Re: A question about Knark and modules

2001-06-18 Thread Ethan Benson

On Mon, Jun 18, 2001 at 01:38:16AM -0300, Peter Cordes wrote:
 I like the package signing idea.  That would be cool.  That way, you
 could still load and unload modules.  I like being able to do that.
 One obvious problem with the scheme is that an attacker could
 potentially read the keys from /boot/vmlinuz-2.4.5, or whatever, and
 sign their own module.  This can be overcome if we give up the ability

how?  the kernel does not need the private key to verify the
signature.  

replacing the kernel image and rebooting would be another way to get
around this. as would injecting code into /dev/mem.  

 to compile more modules for that kernel after we finish compiling it:
  - Generate a key pair during kernel compilation (RSA would be a good
  alg. for this).
  - Sign the modules with one half of the key pair.
  - store the other half of the key pair in the kernel image.
  - _delete_ all traces of the key used to sign the modules.

yup

  All that's needed to make this workable is to find a way to provide
 access to IO/device memory space for X11 without allowing read/write
 access to kernel memory.  This can't really be all that hard.  I think
 the kernel can tell when the memory address written to or mapped in
 /dev/mem is part of kernel memory by checking where the kernel is in
 memory.  A very restrictive raw mem device that only allowed processes
 to map PCI memory space, or maybe just PCI memory space that PCI
 devices reported in their configuration info, would do the job for
 X11.  (BTW, AGP acts like another PCI bus).  Limiting things to only
 PCI-reported memory spaces would stop access from user space to ISA
 memory, but who would want to do that anyway...

this would be a good idea anyway, it might reduce the possiblity of X
killing the entire box whenever it hiccups and scribbles random
memory.  

  I like this idea.  It would kick ass, so we should do it.

you would need to fix filesystem immutability and block device access
as well.   currently lcap CAP_LINUX_IMMUTABLE is useless since there
is no way to deny root the ability to write directly to /dev/hda* and
remove the immutable bits (ive written a script to remove chattr +i
and +a even when CAP_LINUX_IMMUTABLE is removed from the bounding set,
no reboot required). 

otherwise the attacker can just replace your kernel image and reboot
(which is of course fairly noticable). 

-- 
Ethan Benson
http://www.alaska.net/~erbenson/

 PGP signature


Re: Are these breakin attempts?

2001-06-18 Thread Ethan Benson

On Mon, Jun 18, 2001 at 03:46:13PM +1000, Ian Miller wrote:
 add the line /sbin/ipchains -A input -i INTERFACE -p TCP -s !
 LOCALLAN -d EXTERNAL IP 111 -l -j DENY to block the rpc statd attacks
 from your external network

port 111 is portmap, not rpc.statd.  all blocking portmap will do is
prevent them from conveniently getting the statd port number, that
doesn't stop them from finding it via nmap.  

-- 
Ethan Benson
http://www.alaska.net/~erbenson/

 PGP signature


gnupg problem

2001-06-18 Thread Thomas Bushnell BSG


The new gnupg made it to security.debian.org, but it includes a
conflict with the only available mailcrypt:

Conflicts: gpg-rsa, gpg-rsaref, mailcrypt (= 3.5.5-6)

The changelog.Debian agrees:

gnupg (1.0.6-0potato1) stable; urgency=high

  * Upload for stable; fixes several security holes.
  * debian/postinst: Restore suidregister handling
  * debian/control: remove conflicts with suidmanager and add conflicts
with older versions of mailcrypt.

In this case, there needs to be a non-older version of mailcrypt
available for potato.  I don't know why conflicts were added to
mailcrypt (nothing I noticed in either the public or private security
lists mentioned it, AFAICT).  But assuming the conflicts are needed,
the security team needs to upload a working recent mailcrypt to the
security.debian.org archive.

Thomas


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: strange flickering ports

2001-06-18 Thread John Ferlito

On Mon, Jun 18, 2001 at 09:14:54AM +0200, Sebastiaan wrote:
 Hi...
 
 I have a box with something listening to flickering ports.  nmap
 reports various random ports open from run to run.  I can't telnet to
 them and ID w/ netstat, because they're gone the instant nmap finds
 them.
 Hi,
 
 I have this regularily too. I would like to see this explained, but
 perhaps it is just an error in nmap?

I've seen this too. My inital guess was that these were incoming ftp
ports from active ftp sessions but that didn't really make sense on this
particular box. Then I think I upgraded nmap and the problem seemed to
go away.

 
 Greetz,
 Sebastiaan
 
 
 
 
 --
   NT is the OS of the future. The main engine is the 16-bit Subsystem
   (also called MS-DOS Subsystem). Above that, there is the windoze 95/98
   16-bit Subsystem. Anyone can see that 16+16=32, so windoze NT is a 
   *real* 32-bit system.
 
 
 
 --  
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

-- 
John Ferlito
Senior Engineer - Bulletproof Networks
ph: +61 (0) 410 519 382
http://www.bulletproof.net.au/


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




rlinetd security

2001-06-18 Thread Sebastiaan

Hello,

I found out that rlinetd seems like a great replacement for inetd, because
it lets you choose which services may be available for the outside world
and which only for the inner network. So, standard services like echo,
daytime, chargen, ftp, etc. are only available for the LAN, while it is
not possible to connect to these ports from the internet.

But, how secure is this? Is it really what it seems? 

Thanks in advance,
Sebastiaan



--
  NT is the OS of the future. The main engine is the 16-bit Subsystem
  (also called MS-DOS Subsystem). Above that, there is the windoze 95/98
  16-bit Subsystem. Anyone can see that 16+16=32, so windoze NT is a 
  *real* 32-bit system.



--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: gnupg problem

2001-06-18 Thread Wichert Akkerman

Previously Thomas Bushnell, BSG wrote:
 Ok, that's a fine reason.  But then the working mailcrypt needs to be
 installed, or the security fix has only been half-done.
 
There is a fixed mailcrypt in proposed-updates.

Wichert.

-- 
  _
 /   Nothing is fool-proof to a sufficiently talented fool \
| [EMAIL PROTECTED]   http://www.liacs.nl/~wichert/ |
| 1024D/2FA3BC2D 576E 100B 518D 2F16 36B0  2805 3CB8 9250 2FA3 BC2D |


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: gnupg problem

2001-06-18 Thread Thomas Bushnell, BSG

Wichert Akkerman [EMAIL PROTECTED] writes:

 Previously Thomas Bushnell, BSG wrote:
  Ok, that's a fine reason.  But then the working mailcrypt needs to be
  installed, or the security fix has only been half-done.
  
 There is a fixed mailcrypt in proposed-updates.

That's great, but it doesn't help. 

The *security* team exists to make security updates to the current
stable release.  Currently there is *not* an installable update for
gnupg.  The only way (that I can think of right now) for fixing this
is to put the new mailcrypt into security.debian.org.

Thomas


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: gnupg problem

2001-06-18 Thread Wichert Akkerman

Previously Thomas Bushnell, BSG wrote:
 The *security* team exists to make security updates to the current
 stable release.  Currently there is *not* an installable update for
 gnupg.  The only way (that I can think of right now) for fixing this
 is to put the new mailcrypt into security.debian.org.

I see this differently: we had a security problem in gnupg, which we
fixed. This unfortunately broke the version of mailcrypt that was
was in contrib, so not even a proper part of the Debian potato
release itself. Its maintainer did upload a new version of mailcrypt
to fix that problem which you can grab from proposed-updates until
the next stable revision.

Installing mailcrypt on security.debian.org would immediately suggest
that mailcrypt itself has a security problem, which is not true.
It's a bit of a catch 22.

Wichert.

-- 
  _
 /   Nothing is fool-proof to a sufficiently talented fool \
| [EMAIL PROTECTED]   http://www.liacs.nl/~wichert/ |
| 1024D/2FA3BC2D 576E 100B 518D 2F16 36B0  2805 3CB8 9250 2FA3 BC2D |


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: A question about Knark and modules

2001-06-18 Thread Ethan Benson

On Mon, Jun 18, 2001 at 08:56:03AM +0200, Philipp Schulte wrote:
 On Sun, Jun 17, 2001 at 10:42:17PM -0800, Ethan Benson wrote: 
 
  you would need to fix filesystem immutability and block device access
  as well.   currently lcap CAP_LINUX_IMMUTABLE is useless since there
  is no way to deny root the ability to write directly to /dev/hda* and
  remove the immutable bits (ive written a script to remove chattr +i
  and +a even when CAP_LINUX_IMMUTABLE is removed from the bounding set,
  no reboot required). 
 
 I thought CAP_SYS_RAWIO would take care of that issue?
 Is is still possible to chattr +i if CAP_SYS_RAWIO is removed?

chattr +i and +a cannot be set or removed if CAP_LINUX_IMMUTABLE is
removed from the bounding set.  however that does not prevent root
from messing with /dev/hda* directly, niether does CAP_SYS_RAWIO.  

there is no capability that allows you to deny root access to the raw
block devices, so removing the immutable bit is trivially easy. 

-- 
Ethan Benson
http://www.alaska.net/~erbenson/

 PGP signature


Re: gnupg problem

2001-06-18 Thread Ethan Benson

On Mon, Jun 18, 2001 at 01:04:51AM -0700, Thomas Bushnell, BSG wrote:
 The *security* team exists to make security updates to the current
 stable release.  Currently there is *not* an installable update for
 gnupg.  The only way (that I can think of right now) for fixing this
 is to put the new mailcrypt into security.debian.org.

gnupg is installable, if you remove mailcrypt.  ;-)

not ideal but thats the way the way the cookie crumbles. 

-- 
Ethan Benson
http://www.alaska.net/~erbenson/

 PGP signature


Re: rlinetd security

2001-06-18 Thread Ethan Benson

On Mon, Jun 18, 2001 at 09:21:56AM +0200, Sebastiaan wrote:
 Hello,
 
 I found out that rlinetd seems like a great replacement for inetd, because
 it lets you choose which services may be available for the outside world
 and which only for the inner network. So, standard services like echo,
 daytime, chargen, ftp, etc. are only available for the LAN, while it is
 not possible to connect to these ports from the internet.
 
 But, how secure is this? Is it really what it seems? 

first you should ask yourself why you even need echo, daytime,
discard, chargen and such.  i don't think ive ever found anyone who
actually did need all of those. 

-- 
Ethan Benson
http://www.alaska.net/~erbenson/

 PGP signature


Re: rlinetd security

2001-06-18 Thread Sebastiaan

On Mon, 18 Jun 2001, Ethan Benson wrote:

 On Mon, Jun 18, 2001 at 09:21:56AM +0200, Sebastiaan wrote:
  Hello,
  
  I found out that rlinetd seems like a great replacement for inetd, because
  it lets you choose which services may be available for the outside world
  and which only for the inner network. So, standard services like echo,
  daytime, chargen, ftp, etc. are only available for the LAN, while it is
  not possible to connect to these ports from the internet.
  
  But, how secure is this? Is it really what it seems? 
 
 first you should ask yourself why you even need echo, daytime,
 discard, chargen and such.  i don't think ive ever found anyone who
 actually did need all of those. 
 
Yes, that is a good question. I do not know where most of them are used
for, but because they are always installed, I assumed that these are
needed for correct system operation. But even if I would disable these
ports, I still want to use ftp, smtp and telnet only for my local network.

Thanks,
Sebastiaan



--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: rlinetd security

2001-06-18 Thread Ethan Benson

On Mon, Jun 18, 2001 at 10:53:06AM +0200, Sebastiaan wrote:
 Yes, that is a good question. I do not know where most of them are used
 for, but because they are always installed, I assumed that these are
 needed for correct system operation. But even if I would disable these
 ports, I still want to use ftp, smtp and telnet only for my local network.

if you don't know why your running them you don't need them.  simple
as that.  

-- 
Ethan Benson
http://www.alaska.net/~erbenson/

 PGP signature


Re: A question about Knark and modules

2001-06-18 Thread Philipp Schulte

On Mon, Jun 18, 2001 at 12:35:13AM -0800, Ethan Benson wrote: 

 chattr +i and +a cannot be set or removed if CAP_LINUX_IMMUTABLE is
 removed from the bounding set.  however that does not prevent root
 from messing with /dev/hda* directly, niether does CAP_SYS_RAWIO.  
 
 there is no capability that allows you to deny root access to the raw
 block devices, so removing the immutable bit is trivially easy. 

Ok, so just do make sure: http://www.lids.org/lids-howto/node53.html
is claiming that CAP_SYS_RAWIO allows access to raw block devices.
Does LIDS change the behaviour of the cap or are they claiming
something wrong?
BTW: Are there any proof of concept for this vulnerability?
Regards,
Phil


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: A question about Knark and modules

2001-06-18 Thread Ethan Benson

On Mon, Jun 18, 2001 at 12:43:41PM +0200, Philipp Schulte wrote:
 On Mon, Jun 18, 2001 at 12:35:13AM -0800, Ethan Benson wrote: 
 
  chattr +i and +a cannot be set or removed if CAP_LINUX_IMMUTABLE is
  removed from the bounding set.  however that does not prevent root
  from messing with /dev/hda* directly, niether does CAP_SYS_RAWIO.  
  
  there is no capability that allows you to deny root access to the raw
  block devices, so removing the immutable bit is trivially easy. 
 
 Ok, so just do make sure: http://www.lids.org/lids-howto/node53.html
 is claiming that CAP_SYS_RAWIO allows access to raw block devices.

they are mistaken.

 Does LIDS change the behaviour of the cap or are they claiming
 something wrong?

they do make all sorts of change to the kernel since the current
capability bounding set isn't complete enough to accomplish anything
that can't be trivally undone by moving stuff around the filesystem
and rebooting once.  

the trouble with lids, or more so the ideas they go with is you break
your system so badly that it becomes impossible to administer,
certianly impossible to admin remotely.  the cost is too high IMO.  

 BTW: Are there any proof of concept for this vulnerability?

which? the /dev/mem restoration of the capability bounding set, or
removing chattr +i even when CAP_LINUX_IMMUTABLE is removed?  for the
latter i have a script that does it.  for the former not that i know
of, but if i were better at C i think i could put one together in an
hour or less, here is the explanation:

http://www.netcom.com/~spoon/lcap/bugtraq.txt

-- 
Ethan Benson
http://www.alaska.net/~erbenson/

 PGP signature


Re: A question about Knark and modules

2001-06-18 Thread Philipp Schulte

On Mon, Jun 18, 2001 at 03:52:46AM -0800, Ethan Benson wrote: 

 On Mon, Jun 18, 2001 at 12:43:41PM +0200, Philipp Schulte wrote:
  Ok, so just do make sure: http://www.lids.org/lids-howto/node53.html
  is claiming that CAP_SYS_RAWIO allows access to raw block devices.
 
 they are mistaken.

