wed, Jan 22, 2003 at 04:19:05PM -0700, Roberto Mello wrote:

 Think I found a way to work around the problem using Apache's mod_rewrite
 (something that may be good to add to OpenACS' request processor). By
 adding the lines below (with mod_rewrite being loaded) to the VirtualHost
 section, the server should send a Forbidden response.

I forgot to give due credit... This fix was concocted by Doran Barton,
a friend of mine, in a discussion in #linux of our LUG IRC server
(fslc.usu.edu). He happens to be an apache/perl guy.

-Roberto

--
+|Roberto Mello   -http://www.brasileiro.net/  |--+
+   Computer Science Graduate Student, Utah State University  +
+   USU Free Software  GNU/Linux Club - http://fslc.usu.edu/ +
5¼ hard is better than 3½ floppy.



Re: [AOLSERVER] Is Aolserver vulnerable?

2003-01-22 Thread Roberto Mello
On Wed, Jan 22, 2003 at 07:33:25PM -0600, Fred Yankowski wrote:
 On Wed, Jan 22, 2003 at 04:19:05PM -0700, Roberto Mello wrote:
  RewriteEngine on
  RewriteCond %{REQUEST_METHOD} ^TRACE
  RewriteRule .*   [F]

 That almost works, but the RewriteRule is missing the substitution
 string (even though that string seems to be ignored in this case):

 RewriteRule .*  -  [F]

 That code needs to be repeated for each Apache VirtualHost, or
 inherited with this (also in each VirtualHost):

 RewriteEngine on
 RewriteOptions inherit

Great! Thanks for the fix and clarification.

-Roberto

--
+|Roberto Mello   -http://www.brasileiro.net/  |--+
+   Computer Science Graduate Student, Utah State University  +
+   USU Free Software  GNU/Linux Club - http://fslc.usu.edu/ +
I'm a programmer, I don't do COBOL.