Well, somebody should tell them ;)

  BTW: Are there any proof of concept for this vulnerability?
 
 which? the /dev/mem restoration of the capability bounding set, or
 removing chattr +i even when CAP_LINUX_IMMUTABLE is removed?  for the
 latter i have a script that does it. 

Yes, I would be really interested in this script. Do you have an URL
or could send it to me?
Some of our servers use lcap and some files are +i or +a. So far I
thought that CAP_SYS_RAWIO would prevent some of the mentioned
problems but obviously I was wrong.
Thanks for the information,
Phil


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




RE: rlinetd security

2001-06-18 Thread Pat Moffitt

That makes a lot of assumptions about my (or anyone else) understanding of
the system.  For example, I have no clue what discard is used for.  So, how
do I know if I have a package installed that will not work properly if I
disable that port.  Yes, I should go and research the issue but I only have
some much time in the day.

Therefor, many of us are forced to make the same assumptions (valid or not)
such as Sebastiaan's.

Pat Moffitt
MIS Administrator
Western Recreational Vehicles, Inc.


 -Original Message-
 From: Ethan Benson [mailto:[EMAIL PROTECTED]]
 Sent: Monday, June 18, 2001 1:57 AM
 To: [EMAIL PROTECTED]
 Subject: Re: rlinetd security


 On Mon, Jun 18, 2001 at 10:53:06AM +0200, Sebastiaan wrote:
  Yes, that is a good question. I do not know where most of them are used
  for, but because they are always installed, I assumed that these are
  needed for correct system operation. But even if I would disable these
  ports, I still want to use ftp, smtp and telnet only for my
 local network.

 if you don't know why your running them you don't need them.  simple
 as that.


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: rlinetd security

2001-06-18 Thread Tim Haynes

Pat Moffitt [EMAIL PROTECTED] writes:

 That makes a lot of assumptions about my (or anyone else) understanding
 of the system. For example, I have no clue what discard is used for. So,
 how do I know if I have a package installed that will not work properly
 if I disable that port. Yes, I should go and research the issue but I
 only have some much time in the day.
 
 Therefor, many of us are forced to make the same assumptions (valid or
 not) such as Sebastiaan's.

Ethan is correct. 

Start from `the more ports you leave open, the greater chance you have of
being cracked' and work up.

ISTR the standard inetd services including discard, echo, sysstat, netstat
et all *have* *had* their known vulnerabilities before now. All long-since
patched, but that's not to say there won't be another tomorrow.

Again, if you don't know why you need it, you don't need it.

~Tim
-- 
   17:16:07 up 3 days, 21:20, 16 users,  load average: 0.13, 0.09, 0.02
[EMAIL PROTECTED] |Sometimes you're the pigeon,
http://piglet.is.dreaming.org |Sometimes you're the statue.


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: A question about Knark and modules

2001-06-18 Thread Christian Jaeger

At 5:55 Uhr +0200 18.6.2001, Ethan Benson wrote:
On Mon, Jun 18, 2001 at 03:03:06AM +0200, Christian Jaeger wrote:
   ... install some special binaries to which you
   grant many permissions.

the thing is once you make exceptions for the system adminsistrator to
use to maintain the you open the holes the attacker needs to trojan
your system and to remove the additional obsticales you installed. 

system adminsitrator == root
cracker == root

you can't trust one without trusting the other.

Well, if the 'apt-get update  apt-get upgrade' wrapper doesn't take
any input and resets the environment (is there anything else it
should take care of?) then even if called by the cracker it wouldn't
do anything else than upgrade the system the same way upgrades were
happening anyway before the breakin. (Ok, there may be an issue with
the changing inode numbers lids is depending upon and which would not
get updated immediately after upgrading software.)

And/or if I install a special shell binary that has capabilities to
access the whole filesystem, but exits immediately unless called by
sshd, then system administrators still can just login as root and do
what they are used to do, without risking a hacker using the same
tool because he (probably) didn't use sshd to gain access to the
machine. (Of course, this requires 1. sshd not having a problem, and
2. making sure depending files like /etc/shadow, pam etc are
protected, but that's what lids people propagate anyway).

Am I wrong?

Of course if lids in fact can't deny access to disk devices then
probably all is lost...

Christian.


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: rlinetd security

2001-06-18 Thread Sebastiaan

On 18 Jun 2001, Tim Haynes wrote:

 Pat Moffitt [EMAIL PROTECTED] writes:
 
  That makes a lot of assumptions about my (or anyone else) understanding
  of the system. For example, I have no clue what discard is used for. So,
  how do I know if I have a package installed that will not work properly
  if I disable that port. Yes, I should go and research the issue but I
  only have some much time in the day.
  
  Therefor, many of us are forced to make the same assumptions (valid or
  not) such as Sebastiaan's.
 
 Ethan is correct. 
 
 Start from `the more ports you leave open, the greater chance you have of
 being cracked' and work up.
 
 ISTR the standard inetd services including discard, echo, sysstat, netstat
 et all *have* *had* their known vulnerabilities before now. All long-since
 patched, but that's not to say there won't be another tomorrow.
 
 Again, if you don't know why you need it, you don't need it.
 
I know you are right, but I have become curious now: if everyone says that
you do not need them, then where are they used for? And why are they still
installed by default?

Thanks,
Sebastiaan



--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: rlinetd security

2001-06-18 Thread Tim Haynes

Sebastiaan [EMAIL PROTECTED] writes:

[snip]
  Again, if you don't know why you need it, you don't need it.

 I know you are right, but I have become curious now: if everyone says
 that you do not need them, then where are they used for? And why are they
 still installed by default?

Good questions.

a) echo is just there to duplicate everything you send back at you.
   discard is just there to dump everything in the sink.
   chargen is to give a continual stream of output, eg bandwidth testing
   daytime is to give another box a snapshot of the time on here - a crude
ancient  horrible way to sync boxes
   netstat is to give a view of `netstat' over the 'net - remote admin?

b) they shouldn't be. You'll have to check if they still appear by default
in unstable; I should hope they don't. (There's been discussion of this
before if you trawl some archives somewhere.) It's possible to use them all
legitimately - e.g. the daytime thing might be if someone has a legacy
setup on their LAN and relied on it for time sync, the chargen/echo/discard
things could well be useful for getting streams of data and network
monitoring, etc. However, they really shouldn't be enabled by default.

~Tim
-- 
All I see, All I know   |[EMAIL PROTECTED]
Is touching the sacred earth|http://spodzone.org.uk/
And warming the hallowed ground |


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: rlinetd security

2001-06-18 Thread Noah Meyerhans

On Mon, Jun 18, 2001 at 06:35:03PM +0100, Tim Haynes wrote:
 b) they shouldn't be. You'll have to check if they still appear by default
 in unstable; I should hope they don't. (There's been discussion of this
 before if you trawl some archives somewhere.) It's possible to use them all
 legitimately - e.g. the daytime thing might be if someone has a legacy
 setup on their LAN and relied on it for time sync, the chargen/echo/discard
 things could well be useful for getting streams of data and network
 monitoring, etc. However, they really shouldn't be enabled by default.

Why not?  You've not given any reason at all.  Do you know of any
malicious behavior that is made possible by leaving the services turned
on?  The potential exists to use the chargen feature as a part of a DoS
attack, but I've not heard of it ever being used as it's not
particularly effective unless you have many many machines available, and
even then there are much more effective weapons.  And what about the
rest of the ports?  How are they dangerous?  I've never heard of an
exploit involving any of them.

Really I'm just playing devil's advocate here.  I don't care if they're
turned off or not.  I've just never seen any evidence that there's any
reason for concern over them.

noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 


 PGP signature


Re: gnupg problem

2001-06-18 Thread Thomas Bushnell, BSG

Wichert Akkerman [EMAIL PROTECTED] writes:

 Installing mailcrypt on security.debian.org would immediately suggest
 that mailcrypt itself has a security problem, which is not true.
 It's a bit of a catch 22.

Well, this is a general problem then, which the security team should
think about.  The fact that mailcrypt is in contrib means it's a
little less important in this particular case, but nontheless, it's a
real problem.

Debian is about a *distribution* and not a random assemblage of
.deb's.  The security team exists to support the rapid response to
security needs for the *distribution*, and not just one package.

So my premise is that a user who tracks stable and security should
benefit from security fixes.  When the security team does what was
done with gnupg, the *distribution* has not gotten decent security
support, even if one package has.

Perhaps one solution is to split the security archive into two pieces;
one for the actual packages that have security holes, and another for
other packages that must be installed on a stable system in order to
take advantage or otherwise use fully the former.

Thomas




--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: gnupg problem

2001-06-18 Thread Thomas Bushnell, BSG

Ethan Benson [EMAIL PROTECTED] writes:

 gnupg is installable, if you remove mailcrypt.  ;-)

As explained in my previous mail, that is only adequate if the
security team exists to support security in packages, but not the
distribution as a whole. 


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: rlinetd security

2001-06-18 Thread Vineet Kumar

I'm not adding anything new to this thread, only reiterating for those
who seem to have missed previous reiterations:

'The more ports you leave open, the greater chance you have of being
cracked.'

'If you don't know why you need it, you don't need it.'

It seems reasonable that the default installation should try to make
itself useful to the average target user. Now, by a show of hands
(rather than a string of replies), how many of us have sat down at our
newly-installed machines and said All right, time to get my discard
service on! Let's follow that up with a little chargen, while we're at
it! They may be legitimate services with legitimate uses, but are not
needed in the normal case, and as such, should not be activated in the
default case.

The argument below is pretty bad. Have you ever heard of anybody
actually getting impaled by holding a sword poised at his belly and
walking into grand central station at 5:00pm going 'scuse me, pardon
me, 'scuse me, pardon *GGUAGHGH!*? I sure haven't. So why not do it?
Our hypothetical late friend didn't need to be doing it, and he
shouldn't have been doing it. 

...which brings me to my next point: just because I've never heard of
such a ridiculous demise actually occuring doesn't rule out the
possibility that it has. And just because you haven't heard of
exploits involving these services doesn't mean they haven't been
around. Again, a reiteration of wiser words earlier in the thread:

the standard inetd services including discard, echo, sysstat,
netstat et al all *have* *had* their known vulnerabilities before now.
All long-since patched, but that's not to say there won't be another
tomorrow.

Vineet

* Noah Meyerhans ([EMAIL PROTECTED]) [010618 10:51]:
 Why not?  You've not given any reason at all.  Do you know of any
 malicious behavior that is made possible by leaving the services turned
 on?  The potential exists to use the chargen feature as a part of a DoS
 attack, but I've not heard of it ever being used as it's not
 particularly effective unless you have many many machines available, and
 even then there are much more effective weapons.  And what about the
 rest of the ports?  How are they dangerous?  I've never heard of an
 exploit involving any of them.
 
 Really I'm just playing devil's advocate here.  I don't care if they're
 turned off or not.  I've just never seen any evidence that there's any
 reason for concern over them.
 
 noah
 
 -- 
  ___
 | Web: http://web.morgul.net/~frodo/
 | PGP Public Key: http://web.morgul.net/~frodo/mail.html 
 



 PGP signature


No Subject

2001-06-18 Thread Brett Miller

unsubscribe


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: rlinetd security

2001-06-18 Thread Tim Haynes

Noah Meyerhans [EMAIL PROTECTED] writes:

 On Mon, Jun 18, 2001 at 06:35:03PM +0100, Tim Haynes wrote:
  b) they shouldn't be. You'll have to check if they still appear by
  default
[snip]
 
 Why not? You've not given any reason at all. Do you know of any malicious
 behavior that is made possible by leaving the services turned on? 

I don't need to, as my point earlier included `you don't know there won't
be a vulnerability tomorrow'.

But that said, I gather leaking one's timestamp is not a good thing
(leaking *anything* is not really any good). I'm no Kerberos user, but I
heard you can do time-dependent auth in that a given ticket is good until
whenever. I wouldn't want someone to know exactly what time my boxes
thought it was.

 The potential exists to use the chargen feature as a part of a DoS
 attack, but I've not heard of it ever being used as it's not particularly
 effective unless you have many many machines available, and even then
 there are much more effective weapons.

http://www.sans.org/infosecFAQ/malicious/naptha.htm, btw. Why bother
hooking /dev/{zero,null} onto the net with netcat when you can cause a fair
bit of traffic with standard services that do much the same thing?

 Really I'm just playing devil's advocate here. I don't care if they're
 turned off or not. I've just never seen any evidence that there's any
 reason for concern over them.

There doesn't have to be a reason for concern for you to not want them
available. I don't want anyone so much as fingerprinting my box (given that
nmap relies mostly on TCP responses to guage OS), let alone doing anything
really interesting with it.

~Tim
-- 
The light of the world keeps shining,   |[EMAIL PROTECTED]
Bright in the primal glow   |http://spodzone.org.uk/


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: rlinetd security

2001-06-18 Thread Noah L. Meyerhans

On Mon, Jun 18, 2001 at 11:08:49AM -0700, Vineet Kumar wrote:
 The argument below is pretty bad. Have you ever heard of anybody
 actually getting impaled by holding a sword poised at his belly and
 walking into grand central station at 5:00pm going 'scuse me, pardon
 me, 'scuse me, pardon *GGUAGHGH!*? I sure haven't. So why not do it?
 Our hypothetical late friend didn't need to be doing it, and he
 shouldn't have been doing it. 

Huh?  You've acknowledged that there may be legitimate uses for the
simple services that you may be ignorant of.  I don't think there is any
legitimate gain to be had be running around a crowded area with a blade
against your belly.

 the standard inetd services including discard, echo, sysstat,
 netstat et al all *have* *had* their known vulnerabilities before now.
 All long-since patched, but that's not to say there won't be another
 tomorrow.
 

Have you looked at their code?  I can assure you that there is no
potential for remote exploit in 
void
discard_stream(int s, struct servtab *sep)
{
char buffer[BUFSIZE];

setproctitle(sep-se_service, s);
while ((errno = 0, read(s, buffer, sizeof(buffer))  0) ||
errno == EINTR)
;
exit(0);
}

Or how 'bout this:
/* Return human-readable time of day */
void
daytime_stream(int s, struct servtab *sep)
{
char buffer[256];
time_t clocc;

(void)sep;

clocc = time(NULL);
snprintf(buffer, sizeof(buffer), %.24s\r\n, ctime(clocc));
write(s, buffer, strlen(buffer));
}

These services are so simple that any moderately knowledgeable coder can
ensure that there is no risk to leaving the services turned on.

noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 


 PGP signature


Re: rlinetd security

2001-06-18 Thread Noah L. Meyerhans

On Mon, Jun 18, 2001 at 07:25:37PM +0100, Tim Haynes wrote:
 But that said, I gather leaking one's timestamp is not a good thing
 (leaking *anything* is not really any good). I'm no Kerberos user, but I
 heard you can do time-dependent auth in that a given ticket is good until
 whenever. I wouldn't want someone to know exactly what time my boxes
 thought it was.

So I assume you stay very clear of any kind of time synchronization
(ntpd and the like).  In order for things like Kerberos to work (BTW, I
am a kerberos user) the client machines have to be very closely
synchronized with the authentication server.  NTP is how this is done.
Giving out your time via either the daytime or time simple service is
not giving out any info that's not already available to anybody who
cares to look.

  The potential exists to use the chargen feature as a part of a DoS
  attack, but I've not heard of it ever being used as it's not particularly
  effective unless you have many many machines available, and even then
  there are much more effective weapons.
 
 http://www.sans.org/infosecFAQ/malicious/naptha.htm, btw. Why bother
 hooking /dev/{zero,null} onto the net with netcat when you can cause a fair
 bit of traffic with standard services that do much the same thing?

Yes, but you know what?  'ping -f' works just as good, if not better.
Do you have ICMP filtered at your router?


-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 


 PGP signature


RE: rlinetd security

2001-06-18 Thread Pat Moffitt

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf
 Of Tim Haynes
 Sent: Monday, June 18, 2001 10:35 AM
 To: Sebastiaan
 Cc: Tim Haynes; [EMAIL PROTECTED]; [EMAIL PROTECTED]
 Subject: Re: rlinetd security


 Sebastiaan [EMAIL PROTECTED] writes:

 [snip]
   Again, if you don't know why you need it, you don't need it.
 
  I know you are right, but I have become curious now: if everyone says
  that you do not need them, then where are they used for? And
 why are they
  still installed by default?

 Good questions.

 a) echo is just there to duplicate everything you send back at you.
discard is just there to dump everything in the sink.
chargen is to give a continual stream of output, eg bandwidth testing
daytime is to give another box a snapshot of the time on here - a crude
 ancient  horrible way to sync boxes
netstat is to give a view of `netstat' over the 'net - remote admin?
[snip]

Now that answers some questions.  Much better.  At least when I turn them
off I will have a clue about what might break.

BTW, my philosophy on disabling unknown services/ports has been to disable
it and see if anything breaks.  If something breaks, then figure out what to
do about it.  But, this can be a tough philosophy on production machines.
(No, I don't have machines that I can test with here.  Nor do I have the
time to set them up.)

The concept of 'if you don't know why your running them you don't need
them.' may be good advice but doesn't help those of use that are trying to
understand Security.

Pat Moffitt
MIS Administrator
Western Recreational Vehicles, Inc.



--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: rlinetd security

2001-06-18 Thread Tim Haynes

Noah L. Meyerhans [EMAIL PROTECTED] writes:

 On Mon, Jun 18, 2001 at 11:08:49AM -0700, Vineet Kumar wrote:

  The argument below is pretty bad. Have you ever heard of anybody
  actually getting impaled by holding a sword poised at his belly and
  walking into grand central station at 5:00pm going 'scuse me, pardon
  me, 'scuse me, pardon *GGUAGHGH!*? I sure haven't. So why not do it? 
  Our hypothetical late friend didn't need to be doing it, and he
  shouldn't have been doing it.
 
 Huh? You've acknowledged that there may be legitimate uses for the simple
 services that you may be ignorant of. I don't think there is any
 legitimate gain to be had be running around a crowded area with a blade
 against your belly.

The point is that these things can be used for good or evil. If you're not
going to use it for good, whether someone else can or not, a nasty chap can
still use it for evil.

You realise rpc.statd has its uses, as does ftpd? Is that some reason to
enable them `just in case somebody wants to use them for legitimate
reasons'?
 
  the standard inetd services including discard, echo, sysstat, netstat
  et al all *have* *had* their known vulnerabilities before now. All
  long-since patched, but that's not to say there won't be another
  tomorrow.
 
 Have you looked at their code?  I can assure you that there is no
 potential for remote exploit in 
 void
 discard_stream(int s, struct servtab *sep)
[snip]

 These services are so simple that any moderately knowledgeable coder can
 ensure that there is no risk to leaving the services turned on.

There isn't? What about in your choice of C-library, then, have you audited
that? 
While you're here, what tweaks are going to be made to these functions next
week?

The principle is still the same. It's not enough to ask whether you need it
or not and assume something can be left on if you don't know any better; if
another vulnerability comes out you have to check one more thing to see
whether it's relevant or not, which is a waste of time, at best, and an
omitted necessary update to an unused service (unused, until someone scans
you for it, that is) at worst.

Incidentally, in your dismissal of exploits for these things, you're
neglecting another scenario: black-hat *does* manage to crack another box
in the organization, and points multiple netcats from the exploited box at
someone with echo: you'll end up with enough network traffic  load to
cause a slow-down, and the traffic may possibly help him mask very nasty
activities in the noise.

~Tim
-- 
All I see, All I know   |[EMAIL PROTECTED]
Is touching the sacred earth|http://spodzone.org.uk/
And warming the hallowed ground |


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: gnupg problem

2001-06-18 Thread Thomas Bushnell, BSG

Petr Cech [EMAIL PROTECTED] writes:

 On Mon, Jun 18, 2001 at 10:55:04AM -0700 , Thomas Bushnell, BSG wrote:
  Debian is about a *distribution* and not a random assemblage of
 
 OK, distribution. That's dists/potato/main/binary-arch/Packages 

If that's the *only* thing that counts as the Debian distribution,
then we have no security team at all!

Debian ought to offer security updates for the stable distribution,
but it doesn't.  Instead, it is only offering security updates for the
packages in the stable distribution.  That's an understandable
oversight, but it is an oversight, and I think it should be corrected.

We are not just about packages, we are about the way they work
together to form a coherent whole.


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: rlinetd security

2001-06-18 Thread Tim Haynes

Noah L. Meyerhans [EMAIL PROTECTED] writes:

[snip]
  http://www.sans.org/infosecFAQ/malicious/naptha.htm, btw. Why bother
  hooking /dev/{zero,null} onto the net with netcat when you can cause a fair
  bit of traffic with standard services that do much the same thing?
 
 Yes, but you know what? 'ping -f' works just as good, if not better. Do
 you have ICMP filtered at your router?

Some, yes. 

I also worry about who's going to be able to execute `ping -f' on *my*
machines, should they make it through, and try to make it as hard as
possible.

Leaving ports open because you don't know better does not constitute making
nasty people's life harder.

~Tim
-- 
   20:12:08 up 4 days, 16 min, 17 users,  load average: 0.02, 0.04, 0.00
[EMAIL PROTECTED] |Windows 98 is year 2000-ready
http://piglet.is.dreaming.org |(seen during a recent, y2000, installation)


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: gnupg problem

2001-06-18 Thread Tim Haynes

[EMAIL PROTECTED] (Thomas Bushnell, BSG) writes:

 Debian ought to offer security updates for the stable distribution, but
 it doesn't. Instead, it is only offering security updates for the
 packages in the stable distribution. That's an understandable oversight,
 but it is an oversight, and I think it should be corrected.

Insofar as I can make any sense of the above differentiation, does the idea
`2.2r3' fit into this anywhere?

 We are not just about packages, we are about the way they work together
 to form a coherent whole.

~Tim
-- 
   20:43:57 up 4 days, 47 min, 11 users,  load average: 0.02, 0.01, 0.00
[EMAIL PROTECTED] |Can you tell me how to get,
http://piglet.is.dreaming.org |How to get to Sesame Street?
  |


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: rlinetd security

2001-06-18 Thread Martin Maney

On Mon, Jun 18, 2001 at 08:34:11PM +0100, Tim Haynes wrote:
 Well, it depends. You can never tidy up a rooted box; the same mentality
 sort of applies all the way down - if you're setting up a box, why worry
 about installing this and uninstalling that, when your original
 installation shouldn't have had anything enabled in the first place? (And
 yes, you can push that back into the distro, too.)

Sure, you can have a distro that doens't install any services.  Heck,
consider local exploits and you may decide that login considered harmful
isn't too great a stretch...  :-)

I have to take issue with your attempt to draw a aparallel to a rooted box. 
It *is* possible to cleanup the newly installed box because you can
reasonably assume that it hasn't been maliciously setup to resist the
cleanup.

 Surely software you install on production machines has its requirements
 either satisfied by the wonder that is apt-get, or documented properly? You
 can, and should, start from blank and add things as you need.

Could I agree with the minimalist sentiment while yet observing that
apt-get, wonderful as it is, cannot satisfy requirements that come not from
packages installed on this machine, but from other machines - possibly ones
that aren't even using Debian?

At the same time, I would like to agree with the sentiment that has been
expressed a few times.  If you don't know what it's for, shut it off.  I
think the unstated part that some may have overlooked is that if you need
something but don't know it, then you owe it to yourself (and your
employers, if that's the sort of situation it is) to find out what's there. 
This is how sysadmins lose their hair!

-- 
There has grown up in the minds of certain groups in this country
the notion that because a man or corporation has made a profit
out of the public for a number of years, the government and the courts
are charged with the duty of guaranteeing such profit in the future,
even in the face of changing circumstances and contrary public interest.
This strange doctrine is not supported by statute nor common law.  -- RAH


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: gnupg problem

2001-06-18 Thread Martin Maney

On Mon, Jun 18, 2001 at 08:45:12PM +0100, Tim Haynes wrote:
 [EMAIL PROTECTED] (Thomas Bushnell, BSG) writes:
  Debian ought to offer security updates for the stable distribution, but
  it doesn't. Instead, it is only offering security updates for the
  packages in the stable distribution. That's an understandable oversight,
  but it is an oversight, and I think it should be corrected.
 
 Insofar as I can make any sense of the above differentiation, does the idea
 `2.2r3' fit into this anywhere?

Sure.  That's the latest release of the distribution, with bug fixes rolled
in.  Many of those are security fixes.  Other security fixes have been
needed since release 3; because security bugs are considered more
time-critical than the other sorts, they are released, and indeed we are
strongly urged to install them, independently of the point release
mechanism.

The issue is, can a security-bug-fix release of a package which is
incompatible with one or more parts of the current point release packages as
a whole be good?  I'm inclined to feel that this is at least a serious flaw
in that security-bug-fix release, and I would hate to have to try to defend
the position that it is not a release-critical grade bug.  How would this
sort of conflict be resolved in normal development - if this incompatibility
arose in a proposed-update (non-security related), do you think that package
would be accepted for the next point release?  I would hope not.

  We are not just about packages, we are about the way they work together
  to form a coherent whole.

What he said.  Debian's biggest plus - I speak here as a sysadmin and user
of the distro - has always been the much higher technical quality; having a
supposed fix cause another part of Debian to break seems quite
antithetical to that quality.  If I wanted to roll the dice every time I
installed something new I could be using RPMs.  :-(  :-)

-- 
Microsoft, which used to say all the time that the software business
was ruthlessly competitive, is now matched against a competitor whose
model of production and distribution is so much better that Microsoft
stands no chance of prevailing in the long run. They're simply trying
to scare people out of dealing with a competitor they can't buy,
can't intimidate and can't stop. -- Eben Moglen


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: rlinetd security

2001-06-18 Thread Tim Haynes

[EMAIL PROTECTED] (Martin Maney) writes:

 On Mon, Jun 18, 2001 at 08:34:11PM +0100, Tim Haynes wrote:

  Well, it depends. You can never tidy up a rooted box; the same
  mentality sort of applies all the way down - if you're setting up a
  box, why worry about installing this and uninstalling that, when your
  original installation shouldn't have had anything enabled in the first
  place? (And yes, you can push that back into the distro, too.)
 
 Sure, you can have a distro that doens't install any services. Heck,
 consider local exploits and you may decide that login considered
 harmful isn't too great a stretch... :-)

Well, smiley noted, but the list of users who have what kind of access to
the box has to be considered.

 I have to take issue with your attempt to draw a aparallel to a rooted
 box. It *is* possible to cleanup the newly installed box because you can
 reasonably assume that it hasn't been maliciously setup to resist the
 cleanup.

Well, if you can assume that, sure. But the parallel really comes in saying
you half-way don't know what to look for, or might miss something. That's
why I'm in favour of pushing some things into the distro
installation-default area.

  Surely software you install on production machines has its requirements
  either satisfied by the wonder that is apt-get, or documented properly? 
  You can, and should, start from blank and add things as you need.
 
 Could I agree with the minimalist sentiment while yet observing that
 apt-get, wonderful as it is, cannot satisfy requirements that come not
 from packages installed on this machine, but from other machines -
 possibly ones that aren't even using Debian?

Sure; that's where `or documented properly' comes in.

 At the same time, I would like to agree with the sentiment that has been
 expressed a few times. If you don't know what it's for, shut it off. I
 think the unstated part that some may have overlooked is that if you need
 something but don't know it, then you owe it to yourself (and your
 employers, if that's the sort of situation it is) to find out what's
 there.

It's been mentioned very en-passant, as has `but I don't have the time to
investigate everything', which makes my caffeine^Wblood boil.

  This is how sysadmins lose their hair!

Tell me about it. 

My take on the whole thing is that you're building a test box internally
first *anyway*, if you don't know exactly how to set up a live machine;
then you investigate, kill off everything your reading of the manuals
allows you to, on the simple grounds that you don't want it to turn around
 bite you later on, and you're on a test box so any breaks won't matter
and you'll learn in the process.
Leaving stuff open because `there aren't any known holes at the moment
doesn't really wash here :( .

~Tim
-- 
But mountains are holy places,  |[EMAIL PROTECTED]
And beauty is free / We can still walk  |http://spodzone.org.uk/
Through the garden  |
Our earth was once green|


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: gnupg problem

2001-06-18 Thread Petr Cech

On Mon, Jun 18, 2001 at 12:11:39PM -0700 , Thomas Bushnell, BSG wrote:
 Petr Cech [EMAIL PROTECTED] writes:
 
  On Mon, Jun 18, 2001 at 10:55:04AM -0700 , Thomas Bushnell, BSG wrote:
   Debian is about a *distribution* and not a random assemblage of
  
  OK, distribution. That's dists/potato/main/binary-arch/Packages 
 
 If that's the *only* thing that counts as the Debian distribution,
 then we have no security team at all!

you know, what I've ment. Debian *distribution* is main and non-US/main

Petr Cech
-- 
Debian GNU/Linux maintainer - www.debian.{org,cz}
   [EMAIL PROTECTED]

* Joy notes some people think Unix is a misspelling of Unics which is a 
misspelling of Emacs :)


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: gnupg problem

2001-06-18 Thread Petr Cech

On Mon, Jun 18, 2001 at 03:41:20PM -0500 , Martin Maney wrote:
 arose in a proposed-update (non-security related), do you think that package

then it wouldn't (or a fixed conflicting package would be provided). But
because we need this security update, then we need also a proposed-update

 would be accepted for the next point release?  I would hope not.
 
   We are not just about packages, we are about the way they work together
   to form a coherent whole.
 
 What he said.  Debian's biggest plus - I speak here as a sysadmin and user
 of the distro - has always been the much higher technical quality; having a
 supposed fix cause another part of Debian to break seems quite
 antithetical to that quality.

1) don't fix = not an option
2) fork = really no
3) fix and fix the breakage = we have this

Petr Cech
-- 
Debian GNU/Linux maintainer - www.debian.{org,cz}
   [EMAIL PROTECTED]

woot What do you mean it's not packaged in Debian?


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: gnupg problem

2001-06-18 Thread Thomas Bushnell, BSG

Petr Cech [EMAIL PROTECTED] writes:

 On Mon, Jun 18, 2001 at 12:11:39PM -0700 , Thomas Bushnell, BSG wrote:
  Petr Cech [EMAIL PROTECTED] writes:
  
   On Mon, Jun 18, 2001 at 10:55:04AM -0700 , Thomas Bushnell, BSG wrote:
Debian is about a *distribution* and not a random assemblage of
   
   OK, distribution. That's dists/potato/main/binary-arch/Packages 
  
  If that's the *only* thing that counts as the Debian distribution,
  then we have no security team at all!
 
 you know, what I've ment. Debian *distribution* is main and non-US/main

Thene where are the security releases?


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: gnupg problem

2001-06-18 Thread Martin Maney

On Mon, Jun 18, 2001 at 10:48:27PM +0200, Petr Cech wrote:
 you know, what I've ment. Debian *distribution* is main and non-US/main

Is that policy or your opinion?  Last time I looked, there were still those
pesky other sections on the servers, in the bug system, and so forth.

-- 
You arguably have quite a few inalienable rights,
but being taken seriously isn't one of them.
Neither is being respected.  -- Rick Moen  linuxmafia.com/~rick/faq/


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: A question about Knark and modules

2001-06-18 Thread Ethan Benson

On Mon, Jun 18, 2001 at 06:41:59PM +0200, Christian Jaeger wrote:
 
 Well, if the 'apt-get update  apt-get upgrade' wrapper doesn't take 
 any input and resets the environment (is there anything else it 
 should take care of?) then even if called by the cracker it wouldn't 
 do anything else than upgrade the system the same way upgrades were 
 happening anyway before the breakin. (Ok, there may be an issue with 
 the changing inode numbers lids is depending upon and which would not 
 get updated immediately after upgrading software.)

what if the attacker can poisen your DNS, or routing tables?  then he
can trick apt into downloading his 37337 `security update' (more like
unsecurity update heh)

 And/or if I install a special shell binary that has capabilities to 
 access the whole filesystem, but exits immediately unless called by 
 sshd, then system administrators still can just login as root and do 
 what they are used to do, without risking a hacker using the same 
 tool because he (probably) didn't use sshd to gain access to the 
 machine. (Of course, this requires 1. sshd not having a problem, and 
 2. making sure depending files like /etc/shadow, pam etc are 
 protected, but that's what lids people propagate anyway).
 
 Am I wrong?

get root, run passwd root, ssh in.  

 Of course if lids in fact can't deny access to disk devices then 
 probably all is lost...

lids can, it adds new capabilities or else modifies one of the
existing ones.  (at least last i read the FAQ that seemed to be
implyed). 

-- 
Ethan Benson
http://www.alaska.net/~erbenson/

 PGP signature


Re: rlinetd security

2001-06-18 Thread Ethan Benson

On Mon, Jun 18, 2001 at 09:06:07AM -0700, Pat Moffitt wrote:
 That makes a lot of assumptions about my (or anyone else) understanding of
 the system.  For example, I have no clue what discard is used for.  So, how
 do I know if I have a package installed that will not work properly if I
 disable that port.  Yes, I should go and research the issue but I only have
 some much time in the day.

if you don't understand such issues you have no business with the root
password.  

 Therefor, many of us are forced to make the same assumptions (valid or not)
 such as Sebastiaan's.

only if you insist on remaining ignorant.  

-- 
Ethan Benson
http://www.alaska.net/~erbenson/

 PGP signature


Re: rlinetd security

2001-06-18 Thread Ethan Benson

On Mon, Jun 18, 2001 at 01:48:50PM -0400, Noah Meyerhans wrote:
 
 Why not?  You've not given any reason at all.  Do you know of any
 malicious behavior that is made possible by leaving the services turned
 on?  The potential exists to use the chargen feature as a part of a DoS
 attack, but I've not heard of it ever being used as it's not
 particularly effective unless you have many many machines available, and
 even then there are much more effective weapons.  And what about the
 rest of the ports?  How are they dangerous?  I've never heard of an
 exploit involving any of them.

play a spoofing trick to attach the victims chargen port to its echo
port.  

i don't know if that is still possible, in the olden days it was, had
quite ammusing result too.  

-- 
Ethan Benson
http://www.alaska.net/~erbenson/

 PGP signature


Re: gnupg problem

2001-06-18 Thread Ethan Benson

On Mon, Jun 18, 2001 at 02:30:19PM -0700, Thomas Bushnell, BSG wrote:
  you know, what I've ment. Debian *distribution* is main and non-US/main
 
 Thene where are the security releases?

security.debian.org

mailcrypt is not in debian, its in contrib.  niether contrib or
non-free are part of debian.  

if gnupg broke deps on a another package in main i think you would
have a point, but it broke something outside the distribution which is
beyond the concerns of the security team, they only need to care about
the distribution which is main and non-US/main.  

-- 
Ethan Benson
http://www.alaska.net/~erbenson/

 PGP signature


Re: gnupg problem

2001-06-18 Thread Ethan Benson

On Mon, Jun 18, 2001 at 06:37:00PM -0500, Martin Maney wrote:
 On Mon, Jun 18, 2001 at 10:48:27PM +0200, Petr Cech wrote:
  you know, what I've ment. Debian *distribution* is main and non-US/main
 
 Is that policy or your opinion?  Last time I looked, there were still those
 pesky other sections on the servers, in the bug system, and so forth.

it is policy, just because they are on debian servers does not make
them part of the debian distribution.  non-free and contrib are NOT
parts of debian.  this is really fairly well known...

-- 
Ethan Benson
http://www.alaska.net/~erbenson/

 PGP signature


Re: gnupg problem

2001-06-18 Thread Thomas Bushnell, BSG

Ethan Benson [EMAIL PROTECTED] writes:

 On Mon, Jun 18, 2001 at 02:30:19PM -0700, Thomas Bushnell, BSG wrote:
   you know, what I've ment. Debian *distribution* is main and non-US/main
  
  Thene where are the security releases?
 
 security.debian.org
 
 mailcrypt is not in debian, its in contrib.  niether contrib or
 non-free are part of debian.  
 
 if gnupg broke deps on a another package in main i think you would
 have a point, but it broke something outside the distribution which is
 beyond the concerns of the security team, they only need to care about
 the distribution which is main and non-US/main.  

I think we have a point here too...  I mean, let's actually do the
best we can, instead of doing as little as possible.

In fact, the only reason mailcrypt is in contrib is that it adapts to
the patent-restricted versions of gpg/pgp software.  As far as its use
with gpg, it belongs in main.


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: gnupg problem

2001-06-18 Thread Robert Mognet

Hello,

 
 In fact, the only reason mailcrypt is in contrib is that it adapts to
 the patent-restricted versions of gpg/pgp software.  As far as its use
 with gpg, it belongs in main.


A reading of the Debian Social Contract (section 5) contains the 
following concerning contrib and non-free...

The software in these directories is not part of the  
 Debian system, although it has been configured for
 use with Debian.
 
One of the things that I find admirable about the Debian people is
that they draw a very clear and crisp line as to what they consider
acceptable to include in their distribution.  Any compromise with
those principles should be avoided.  

Mailcrypt isn't part of Debian, so it's not the responciblity of the
security team.

Regards,
Robert


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: gnupg problem

2001-06-18 Thread Peter Cordes

On Mon, Jun 18, 2001 at 06:10:12PM -0700, Thomas Bushnell, BSG wrote:
 Ethan Benson [EMAIL PROTECTED] writes:
 
  On Mon, Jun 18, 2001 at 02:30:19PM -0700, Thomas Bushnell, BSG wrote:
you know, what I've ment. Debian *distribution* is main and non-US/main
   
   Thene where are the security releases?
  
  security.debian.org
  
  mailcrypt is not in debian, its in contrib.  niether contrib or
  non-free are part of debian.  
  
  if gnupg broke deps on a another package in main i think you would
  have a point, but it broke something outside the distribution which is
  beyond the concerns of the security team, they only need to care about
  the distribution which is main and non-US/main.  
 
 I think we have a point here too...  I mean, let's actually do the
 best we can, instead of doing as little as possible.
 
 In fact, the only reason mailcrypt is in contrib is that it adapts to
 the patent-restricted versions of gpg/pgp software.  As far as its use
 with gpg, it belongs in main.

 If mailcrypt can be installed and do useful stuff without any
packages from non-free installed, then it should itself be in main,
shouldn't it?

 What would happen in a similar situation where all packages involved
were already in main?  Someone else pointed out that we should think
about the general case of this problem, and have a way to deal with
it.  The fact that mailcrypt is currently in contrib lets us sort of
wriggle out of the problem, in this specific instance of the problem.
Does proposed-updates get merged when new sub-releases (e.g. r3) are
made?  If so, then putting packages there does it.  If not, then the
updated packages that the new security-fix package depends on must
become part of potato somehow.

 IMHO, security fixes should still go into security.d.o ASAP, without
waiting for packages that depend on them to be updated, but those
packages _do_ need to be updated.

-- 
#define X(x,y) x##y
Peter Cordes ;  e-mail: X([EMAIL PROTECTED] , ns.ca)

The gods confound the man who first found out how to distinguish the hours!
 Confound him, too, who in this place set up a sundial, to cut and hack
 my day so wretchedly into small pieces! -- Plautus, 200 BCE


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: rlinetd security

2001-06-18 Thread Peter Cordes

On Mon, Jun 18, 2001 at 07:15:55PM +0200, Sebastiaan wrote:
 I know you are right, but I have become curious now: if everyone says that
 you do not need them, then where are they used for? And why are they still
 installed by default?

 All those internal services are for testing/debugging, except for the
time service, which is used by rdate.  If you don't run around
playing with netcat, you _don't_ need them.

 The turn it off if you don't need it rule applies to services you
don't know about.  If you don't know if something will break if you
turn it off, turn it off and see if something breaks.  If nothing
breaks, leave it off.

-- 
#define X(x,y) x##y
Peter Cordes ;  e-mail: X([EMAIL PROTECTED] , ns.ca)

The gods confound the man who first found out how to distinguish the hours!
 Confound him, too, who in this place set up a sundial, to cut and hack
 my day so wretchedly into small pieces! -- Plautus, 200 BCE


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: A question about Knark and modules

2001-06-18 Thread Ben Harvey

On Sun, Jun 17, 2001 at 07:55:40PM -0800, Ethan Benson wrote:
 
 a bit.  lids makes system adminsitration utterly impossible.  unless
 you leave enough holes open which an attacker can use to bypass it
 all. 
well nearly...
at least you can prevent new or unknown process/files from acessing stuff. 
If there is an exploit for an existing piece of software you are back at 
square one.

The advantage is extremely granular control: a program at a specific inode
can be given capabilities while everything else has them refused.

the disadvantage is that you end up with a million little holes (complexity)
fortunately the files that have these added capabilities are also 
protected (from trojaning - buffer overruns etc still work)

 
 the thing is once you make exceptions for the system adminsistrator to
 use to maintain the you open the holes the attacker needs to trojan
 your system and to remove the additional obsticales you installed.  

yes it is possible with lids, but it is a _lot_ harder:
processes can be hidden.
binaries RO (trojaning is difficult)
logs append 
/etc/somefile can only be read when you allow it. 

 
 system adminsitrator == root
 cracker == root
 
cracker==root sysadmin==root+LIDS_password
if someone can sniff me typing in my lids password (encrypted in the kernel)
then I am stuffed.

In short Lids can be a pain to set up, but would also be a pain to crack,
especially if the cracker doesn't know exactly which rules I have set up.
a good cracker could do it.

btw I notice that they are still working on fork bomb protection. that would
be nice :)

-- 


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: A question about Knark and modules

2001-06-18 Thread Ethan Benson
On Mon, Jun 18, 2001 at 01:27:37AM +, Jim Breton wrote:
 On Sun, Jun 17, 2001 at 02:44:48AM -0800, Ethan Benson wrote:
  
  compiling without module support would be mostly the same as just 
  
  lcap CAP_SYS_MODULE
 
 
 Fwiw, I have heard (though not tested myself) that even if you compile
 your kernel _without_ loadable module support, you will still be able
 to insert modules into the running kernel.

well sort of.  its not quite as simple as just loading the module.
you have to manually insert the code into the running kernel and
manually modify kernel memory through /dev/mem.  

 Again I have not tried this myself, but something to test for before
 relying on a certain behavior.

my lcap CAP_SYS_MODULE trick doesn't do you much good without
disabling /dev/mem since its really quite trivial to go into /dev/mem
and twiddle the bits of memory containing the capability bounding
set.  there is no example code to do this, but its explained on
bugtraq quite some time ago.  i think it could be done with only a
couple lines of C.  

-- 
Ethan Benson
http://www.alaska.net/~erbenson/


pgpC0CtFtRic5.pgp
Description: PGP signature


Re: Are these breakin attempts?

2001-06-18 Thread Ethan Benson
On Mon, Jun 18, 2001 at 03:06:14AM +0200, Christian Jaeger wrote:
 Hello,
 
 I run a pc with potato on a cable modem line. Recently I discovered 
 the following in /var/log/messages:
 
 Jun 10 20:21:16 pflanze -- MARK --
 Jun 10 20:33:55 pflanze
 Jun 10 20:33:55 pflanze /sbin/rpc.statd[229]: gethostbyname error for 
 ^X÷ÿ¿^X÷ÿ¿^Y÷ÿ¿^Y÷ÿ¿^Z÷ÿ¿^Z÷ÿ¿^[÷ÿ¿^[÷ÿ¿%8x%8x%8x%8x%8x%8x%8x%8x%8x%236x%n%137x%n%10x%n%192x%n\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220

failed attempt to exploit an OLD hole in rpc.statd.  if it had
suceeded you would not have seen the format strings above (%8x%8x...)

if your not using nfs remove nfs-kernel-server and nfs-common, you
don't need them.  if you have no other rpc services disable portmap
(apt-get remove portmap in woody, in potato rm /etc/rcS.d/*portmap)

and always make sure you have security.debian.org in your sources.list
(uncommented) and check for updates at least once a week.  you have
the nfs security updates installed since the exploit failed.

-- 
Ethan Benson
http://www.alaska.net/~erbenson/


pgpZ30biU24im.pgp
Description: PGP signature


Re: rxvt exploit

2001-06-18 Thread Peter Cordes
On Sat, Jun 16, 2001 at 06:25:32AM -0800, Ethan Benson wrote:
 On Sat, Jun 16, 2001 at 10:14:52AM -0400, Ehsan (Shawn) Baseri wrote:
  Just saw this, thought you guys might be interested.  Not sure how 
  damaging the exploit is though.
 
 you get gid=utmp, which lets you corrupt the utmp database.  overall
 not that big a deal but could cause some fair ammount of problems.  

 I think I saw someone say a while ago that getting write access to
utmp and/or wtmp was a bigger deal than it looked, because some other
programs trust the structure of the file, and you could potentially
exploit other programs through utmp.  This is especially important if
these other programs are being run by root.

-- 
#define X(x,y) x##y
Peter Cordes ;  e-mail: X([EMAIL PROTECTED] , ns.ca)

The gods confound the man who first found out how to distinguish the hours!
 Confound him, too, who in this place set up a sundial, to cut and hack
 my day so wretchedly into small pieces! -- Plautus, 200 BCE



Re: A question about Knark and modules

2001-06-18 Thread Peter Cordes
I like the package signing idea.  That would be cool.  That way, you
could still load and unload modules.  I like being able to do that.
One obvious problem with the scheme is that an attacker could
potentially read the keys from /boot/vmlinuz-2.4.5, or whatever, and
sign their own module.  This can be overcome if we give up the ability
to compile more modules for that kernel after we finish compiling it:
 - Generate a key pair during kernel compilation (RSA would be a good
 alg. for this).
 - Sign the modules with one half of the key pair.
 - store the other half of the key pair in the kernel image.
 - _delete_ all traces of the key used to sign the modules.

 All that's needed to make this workable is to find a way to provide
access to IO/device memory space for X11 without allowing read/write
access to kernel memory.  This can't really be all that hard.  I think
the kernel can tell when the memory address written to or mapped in
/dev/mem is part of kernel memory by checking where the kernel is in
memory.  A very restrictive raw mem device that only allowed processes
to map PCI memory space, or maybe just PCI memory space that PCI
devices reported in their configuration info, would do the job for
X11.  (BTW, AGP acts like another PCI bus).  Limiting things to only
PCI-reported memory spaces would stop access from user space to ISA
memory, but who would want to do that anyway...

 I like this idea.  It would kick ass, so we should do it.

-- 
#define X(x,y) x##y
Peter Cordes ;  e-mail: X([EMAIL PROTECTED] , ns.ca)

The gods confound the man who first found out how to distinguish the hours!
 Confound him, too, who in this place set up a sundial, to cut and hack
 my day so wretchedly into small pieces! -- Plautus, 200 BCE



Re: Are these breakin attempts?

2001-06-18 Thread Ian Miller
add the line /sbin/ipchains -A input -i INTERFACE -p TCP -s !
LOCALLAN -d EXTERNAL IP 111 -l -j DENY to block the rpc statd attacks
from your external network
- Original Message -
From: Christian Jaeger [EMAIL PROTECTED]
To: debian-security@lists.debian.org
Sent: Monday, June 18, 2001 11:06 AM
Subject: Are these breakin attempts?


Hello,

I run a pc with potato on a cable modem line. Recently I discovered
the following in /var/log/messages:

Jun 10 20:21:16 pflanze -- MARK --
Jun 10 20:33:55 pflanze
Jun 10 20:33:55 pflanze /sbin/rpc.statd[229]: gethostbyname error for
^X÷ÿ¿^X÷ÿ¿^Y÷ÿ¿^Y÷ÿ¿^Z÷ÿ¿^Z÷ÿ¿^[÷ÿ¿^[÷ÿ¿%8x%8x%8x%8x%8x%8x%8x%8x%8x%236x%n%1
37x%n%10x%n%192x%n\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220
Jun 10 20:33:55 pflanze
Ç^F/binÇF^D/shA0À\210F^G\211v^L\215V^P\215N^L\211ó°^KÍ\200°^AÍ\200è\177ÿÿÿ
Jun 10 21:01:16 pflanze -- MARK --

Jun 11 13:41:16 pflanze -- MARK --
Jun 11 13:47:10 pflanze
Jun 11 13:47:10 pflanze /sbin/rpc.statd[229]: gethostbyname error for
^X÷ÿ¿^X÷ÿ¿^Y÷ÿ¿^Y÷ÿ¿^Z÷ÿ¿^Z÷ÿ¿^[÷ÿ¿^[÷ÿ¿%8x%8x%8x%8x%8x%8x%8x%8x%8x%236x%n%1
37x%n%10x%n%192x%n\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220
Jun 11 13:47:10 pflanze
Ç^F/binÇF^D/shA0À\210F^G\211v^L\215V^P\215N^L\211ó°^KÍ\200°^AÍ\200è\177ÿÿÿ
Jun 11 14:01:16 pflanze -- MARK --

Jun 12 09:01:16 pflanze -- MARK --
Jun 12 09:09:47 pflanze
Jun 12 09:09:47 pflanze /sbin/rpc.statd[229]: gethostbyname error for
^X÷ÿ¿^X÷ÿ¿^Z÷ÿ¿^Z÷ÿ¿%8x%8x%8x%8x%8x%8x%8x%8x%8x%62716x%hn%51859x%hn\220\220\
220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\
220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\
220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\
220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\
220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\
220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\
220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\
220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\
220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\
220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\
220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\
220\220\220\220\220\220\220\220\220\220\220\220
Jun 12 09:09:47 pflanze
Ç^F/binÇF^D/shA0À\210F^G\211v^L\215V^P\215N^L\211ó°^KÍ\200°^AÍ\200è\177ÿÿÿ
Jun 12 09:21:16 pflanze -- MARK --

Seems like a buffer overflow. (Is it happening in rpc.statd or in
named or somewhere else?)

I've now removed nfs-common  nfs-server. (BTW there's still running
a daemon (portmap, from netbase) on the sunrpc port - I thought
sunrpc is only (mainly?) for NFS?)

After that I've installed ippl, which gives some interesting output as well:

Jun 17 04:13:24 asp connection attempt from ACBDC962.ipt.aol.com
[172.189.201.98]
Jun 17 10:27:38 asp connection attempt from
syr-66-66-4-173.twcny.rr.com [66.66.4.173]
Jun 17 10:27:38 asp connection attempt from
syr-66-66-4-173.twcny.rr.com [66.66.4.173]

Jun 17 11:04:36 webcache connection attempt from
ppp45-net1-idf2-bas1.isdnet.net [195.154.50.45]

Jun 17 18:14:47 sunrpc connection attempt from
h24-79-83-253.vc.shawcable.net [24.79.83.253]
Jun 17 18:17:07 sunrpc connection attempt 

[no subject]

2001-06-18 Thread Cedric LECOURT
unsubscribe



Re: A question about Knark and modules

2001-06-18 Thread Ethan Benson
On Mon, Jun 18, 2001 at 01:38:16AM -0300, Peter Cordes wrote:
 I like the package signing idea.  That would be cool.  That way, you
 could still load and unload modules.  I like being able to do that.
 One obvious problem with the scheme is that an attacker could
 potentially read the keys from /boot/vmlinuz-2.4.5, or whatever, and
 sign their own module.  This can be overcome if we give up the ability

how?  the kernel does not need the private key to verify the
signature.  

replacing the kernel image and rebooting would be another way to get
around this. as would injecting code into /dev/mem.  

 to compile more modules for that kernel after we finish compiling it:
  - Generate a key pair during kernel compilation (RSA would be a good
  alg. for this).
  - Sign the modules with one half of the key pair.
  - store the other half of the key pair in the kernel image.
  - _delete_ all traces of the key used to sign the modules.

yup

  All that's needed to make this workable is to find a way to provide
 access to IO/device memory space for X11 without allowing read/write
 access to kernel memory.  This can't really be all that hard.  I think
 the kernel can tell when the memory address written to or mapped in
 /dev/mem is part of kernel memory by checking where the kernel is in
 memory.  A very restrictive raw mem device that only allowed processes
 to map PCI memory space, or maybe just PCI memory space that PCI
 devices reported in their configuration info, would do the job for
 X11.  (BTW, AGP acts like another PCI bus).  Limiting things to only
 PCI-reported memory spaces would stop access from user space to ISA
 memory, but who would want to do that anyway...

this would be a good idea anyway, it might reduce the possiblity of X
killing the entire box whenever it hiccups and scribbles random
memory.  

  I like this idea.  It would kick ass, so we should do it.

you would need to fix filesystem immutability and block device access
as well.   currently lcap CAP_LINUX_IMMUTABLE is useless since there
is no way to deny root the ability to write directly to /dev/hda* and
remove the immutable bits (ive written a script to remove chattr +i
and +a even when CAP_LINUX_IMMUTABLE is removed from the bounding set,
no reboot required). 

otherwise the attacker can just replace your kernel image and reboot
(which is of course fairly noticable). 

-- 
Ethan Benson
http://www.alaska.net/~erbenson/


pgpvJEbYjdjjQ.pgp
Description: PGP signature


Re: Are these breakin attempts?

2001-06-18 Thread Ethan Benson
On Mon, Jun 18, 2001 at 03:46:13PM +1000, Ian Miller wrote:
 add the line /sbin/ipchains -A input -i INTERFACE -p TCP -s !
 LOCALLAN -d EXTERNAL IP 111 -l -j DENY to block the rpc statd attacks
 from your external network

port 111 is portmap, not rpc.statd.  all blocking portmap will do is
prevent them from conveniently getting the statd port number, that
doesn't stop them from finding it via nmap.  

-- 
Ethan Benson
http://www.alaska.net/~erbenson/


pgp53lHokZtT1.pgp
Description: PGP signature


gnupg problem

2001-06-18 Thread Thomas Bushnell BSG

The new gnupg made it to security.debian.org, but it includes a
conflict with the only available mailcrypt:

Conflicts: gpg-rsa, gpg-rsaref, mailcrypt (= 3.5.5-6)

The changelog.Debian agrees:

gnupg (1.0.6-0potato1) stable; urgency=high

  * Upload for stable; fixes several security holes.
  * debian/postinst: Restore suidregister handling
  * debian/control: remove conflicts with suidmanager and add conflicts
with older versions of mailcrypt.

In this case, there needs to be a non-older version of mailcrypt
available for potato.  I don't know why conflicts were added to
mailcrypt (nothing I noticed in either the public or private security
lists mentioned it, AFAICT).  But assuming the conflicts are needed,
the security team needs to upload a working recent mailcrypt to the
security.debian.org archive.

Thomas



Re: A question about Knark and modules

2001-06-18 Thread Philipp Schulte
On Sun, Jun 17, 2001 at 10:42:17PM -0800, Ethan Benson wrote: 

 you would need to fix filesystem immutability and block device access
 as well.   currently lcap CAP_LINUX_IMMUTABLE is useless since there
 is no way to deny root the ability to write directly to /dev/hda* and
 remove the immutable bits (ive written a script to remove chattr +i
 and +a even when CAP_LINUX_IMMUTABLE is removed from the bounding set,
 no reboot required). 

I thought CAP_SYS_RAWIO would take care of that issue?
Is is still possible to chattr +i if CAP_SYS_RAWIO is removed?
Phil



Re: A question about Knark and modules

2001-06-18 Thread Peter Cordes
On Sun, Jun 17, 2001 at 10:42:17PM -0800, Ethan Benson wrote:
 On Mon, Jun 18, 2001 at 01:38:16AM -0300, Peter Cordes wrote:
  I like the package signing idea.  That would be cool.  That way, you
  could still load and unload modules.  I like being able to do that.
  One obvious problem with the scheme is that an attacker could
  potentially read the keys from /boot/vmlinuz-2.4.5, or whatever, and
  sign their own module.  This can be overcome if we give up the ability
 
 how?  the kernel does not need the private key to verify the
 signature.  

 You need to keep it somewhere if you ever want to build more modules
that that kernel will load.  I don't know why I assumed it would be
stored in the kernel image.

 
 replacing the kernel image and rebooting would be another way to get
 around this. as would injecting code into /dev/mem.  
 
  to compile more modules for that kernel after we finish compiling it:
   - Generate a key pair during kernel compilation (RSA would be a good
   alg. for this).
   - Sign the modules with one half of the key pair.
   - store the other half of the key pair in the kernel image.
   - _delete_ all traces of the key used to sign the modules.
 
 yup
 

 Hmm, if you compiled on a separate machine, or kept the key on a
floppy, you could do make change the last step to get all traces of
the key off the 'secure' machine.

   All that's needed to make this workable is to find a way to provide
  access to IO/device memory space for X11 without allowing read/write
  access to kernel memory.  This can't really be all that hard.  I think
  the kernel can tell when the memory address written to or mapped in
  /dev/mem is part of kernel memory by checking where the kernel is in
  memory.  A very restrictive raw mem device that only allowed processes
  to map PCI memory space, or maybe just PCI memory space that PCI
  devices reported in their configuration info, would do the job for
  X11.  (BTW, AGP acts like another PCI bus).  Limiting things to only
  PCI-reported memory spaces would stop access from user space to ISA
  memory, but who would want to do that anyway...
 
 this would be a good idea anyway, it might reduce the possiblity of X
 killing the entire box whenever it hiccups and scribbles random
 memory.  

 Yes, that's what I was thinking too.

 
   I like this idea.  It would kick ass, so we should do it.
 
 you would need to fix filesystem immutability and block device access
 as well.   currently lcap CAP_LINUX_IMMUTABLE is useless since there
 is no way to deny root the ability to write directly to /dev/hda* and
 remove the immutable bits (ive written a script to remove chattr +i
 and +a even when CAP_LINUX_IMMUTABLE is removed from the bounding set,
 no reboot required). 
 
 otherwise the attacker can just replace your kernel image and reboot
 (which is of course fairly noticable). 

 exactly.  starting with the signing and IO protecting would be a very
good start.

 As for secure block devs, you could have the kernel drop the ability
to write to certain partitions of certain disks, or something like
that.  Blocking writes to mounted partitions wouldn't help for
partitions that can be unmounted and remounted easily.  (writes to the
whole-drive block devices would have to go through the same checks, or
maybe even be blocked entirely if they fell within space allocated to
a partition.)  If this got done, the signing idea would kick ass.
As it is, it's just pretty good...


-- 
#define X(x,y) x##y
Peter Cordes ;  e-mail: X([EMAIL PROTECTED] , ns.ca)

The gods confound the man who first found out how to distinguish the hours!
 Confound him, too, who in this place set up a sundial, to cut and hack
 my day so wretchedly into small pieces! -- Plautus, 200 BCE



Re: gnupg problem

2001-06-18 Thread Tim Potter
Thomas Bushnell BSG writes:

 In this case, there needs to be a non-older version of mailcrypt
 available for potato.  I don't know why conflicts were added to
 mailcrypt (nothing I noticed in either the public or private security
 lists mentioned it, AFAICT).  But assuming the conflicts are needed,
 the security team needs to upload a working recent mailcrypt to the
 security.debian.org archive.

I expect it is because the mailcrypt module can't seem to parse
the output of gpg versions  1.0.4 when trying to decrypt
messages.  From memory, the output format for --list-secret-keys
has been changed.


Tim.



Re: gnupg problem

2001-06-18 Thread Thomas Bushnell, BSG
Tim Potter [EMAIL PROTECTED] writes:

 Thomas Bushnell BSG writes:
 
  In this case, there needs to be a non-older version of mailcrypt
  available for potato.  I don't know why conflicts were added to
  mailcrypt (nothing I noticed in either the public or private security
  lists mentioned it, AFAICT).  But assuming the conflicts are needed,
  the security team needs to upload a working recent mailcrypt to the
  security.debian.org archive.
 
 I expect it is because the mailcrypt module can't seem to parse
 the output of gpg versions  1.0.4 when trying to decrypt
 messages.  From memory, the output format for --list-secret-keys
 has been changed.

Ok, that's a fine reason.  But then the working mailcrypt needs to be
installed, or the security fix has only been half-done.



re: strange flickering ports

2001-06-18 Thread Sebastiaan
Hi...

I have a box with something listening to flickering ports.  nmap
reports various random ports open from run to run.  I can't telnet to
them and ID w/ netstat, because they're gone the instant nmap finds
them.
Hi,

I have this regularily too. I would like to see this explained, but
perhaps it is just an error in nmap?

Greetz,
Sebastiaan




--
  NT is the OS of the future. The main engine is the 16-bit Subsystem
  (also called MS-DOS Subsystem). Above that, there is the windoze 95/98
  16-bit Subsystem. Anyone can see that 16+16=32, so windoze NT is a 
  *real* 32-bit system.




Re: strange flickering ports

2001-06-18 Thread John Ferlito
On Mon, Jun 18, 2001 at 09:14:54AM +0200, Sebastiaan wrote:
 Hi...
 
 I have a box with something listening to flickering ports.  nmap
 reports various random ports open from run to run.  I can't telnet to
 them and ID w/ netstat, because they're gone the instant nmap finds
 them.
 Hi,
 
 I have this regularily too. I would like to see this explained, but
 perhaps it is just an error in nmap?

I've seen this too. My inital guess was that these were incoming ftp
ports from active ftp sessions but that didn't really make sense on this
particular box. Then I think I upgraded nmap and the problem seemed to
go away.

 
 Greetz,
 Sebastiaan
 
 
 
 
 --
   NT is the OS of the future. The main engine is the 16-bit Subsystem
   (also called MS-DOS Subsystem). Above that, there is the windoze 95/98
   16-bit Subsystem. Anyone can see that 16+16=32, so windoze NT is a 
   *real* 32-bit system.
 
 
 
 --  
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

-- 
John Ferlito
Senior Engineer - Bulletproof Networks
ph: +61 (0) 410 519 382
http://www.bulletproof.net.au/



rlinetd security

2001-06-18 Thread Sebastiaan
Hello,

I found out that rlinetd seems like a great replacement for inetd, because
it lets you choose which services may be available for the outside world
and which only for the inner network. So, standard services like echo,
daytime, chargen, ftp, etc. are only available for the LAN, while it is
not possible to connect to these ports from the internet.

But, how secure is this? Is it really what it seems? 

Thanks in advance,
Sebastiaan



--
  NT is the OS of the future. The main engine is the 16-bit Subsystem
  (also called MS-DOS Subsystem). Above that, there is the windoze 95/98
  16-bit Subsystem. Anyone can see that 16+16=32, so windoze NT is a 
  *real* 32-bit system.




Re: rlinetd security

2001-06-18 Thread Jason Thomas
this stuff can also be controlled using hosts.deny and hosts.allow. so
then any inetd prog will do!

On Mon, Jun 18, 2001 at 09:21:56AM +0200, Sebastiaan wrote:
 Hello,
 
 I found out that rlinetd seems like a great replacement for inetd, because
 it lets you choose which services may be available for the outside world
 and which only for the inner network. So, standard services like echo,
 daytime, chargen, ftp, etc. are only available for the LAN, while it is
 not possible to connect to these ports from the internet.
 
 But, how secure is this? Is it really what it seems? 
 
 Thanks in advance,
 Sebastiaan
 
 
 
 --
   NT is the OS of the future. The main engine is the 16-bit Subsystem
   (also called MS-DOS Subsystem). Above that, there is the windoze 95/98
   16-bit Subsystem. Anyone can see that 16+16=32, so windoze NT is a 
   *real* 32-bit system.
 
 
 
 --  
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 

-- 
Jason Thomas   Phone:  +61 2 6257 7111
System Administrator  -  UID 0 Fax:+61 2 6257 7311
tSA Consulting Group Pty. Ltd. Mobile: 0418 29 66 81
1 Hall Street Lyneham ACT 2602 http://www.topic.com.au/


pgpacqYephpWx.pgp
Description: PGP signature


Re: gnupg problem

2001-06-18 Thread Wichert Akkerman
Previously Thomas Bushnell, BSG wrote:
 Ok, that's a fine reason.  But then the working mailcrypt needs to be
 installed, or the security fix has only been half-done.
 
There is a fixed mailcrypt in proposed-updates.

Wichert.

-- 
  _
 /   Nothing is fool-proof to a sufficiently talented fool \
| [EMAIL PROTECTED]   http://www.liacs.nl/~wichert/ |
| 1024D/2FA3BC2D 576E 100B 518D 2F16 36B0  2805 3CB8 9250 2FA3 BC2D |



Re: gnupg problem

2001-06-18 Thread Thomas Bushnell, BSG
Wichert Akkerman [EMAIL PROTECTED] writes:

 Previously Thomas Bushnell, BSG wrote:
  Ok, that's a fine reason.  But then the working mailcrypt needs to be
  installed, or the security fix has only been half-done.
  
 There is a fixed mailcrypt in proposed-updates.

That's great, but it doesn't help. 

The *security* team exists to make security updates to the current
stable release.  Currently there is *not* an installable update for
gnupg.  The only way (that I can think of right now) for fixing this
is to put the new mailcrypt into security.debian.org.

Thomas



Re: gnupg problem

2001-06-18 Thread Wichert Akkerman
Previously Thomas Bushnell, BSG wrote:
 The *security* team exists to make security updates to the current
 stable release.  Currently there is *not* an installable update for
 gnupg.  The only way (that I can think of right now) for fixing this
 is to put the new mailcrypt into security.debian.org.

I see this differently: we had a security problem in gnupg, which we
fixed. This unfortunately broke the version of mailcrypt that was
was in contrib, so not even a proper part of the Debian potato
release itself. Its maintainer did upload a new version of mailcrypt
to fix that problem which you can grab from proposed-updates until
the next stable revision.

Installing mailcrypt on security.debian.org would immediately suggest
that mailcrypt itself has a security problem, which is not true.
It's a bit of a catch 22.

Wichert.

-- 
  _
 /   Nothing is fool-proof to a sufficiently talented fool \
| [EMAIL PROTECTED]   http://www.liacs.nl/~wichert/ |
| 1024D/2FA3BC2D 576E 100B 518D 2F16 36B0  2805 3CB8 9250 2FA3 BC2D |



Re: A question about Knark and modules

2001-06-18 Thread Ethan Benson
On Mon, Jun 18, 2001 at 08:56:03AM +0200, Philipp Schulte wrote:
 On Sun, Jun 17, 2001 at 10:42:17PM -0800, Ethan Benson wrote: 
 
  you would need to fix filesystem immutability and block device access
  as well.   currently lcap CAP_LINUX_IMMUTABLE is useless since there
  is no way to deny root the ability to write directly to /dev/hda* and
  remove the immutable bits (ive written a script to remove chattr +i
  and +a even when CAP_LINUX_IMMUTABLE is removed from the bounding set,
  no reboot required). 
 
 I thought CAP_SYS_RAWIO would take care of that issue?
 Is is still possible to chattr +i if CAP_SYS_RAWIO is removed?

chattr +i and +a cannot be set or removed if CAP_LINUX_IMMUTABLE is
removed from the bounding set.  however that does not prevent root
from messing with /dev/hda* directly, niether does CAP_SYS_RAWIO.  

there is no capability that allows you to deny root access to the raw
block devices, so removing the immutable bit is trivially easy. 

-- 
Ethan Benson
http://www.alaska.net/~erbenson/


pgpIl5hUKla3K.pgp
Description: PGP signature


Re: A question about Knark and modules

2001-06-18 Thread Ethan Benson
On Mon, Jun 18, 2001 at 04:02:08AM -0300, Peter Cordes wrote:
 
  You need to keep it somewhere if you ever want to build more modules
 that that kernel will load.  I don't know why I assumed it would be
 stored in the kernel image.

it could be a separate file, encrpyted (like gpg private keys) and
even kept on a floppy somewhere.  

  Hmm, if you compiled on a separate machine, or kept the key on a
 floppy, you could do make change the last step to get all traces of
 the key off the 'secure' machine.

yup

  exactly.  starting with the signing and IO protecting would be a very
 good start.

yup

  As for secure block devs, you could have the kernel drop the ability
 to write to certain partitions of certain disks, or something like
 that.  Blocking writes to mounted partitions wouldn't help for
 partitions that can be unmounted and remounted easily.  (writes to the
 whole-drive block devices would have to go through the same checks, or
 maybe even be blocked entirely if they fell within space allocated to
 a partition.)  If this got done, the signing idea would kick ass.
 As it is, it's just pretty good...

whats annoying is BSD already has this, and has for quite some time.  

at bootup of a standard Free,Net, or OpenBSD box the securelevel is
raised to 1, which denies root the ability to remove system immutable
flags, it also denies root the ability to write to raw block devices
for the mounted filesystems, but not to the whole disk device, so he
could still hack the filesystem, its just a tad harder. 

raising the securelevel to 2 denies access to all disk block devices,
whole and partitions mounted or not.  (among other things like sealing
firewall rules and such). 

iirc the 2.0 linux kernel had a securelevel which was about equivilent
to BSD securelevels.  2.2 removed it since `capabilities make
securelevel obsolete'  well not quite heh.

-- 
Ethan Benson
http://www.alaska.net/~erbenson/


pgpHHDqyI50Su.pgp
Description: PGP signature


Re: gnupg problem

2001-06-18 Thread Ethan Benson
On Mon, Jun 18, 2001 at 01:04:51AM -0700, Thomas Bushnell, BSG wrote:
 The *security* team exists to make security updates to the current
 stable release.  Currently there is *not* an installable update for
 gnupg.  The only way (that I can think of right now) for fixing this
 is to put the new mailcrypt into security.debian.org.

gnupg is installable, if you remove mailcrypt.  ;-)

not ideal but thats the way the way the cookie crumbles. 

-- 
Ethan Benson
http://www.alaska.net/~erbenson/


pgpz9tXjQfqnp.pgp
Description: PGP signature


Re: rlinetd security

2001-06-18 Thread Tim Haynes
Jason Thomas [EMAIL PROTECTED] writes upside-down:

 this stuff can also be controlled using hosts.deny and hosts.allow. so
 then any inetd prog will do!

No it can't. There's a difference between not listening on the interface at
all, and filtering it out by allowing them to connect to the port first and
only later saying `I don't like the look of your IP#'.

If nothing else, you *should* use rlinetd or xinetd or similar to control
the binding *as well as* tightening down hosts.{allow,deny}.

~Tim
-- 
   09:43:56 up 3 days, 13:48, 16 users,  load average: 0.00, 0.00, 0.00
[EMAIL PROTECTED] |Ideologies come, ideologies go
http://piglet.is.dreaming.org |A waste of words, and endless flow



Re: rlinetd security

2001-06-18 Thread Ethan Benson
On Mon, Jun 18, 2001 at 09:21:56AM +0200, Sebastiaan wrote:
 Hello,
 
 I found out that rlinetd seems like a great replacement for inetd, because
 it lets you choose which services may be available for the outside world
 and which only for the inner network. So, standard services like echo,
 daytime, chargen, ftp, etc. are only available for the LAN, while it is
 not possible to connect to these ports from the internet.
 
 But, how secure is this? Is it really what it seems? 

first you should ask yourself why you even need echo, daytime,
discard, chargen and such.  i don't think ive ever found anyone who
actually did need all of those. 

-- 
Ethan Benson
http://www.alaska.net/~erbenson/


pgpEVAZUCzbSk.pgp
Description: PGP signature


Re: rlinetd security

2001-06-18 Thread Sebastiaan
On Mon, 18 Jun 2001, Ethan Benson wrote:

 On Mon, Jun 18, 2001 at 09:21:56AM +0200, Sebastiaan wrote:
  Hello,
  
  I found out that rlinetd seems like a great replacement for inetd, because
  it lets you choose which services may be available for the outside world
  and which only for the inner network. So, standard services like echo,
  daytime, chargen, ftp, etc. are only available for the LAN, while it is
  not possible to connect to these ports from the internet.
  
  But, how secure is this? Is it really what it seems? 
 
 first you should ask yourself why you even need echo, daytime,
 discard, chargen and such.  i don't think ive ever found anyone who
 actually did need all of those. 
 
Yes, that is a good question. I do not know where most of them are used
for, but because they are always installed, I assumed that these are
needed for correct system operation. But even if I would disable these
ports, I still want to use ftp, smtp and telnet only for my local network.

Thanks,
Sebastiaan




Re: rlinetd security

2001-06-18 Thread Ethan Benson
On Mon, Jun 18, 2001 at 10:53:06AM +0200, Sebastiaan wrote:
 Yes, that is a good question. I do not know where most of them are used
 for, but because they are always installed, I assumed that these are
 needed for correct system operation. But even if I would disable these
 ports, I still want to use ftp, smtp and telnet only for my local network.

if you don't know why your running them you don't need them.  simple
as that.  

-- 
Ethan Benson
http://www.alaska.net/~erbenson/


pgp5Z9Fm0eHOU.pgp
Description: PGP signature


Re: rlinetd security

2001-06-18 Thread Tim Haynes
Ethan Benson [EMAIL PROTECTED] writes:

 On Mon, Jun 18, 2001 at 10:53:06AM +0200, Sebastiaan wrote:
  Yes, that is a good question. I do not know where most of them are used
  for, but because they are always installed, I assumed that these are
  needed for correct system operation. But even if I would disable these
  ports, I still want to use ftp, smtp and telnet only for my local network.
 
 if you don't know why your running them you don't need them.  simple
 as that.  

Word of warning to Sebastian: I've missed the start of this thread,
obviously, but how much do you trust your LAN? If it's a home affair, don't
worry so much; if it's a corporate LAN, you'll always have *insiders*
sniffing networks, remembering your passwords, being sacked and feeling
disenchanted with you.
Avoid ftp  telnet, and any other plain-text protocol, as much as humanly
possible. (We don't run them in-house here, on the grounds that we find ssh
 scp  rsync *more convenient* anyway. Maybe that's just us... ;)

~Tim
-- 
   10:08:32 up 3 days, 14:12, 11 users,  load average: 0.04, 0.03, 0.00
[EMAIL PROTECTED] |Roobarb and Custard let fly
http://piglet.is.dreaming.org |with their secret weapon.



RE: strange flickering ports

2001-06-18 Thread Michael R. Schwarzbach
 
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi

there are known bugs like this in nmap. But this should only apear
when using nmap local.

Michael Schwarzbach
 
+--+
|  /\ |
|  \ / |
|   X  ASCII RIBBON CAMPAIGN - AGAINST HTML MAIL   |
|  / \ |
`~~'
  

 -Original Message-
 From: John Ferlito [mailto:[EMAIL PROTECTED]
 Sent: Montag, 18. Juni 2001 09:21
 To: Sebastiaan
 Cc: [EMAIL PROTECTED]; debian-security@lists.debian.org
 Subject: Re: strange flickering ports
 
 
 On Mon, Jun 18, 2001 at 09:14:54AM +0200, Sebastiaan wrote:
  Hi...
  
  I have a box with something listening to flickering ports. 
  nmap reports various random ports open from run to run.  I can't
  telnet to them and ID w/ netstat, because they're gone the
  instant nmap finds them.
  Hi,
 
  I have this regularily too. I would like to see this explained,
  but perhaps it is just an error in nmap?
 
 I've seen this too. My inital guess was that these were incoming
 ftp ports from active ftp sessions but that didn't really make
 sense on this particular box. Then I think I upgraded nmap and the
 problem seemed to go away.
 
 
  Greetz,
  Sebastiaan
 
 
 
 
  --
NT is the OS of the future. The main engine is the 16-bit
  Subsystem 
(also called MS-DOS Subsystem). Above that, there is the
  windoze 95/98 
16-bit Subsystem. Anyone can see that 16+16=32, so windoze NT
  is a 
*real* 32-bit system.
 
 
 
  --
  To UNSUBSCRIBE, email to [EMAIL PROTECTED]
  with a subject of unsubscribe. Trouble? Contact
 [EMAIL PROTECTED]
 
 --
 John Ferlito
 Senior Engineer - Bulletproof Networks
 ph: +61 (0) 410 519 382
 http://www.bulletproof.net.au/
 
 
 --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact
 [EMAIL PROTECTED]

-BEGIN PGP SIGNATURE-
Version: PGPfreeware 7.0.3 for non-commercial use http://www.pgp.com

iQA/AwUBOy3PWAUqVktPGYHYEQJhuwCgsyj+4xlsY4NXApioM6oQ40fCWW8AoOMW
SdtJmumTCipJ8HfmQGIuaLDQ
=S+q1
-END PGP SIGNATURE-



Re: A question about Knark and modules

2001-06-18 Thread Philipp Schulte
On Mon, Jun 18, 2001 at 12:35:13AM -0800, Ethan Benson wrote: 

 chattr +i and +a cannot be set or removed if CAP_LINUX_IMMUTABLE is
 removed from the bounding set.  however that does not prevent root
 from messing with /dev/hda* directly, niether does CAP_SYS_RAWIO.  
 
 there is no capability that allows you to deny root access to the raw
 block devices, so removing the immutable bit is trivially easy. 

Ok, so just do make sure: http://www.lids.org/lids-howto/node53.html
is claiming that CAP_SYS_RAWIO allows access to raw block devices.
Does LIDS change the behaviour of the cap or are they claiming
something wrong?
BTW: Are there any proof of concept for this vulnerability?
Regards,
Phil



(no subject)

2001-06-18 Thread Frederick Houdmont
unsubscribe



Re: A question about Knark and modules

2001-06-18 Thread Ethan Benson
On Mon, Jun 18, 2001 at 12:43:41PM +0200, Philipp Schulte wrote:
 On Mon, Jun 18, 2001 at 12:35:13AM -0800, Ethan Benson wrote: 
 
  chattr +i and +a cannot be set or removed if CAP_LINUX_IMMUTABLE is
  removed from the bounding set.  however that does not prevent root
  from messing with /dev/hda* directly, niether does CAP_SYS_RAWIO.  
  
  there is no capability that allows you to deny root access to the raw
  block devices, so removing the immutable bit is trivially easy. 
 
 Ok, so just do make sure: http://www.lids.org/lids-howto/node53.html
 is claiming that CAP_SYS_RAWIO allows access to raw block devices.

they are mistaken.

 Does LIDS change the behaviour of the cap or are they claiming
 something wrong?

they do make all sorts of change to the kernel since the current
capability bounding set isn't complete enough to accomplish anything
that can't be trivally undone by moving stuff around the filesystem
and rebooting once.  

the trouble with lids, or more so the ideas they go with is you break
your system so badly that it becomes impossible to administer,
certianly impossible to admin remotely.  the cost is too high IMO.  

 BTW: Are there any proof of concept for this vulnerability?

which? the /dev/mem restoration of the capability bounding set, or
removing chattr +i even when CAP_LINUX_IMMUTABLE is removed?  for the
latter i have a script that does it.  for the former not that i know
of, but if i were better at C i think i could put one together in an
hour or less, here is the explanation:

http://www.netcom.com/~spoon/lcap/bugtraq.txt

-- 
Ethan Benson
http://www.alaska.net/~erbenson/


pgpGI22VOG8ID.pgp
Description: PGP signature


Re: A question about Knark and modules

2001-06-18 Thread Philipp Schulte
On Mon, Jun 18, 2001 at 03:52:46AM -0800, Ethan Benson wrote: 

 On Mon, Jun 18, 2001 at 12:43:41PM +0200, Philipp Schulte wrote:
  Ok, so just do make sure: http://www.lids.org/lids-howto/node53.html
  is claiming that CAP_SYS_RAWIO allows access to raw block devices.
 
 they are mistaken.

Well, somebody should tell them ;)

  BTW: Are there any proof of concept for this vulnerability?
 
 which? the /dev/mem restoration of the capability bounding set, or
 removing chattr +i even when CAP_LINUX_IMMUTABLE is removed?  for the
 latter i have a script that does it. 

Yes, I would be really interested in this script. Do you have an URL
or could send it to me?
Some of our servers use lcap and some files are +i or +a. So far I
thought that CAP_SYS_RAWIO would prevent some of the mentioned
problems but obviously I was wrong.
Thanks for the information,
Phil



RE: rlinetd security

2001-06-18 Thread Pat Moffitt
That makes a lot of assumptions about my (or anyone else) understanding of
the system.  For example, I have no clue what discard is used for.  So, how
do I know if I have a package installed that will not work properly if I
disable that port.  Yes, I should go and research the issue but I only have
some much time in the day.

Therefor, many of us are forced to make the same assumptions (valid or not)
such as Sebastiaan's.

Pat Moffitt
MIS Administrator
Western Recreational Vehicles, Inc.


 -Original Message-
 From: Ethan Benson [mailto:[EMAIL PROTECTED]
 Sent: Monday, June 18, 2001 1:57 AM
 To: debian-security@lists.debian.org
 Subject: Re: rlinetd security


 On Mon, Jun 18, 2001 at 10:53:06AM +0200, Sebastiaan wrote:
  Yes, that is a good question. I do not know where most of them are used
  for, but because they are always installed, I assumed that these are
  needed for correct system operation. But even if I would disable these
  ports, I still want to use ftp, smtp and telnet only for my
 local network.

 if you don't know why your running them you don't need them.  simple
 as that.



Re: rlinetd security

2001-06-18 Thread Tim Haynes
Pat Moffitt [EMAIL PROTECTED] writes:

 That makes a lot of assumptions about my (or anyone else) understanding
 of the system. For example, I have no clue what discard is used for. So,
 how do I know if I have a package installed that will not work properly
 if I disable that port. Yes, I should go and research the issue but I
 only have some much time in the day.
 
 Therefor, many of us are forced to make the same assumptions (valid or
 not) such as Sebastiaan's.

Ethan is correct. 

Start from `the more ports you leave open, the greater chance you have of
being cracked' and work up.

ISTR the standard inetd services including discard, echo, sysstat, netstat
et all *have* *had* their known vulnerabilities before now. All long-since
patched, but that's not to say there won't be another tomorrow.

Again, if you don't know why you need it, you don't need it.

~Tim
-- 
   17:16:07 up 3 days, 21:20, 16 users,  load average: 0.13, 0.09, 0.02
[EMAIL PROTECTED] |Sometimes you're the pigeon,
http://piglet.is.dreaming.org |Sometimes you're the statue.



Re: A question about Knark and modules

2001-06-18 Thread Christian Jaeger

At 5:55 Uhr +0200 18.6.2001, Ethan Benson wrote:

On Mon, Jun 18, 2001 at 03:03:06AM +0200, Christian Jaeger wrote:
  ... install some special binaries to which you
  grant many permissions.

the thing is once you make exceptions for the system adminsistrator to
use to maintain the you open the holes the attacker needs to trojan
your system and to remove the additional obsticales you installed. 

system adminsitrator == root
cracker == root

you can't trust one without trusting the other.


Well, if the 'apt-get update  apt-get upgrade' wrapper doesn't take
any input and resets the environment (is there anything else it
should take care of?) then even if called by the cracker it wouldn't
do anything else than upgrade the system the same way upgrades were
happening anyway before the breakin. (Ok, there may be an issue with
the changing inode numbers lids is depending upon and which would not
get updated immediately after upgrading software.)

And/or if I install a special shell binary that has capabilities to
access the whole filesystem, but exits immediately unless called by
sshd, then system administrators still can just login as root and do
what they are used to do, without risking a hacker using the same
tool because he (probably) didn't use sshd to gain access to the
machine. (Of course, this requires 1. sshd not having a problem, and
2. making sure depending files like /etc/shadow, pam etc are
protected, but that's what lids people propagate anyway).

Am I wrong?

Of course if lids in fact can't deny access to disk devices then
probably all is lost...

Christian.



Re: rlinetd security

2001-06-18 Thread Sebastiaan
On 18 Jun 2001, Tim Haynes wrote:

 Pat Moffitt [EMAIL PROTECTED] writes:
 
  That makes a lot of assumptions about my (or anyone else) understanding
  of the system. For example, I have no clue what discard is used for. So,
  how do I know if I have a package installed that will not work properly
  if I disable that port. Yes, I should go and research the issue but I
  only have some much time in the day.
  
  Therefor, many of us are forced to make the same assumptions (valid or
  not) such as Sebastiaan's.
 
 Ethan is correct. 
 
 Start from `the more ports you leave open, the greater chance you have of
 being cracked' and work up.
 
 ISTR the standard inetd services including discard, echo, sysstat, netstat
 et all *have* *had* their known vulnerabilities before now. All long-since
 patched, but that's not to say there won't be another tomorrow.
 
 Again, if you don't know why you need it, you don't need it.
 
I know you are right, but I have become curious now: if everyone says that
you do not need them, then where are they used for? And why are they still
installed by default?

Thanks,
Sebastiaan




Re: rlinetd security

2001-06-18 Thread Tim Haynes
Sebastiaan [EMAIL PROTECTED] writes:

[snip]
  Again, if you don't know why you need it, you don't need it.

 I know you are right, but I have become curious now: if everyone says
 that you do not need them, then where are they used for? And why are they
 still installed by default?

Good questions.

a) echo is just there to duplicate everything you send back at you.
   discard is just there to dump everything in the sink.
   chargen is to give a continual stream of output, eg bandwidth testing
   daytime is to give another box a snapshot of the time on here - a crude
ancient  horrible way to sync boxes
   netstat is to give a view of `netstat' over the 'net - remote admin?

b) they shouldn't be. You'll have to check if they still appear by default
in unstable; I should hope they don't. (There's been discussion of this
before if you trawl some archives somewhere.) It's possible to use them all
legitimately - e.g. the daytime thing might be if someone has a legacy
setup on their LAN and relied on it for time sync, the chargen/echo/discard
things could well be useful for getting streams of data and network
monitoring, etc. However, they really shouldn't be enabled by default.

~Tim
-- 
All I see, All I know   |[EMAIL PROTECTED]
Is touching the sacred earth|http://spodzone.org.uk/
And warming the hallowed ground |



Re: rlinetd security

2001-06-18 Thread Noah Meyerhans
On Mon, Jun 18, 2001 at 06:35:03PM +0100, Tim Haynes wrote:
 b) they shouldn't be. You'll have to check if they still appear by default
 in unstable; I should hope they don't. (There's been discussion of this
 before if you trawl some archives somewhere.) It's possible to use them all
 legitimately - e.g. the daytime thing might be if someone has a legacy
 setup on their LAN and relied on it for time sync, the chargen/echo/discard
 things could well be useful for getting streams of data and network
 monitoring, etc. However, they really shouldn't be enabled by default.

Why not?  You've not given any reason at all.  Do you know of any
malicious behavior that is made possible by leaving the services turned
on?  The potential exists to use the chargen feature as a part of a DoS
attack, but I've not heard of it ever being used as it's not
particularly effective unless you have many many machines available, and
even then there are much more effective weapons.  And what about the
rest of the ports?  How are they dangerous?  I've never heard of an
exploit involving any of them.

Really I'm just playing devil's advocate here.  I don't care if they're
turned off or not.  I've just never seen any evidence that there's any
reason for concern over them.

noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 



pgp1434Zdbbvy.pgp
Description: PGP signature


Re: gnupg problem

2001-06-18 Thread Thomas Bushnell, BSG
Wichert Akkerman [EMAIL PROTECTED] writes:

 Installing mailcrypt on security.debian.org would immediately suggest
 that mailcrypt itself has a security problem, which is not true.
 It's a bit of a catch 22.

Well, this is a general problem then, which the security team should
think about.  The fact that mailcrypt is in contrib means it's a
little less important in this particular case, but nontheless, it's a
real problem.

Debian is about a *distribution* and not a random assemblage of
.deb's.  The security team exists to support the rapid response to
security needs for the *distribution*, and not just one package.

So my premise is that a user who tracks stable and security should
benefit from security fixes.  When the security team does what was
done with gnupg, the *distribution* has not gotten decent security
support, even if one package has.

Perhaps one solution is to split the security archive into two pieces;
one for the actual packages that have security holes, and another for
other packages that must be installed on a stable system in order to
take advantage or otherwise use fully the former.

Thomas





Re: gnupg problem

2001-06-18 Thread Thomas Bushnell, BSG
Ethan Benson [EMAIL PROTECTED] writes:

 gnupg is installable, if you remove mailcrypt.  ;-)

As explained in my previous mail, that is only adequate if the
security team exists to support security in packages, but not the
distribution as a whole. 



Re: rlinetd security

2001-06-18 Thread Vineet Kumar
I'm not adding anything new to this thread, only reiterating for those
who seem to have missed previous reiterations:

'The more ports you leave open, the greater chance you have of being
cracked.'

'If you don't know why you need it, you don't need it.'

It seems reasonable that the default installation should try to make
itself useful to the average target user. Now, by a show of hands
(rather than a string of replies), how many of us have sat down at our
newly-installed machines and said All right, time to get my discard
service on! Let's follow that up with a little chargen, while we're at
it! They may be legitimate services with legitimate uses, but are not
needed in the normal case, and as such, should not be activated in the
default case.

The argument below is pretty bad. Have you ever heard of anybody
actually getting impaled by holding a sword poised at his belly and
walking into grand central station at 5:00pm going 'scuse me, pardon
me, 'scuse me, pardon *GGUAGHGH!*? I sure haven't. So why not do it?
Our hypothetical late friend didn't need to be doing it, and he
shouldn't have been doing it. 

...which brings me to my next point: just because I've never heard of
such a ridiculous demise actually occuring doesn't rule out the
possibility that it has. And just because you haven't heard of
exploits involving these services doesn't mean they haven't been
around. Again, a reiteration of wiser words earlier in the thread:

the standard inetd services including discard, echo, sysstat,
netstat et al all *have* *had* their known vulnerabilities before now.
All long-since patched, but that's not to say there won't be another
tomorrow.

Vineet

* Noah Meyerhans ([EMAIL PROTECTED]) [010618 10:51]:
 Why not?  You've not given any reason at all.  Do you know of any
 malicious behavior that is made possible by leaving the services turned
 on?  The potential exists to use the chargen feature as a part of a DoS
 attack, but I've not heard of it ever being used as it's not
 particularly effective unless you have many many machines available, and
 even then there are much more effective weapons.  And what about the
 rest of the ports?  How are they dangerous?  I've never heard of an
 exploit involving any of them.
 
 Really I'm just playing devil's advocate here.  I don't care if they're
 turned off or not.  I've just never seen any evidence that there's any
 reason for concern over them.
 
 noah
 
 -- 
  ___
 | Web: http://web.morgul.net/~frodo/
 | PGP Public Key: http://web.morgul.net/~frodo/mail.html 
 




pgpo1zzoxfxVx.pgp
Description: PGP signature


[no subject]

2001-06-18 Thread Brett Miller
unsubscribe



Re: rlinetd security

2001-06-18 Thread Tim Haynes
Noah Meyerhans [EMAIL PROTECTED] writes:

 On Mon, Jun 18, 2001 at 06:35:03PM +0100, Tim Haynes wrote:
  b) they shouldn't be. You'll have to check if they still appear by
  default
[snip]
 
 Why not? You've not given any reason at all. Do you know of any malicious
 behavior that is made possible by leaving the services turned on? 

I don't need to, as my point earlier included `you don't know there won't
be a vulnerability tomorrow'.

But that said, I gather leaking one's timestamp is not a good thing
(leaking *anything* is not really any good). I'm no Kerberos user, but I
heard you can do time-dependent auth in that a given ticket is good until
whenever. I wouldn't want someone to know exactly what time my boxes
thought it was.

 The potential exists to use the chargen feature as a part of a DoS
 attack, but I've not heard of it ever being used as it's not particularly
 effective unless you have many many machines available, and even then
 there are much more effective weapons.

http://www.sans.org/infosecFAQ/malicious/naptha.htm, btw. Why bother
hooking /dev/{zero,null} onto the net with netcat when you can cause a fair
bit of traffic with standard services that do much the same thing?

 Really I'm just playing devil's advocate here. I don't care if they're
 turned off or not. I've just never seen any evidence that there's any
 reason for concern over them.

There doesn't have to be a reason for concern for you to not want them
available. I don't want anyone so much as fingerprinting my box (given that
nmap relies mostly on TCP responses to guage OS), let alone doing anything
really interesting with it.

~Tim
-- 
The light of the world keeps shining,   |[EMAIL PROTECTED]
Bright in the primal glow   |http://spodzone.org.uk/



Re: rlinetd security

2001-06-18 Thread Noah L. Meyerhans
On Mon, Jun 18, 2001 at 11:08:49AM -0700, Vineet Kumar wrote:
 The argument below is pretty bad. Have you ever heard of anybody
 actually getting impaled by holding a sword poised at his belly and
 walking into grand central station at 5:00pm going 'scuse me, pardon
 me, 'scuse me, pardon *GGUAGHGH!*? I sure haven't. So why not do it?
 Our hypothetical late friend didn't need to be doing it, and he
 shouldn't have been doing it. 

Huh?  You've acknowledged that there may be legitimate uses for the
simple services that you may be ignorant of.  I don't think there is any
legitimate gain to be had be running around a crowded area with a blade
against your belly.

 the standard inetd services including discard, echo, sysstat,
 netstat et al all *have* *had* their known vulnerabilities before now.
 All long-since patched, but that's not to say there won't be another
 tomorrow.
 

Have you looked at their code?  I can assure you that there is no
potential for remote exploit in 
void
discard_stream(int s, struct servtab *sep)
{
char buffer[BUFSIZE];

setproctitle(sep-se_service, s);
while ((errno = 0, read(s, buffer, sizeof(buffer))  0) ||
errno == EINTR)
;
exit(0);
}

Or how 'bout this:
/* Return human-readable time of day */
void
daytime_stream(int s, struct servtab *sep)
{
char buffer[256];
time_t clocc;

(void)sep;

clocc = time(NULL);
snprintf(buffer, sizeof(buffer), %.24s\r\n, ctime(clocc));
write(s, buffer, strlen(buffer));
}

These services are so simple that any moderately knowledgeable coder can
ensure that there is no risk to leaving the services turned on.

noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 



pgp4hkG0LGaVt.pgp
Description: PGP signature


Re: gnupg problem

2001-06-18 Thread Petr Cech
On Mon, Jun 18, 2001 at 10:55:04AM -0700 , Thomas Bushnell, BSG wrote:
 Debian is about a *distribution* and not a random assemblage of

OK, distribution. That's dists/potato/main/binary-arch/Packages 

Petr Cech
-- 
Debian GNU/Linux maintainer - www.debian.{org,cz}
   [EMAIL PROTECTED]

Try: cat /dev/urandom | perl



Re: rlinetd security

2001-06-18 Thread Noah L. Meyerhans
On Mon, Jun 18, 2001 at 07:25:37PM +0100, Tim Haynes wrote:
 But that said, I gather leaking one's timestamp is not a good thing
 (leaking *anything* is not really any good). I'm no Kerberos user, but I
 heard you can do time-dependent auth in that a given ticket is good until
 whenever. I wouldn't want someone to know exactly what time my boxes
 thought it was.

So I assume you stay very clear of any kind of time synchronization
(ntpd and the like).  In order for things like Kerberos to work (BTW, I
am a kerberos user) the client machines have to be very closely
synchronized with the authentication server.  NTP is how this is done.
Giving out your time via either the daytime or time simple service is
not giving out any info that's not already available to anybody who
cares to look.

  The potential exists to use the chargen feature as a part of a DoS
  attack, but I've not heard of it ever being used as it's not particularly
  effective unless you have many many machines available, and even then
  there are much more effective weapons.
 
 http://www.sans.org/infosecFAQ/malicious/naptha.htm, btw. Why bother
 hooking /dev/{zero,null} onto the net with netcat when you can cause a fair
 bit of traffic with standard services that do much the same thing?

Yes, but you know what?  'ping -f' works just as good, if not better.
Do you have ICMP filtered at your router?


-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 



pgpHBQyrZ4Pyt.pgp
Description: PGP signature


RE: rlinetd security

2001-06-18 Thread Pat Moffitt
 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf
 Of Tim Haynes
 Sent: Monday, June 18, 2001 10:35 AM
 To: Sebastiaan
 Cc: Tim Haynes; [EMAIL PROTECTED]; debian-security@lists.debian.org
 Subject: Re: rlinetd security


 Sebastiaan [EMAIL PROTECTED] writes:

 [snip]
   Again, if you don't know why you need it, you don't need it.
 
  I know you are right, but I have become curious now: if everyone says
  that you do not need them, then where are they used for? And
 why are they
  still installed by default?

 Good questions.

 a) echo is just there to duplicate everything you send back at you.
discard is just there to dump everything in the sink.
chargen is to give a continual stream of output, eg bandwidth testing
daytime is to give another box a snapshot of the time on here - a crude
 ancient  horrible way to sync boxes
netstat is to give a view of `netstat' over the 'net - remote admin?
[snip]

Now that answers some questions.  Much better.  At least when I turn them
off I will have a clue about what might break.

BTW, my philosophy on disabling unknown services/ports has been to disable
it and see if anything breaks.  If something breaks, then figure out what to
do about it.  But, this can be a tough philosophy on production machines.
(No, I don't have machines that I can test with here.  Nor do I have the
time to set them up.)

The concept of 'if you don't know why your running them you don't need
them.' may be good advice but doesn't help those of use that are trying to
understand Security.

Pat Moffitt
MIS Administrator
Western Recreational Vehicles, Inc.




Re: rlinetd security

2001-06-18 Thread Tim Haynes
Noah L. Meyerhans [EMAIL PROTECTED] writes:

 On Mon, Jun 18, 2001 at 11:08:49AM -0700, Vineet Kumar wrote:

  The argument below is pretty bad. Have you ever heard of anybody
  actually getting impaled by holding a sword poised at his belly and
  walking into grand central station at 5:00pm going 'scuse me, pardon
  me, 'scuse me, pardon *GGUAGHGH!*? I sure haven't. So why not do it? 
  Our hypothetical late friend didn't need to be doing it, and he
  shouldn't have been doing it.
 
 Huh? You've acknowledged that there may be legitimate uses for the simple
 services that you may be ignorant of. I don't think there is any
 legitimate gain to be had be running around a crowded area with a blade
 against your belly.

The point is that these things can be used for good or evil. If you're not
going to use it for good, whether someone else can or not, a nasty chap can
still use it for evil.

You realise rpc.statd has its uses, as does ftpd? Is that some reason to
enable them `just in case somebody wants to use them for legitimate
reasons'?
 
  the standard inetd services including discard, echo, sysstat, netstat
  et al all *have* *had* their known vulnerabilities before now. All
  long-since patched, but that's not to say there won't be another
  tomorrow.
 
 Have you looked at their code?  I can assure you that there is no
 potential for remote exploit in 
 void
 discard_stream(int s, struct servtab *sep)
[snip]

 These services are so simple that any moderately knowledgeable coder can
 ensure that there is no risk to leaving the services turned on.

There isn't? What about in your choice of C-library, then, have you audited
that? 
While you're here, what tweaks are going to be made to these functions next
week?

The principle is still the same. It's not enough to ask whether you need it
or not and assume something can be left on if you don't know any better; if
another vulnerability comes out you have to check one more thing to see
whether it's relevant or not, which is a waste of time, at best, and an
omitted necessary update to an unused service (unused, until someone scans
you for it, that is) at worst.

Incidentally, in your dismissal of exploits for these things, you're
neglecting another scenario: black-hat *does* manage to crack another box
in the organization, and points multiple netcats from the exploited box at
someone with echo: you'll end up with enough network traffic  load to
cause a slow-down, and the traffic may possibly help him mask very nasty
activities in the noise.

~Tim
-- 
All I see, All I know   |[EMAIL PROTECTED]
Is touching the sacred earth|http://spodzone.org.uk/
And warming the hallowed ground |



  1   2   >