Re: [despammed] Re: Secure remote syslogging?

2003-05-01 Thread Adam Lydick
You could hardcode the MAC using static arp entries. Also, you could
just broadcast on the logger interface (which doesn't require an ARP
lookup, it just uses the broadcast MAC).

My concerns with this approach (although I like the sound of it) is that
it might fsck up your media detection (eg: is the cable plugged in?)
which I think some cards do. I'm also pretty sure this doesn't work with
100Mb.

Alternatives: (the traditional line printer was already mentioned), any
sort of write-only media will do the trick (eg: CD-RW). You might have
to flush batches of log entries to the CD for it to work. I'm not sure
what min packet size on UDF FS is.

There are probably other cool tricks you could employ.

Adam
 

On Tue, 2003-04-29 at 06:30, Ed McMan wrote:
> Tuesday, April 29, 2003, 8:54:51 AM, Sam Couter (Sam) wrote:
> 
> Sam> Stefan Neufeind <[EMAIL PROTECTED]> wrote:
> >> what is the best way to remotely syslog? In
> 
> Sam> Use a dedicated machine. Cut the 'transmit' pair in the CAT5 cable.
> Sam> syslog is UDP, which is only one-way, so it doesn't need to transmit.
> 
> Wouldn't the machine still need to transmit some things, namely arp?
> 
> --
> | Eddie J Schwartz <[EMAIL PROTECTED]|m00.net]> |
> |  AIM: Uncaring Eyes ICQ: 35576339 YHOO: edmcman2   |
> |  "We Trills have an expression -- at forty, you|
> |  think you know everything. At four hundred you|
> |  realize you know nothing." - Dax, Startrek DS9|
> --
> 
> 
> 
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 




mgetty vulnerable?

2003-05-01 Thread Drew Scott Daniels
I don't know whether potato, woody, sarge and sid should have a security
bug filed against them.

According to http://packages.qa.debian.org/m/mgetty.html sid has version
1.1.30-1, sarge has version 1.1.28-5, and woody has version 1.1.27-4.1.
Note that Debian packages contain changes. I have not looked to see if
these changes might fix the issues, but they should be visible in the
http://saens.debian.org/debian/pool/main/m/mgetty/ directory as the
*.diff.gz files.

Note that it looks like potato contains mgetty 1.1.21-3potato1 which is a
version of mgetty that contains a security fix that fixes the "Immunix
reports that mgetty does not create temporary files in a secure manner,
which could lead to a symlink attack." bug. I'd imagine this change would
have been incorporated in later versions.

The changelog for version 1.1.23-3 says:
mgetty (1.1.21-3) stable; urgency=low

  * make mgetty-fax's postinst create /var/spool/fax/outgoing/.last_run
to close a potential symlink exploit by members of the fax group
that is otherwise possible until that file is created

 -- Philip Hands <[EMAIL PROTECTED]>  Thu, 31 Aug 2000 19:05:13 +0100
I can't see a changelog for version 1.1.23-3potato1, so maybe this is the
diff file for that.

http://search.alphanet.ch/cgi-bin/search.cgi?msgid=20021125142338.E12094%40greenie.muc.de&max_results=1&type=long&domain=ml-mgetty
says:
[...]
Security fixes / concept changes:

 * it's now possible to run faxrunq/faxrunqd (and thus sendfax) as
   non-root user

 * fax spool directories are no longer world-writeable, access is done
   via a suid helper program (suid to a special user ID, "fax")

 * possible buffer overrun when calling cnd-program (if CallerName is
   too long)

 * $CALLER_ID, $CALLER_NAME and so on are sanitized before passing to shell
   (all quote characters and all non-printable characters are replaced by " ")
[...]
Who should upgrade?

 * everbody who is using faxspool/faxrunq on a machine that is shared
   with other users that are not 100 per cent trustworthy

 * vgetty users with V.253 modems


Distribution vendors:

 - I strongly urge you to upgrade to 1.1.29 - older versions are NOT safe
   if there are malicious users on the system and faxrunq/faxrunqd are in
   use.

 - The fax queue handling (faxspool, faxq-helper) needs a new user ID
   now ("fax") which MUST own the fax queue directories and SHOULD NOT
   own anything else.  The user ID is configured in the Makefile.

 - faxrunq/faxrunqd can run as user "fax", but in that case the user
   needs access to the modem devices (via his primary group id).

   Watch out for log file access permissions if this is used!


If anything is unclear, *please* talk to me before rolling out updated
packages that might break things in funny ways.
[...]

Please don't mail [EMAIL PROTECTED] until you are reasonably cetain
potato or woody are vulnerable.

 Drew Daniels



Re: Injectso to help with libc upgrades?

2003-05-01 Thread David B Harris
On Thu, 1 May 2003 18:34:17 +1000
Joshua Goodall <[EMAIL PROTECTED]> wrote:
> More debianish would be some kind of additional dependency analyser
> that would restart afflicated daemons on your behalf.

/usr/bin/checkrestart in debian-goodies :)


pgpwg3HQTonYM.pgp
Description: PGP signature


Re: Injectso to help with libc upgrades?

2003-05-01 Thread Andrew Pimlott
On Wed, Apr 30, 2003 at 12:07:33PM -0500, Drew Scott Daniels wrote:
> http://packetstorm.linuxsecurity.com/filedesc/injectso-0.2.1.tar.html
> describes injectso, "a tool that can be used to inject shared libraries
> into running processes on Linux (x86/IA32 and Sparc)...".
> 
> Maybe I misunderstand, but might it not be also possible to use this to
> inject replacements for shared libraries too?

Not reliably.  Even if you can replace the code in the process's
memory space, what if some data structures have changed and the
program already has some objects allocated?  There are doubtless
other issues as well (what if the old code is still in a cache?).

I'm sure you could concoct something that works "almost all" the
time, given some restrictions, like no changes to data structures.
But I almost guarantee that the security team will say 1) we don't
have time to verify the restrictions, and 2) "almost all" isn't good
enough.

Andrew

PS.  Your Mail-Followup-To: header should include the list address.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Injectso to help with libc upgrades?

2003-05-01 Thread Andrew Pimlott
On Wed, Apr 30, 2003 at 12:07:33PM -0500, Drew Scott Daniels wrote:
> http://packetstorm.linuxsecurity.com/filedesc/injectso-0.2.1.tar.html
> describes injectso, "a tool that can be used to inject shared libraries
> into running processes on Linux (x86/IA32 and Sparc)...".
> 
> Maybe I misunderstand, but might it not be also possible to use this to
> inject replacements for shared libraries too?

Not reliably.  Even if you can replace the code in the process's
memory space, what if some data structures have changed and the
program already has some objects allocated?  There are doubtless
other issues as well (what if the old code is still in a cache?).

I'm sure you could concoct something that works "almost all" the
time, given some restrictions, like no changes to data structures.
But I almost guarantee that the security team will say 1) we don't
have time to verify the restrictions, and 2) "almost all" isn't good
enough.

Andrew

PS.  Your Mail-Followup-To: header should include the list address.



Re: Injectso to help with libc upgrades?

2003-05-01 Thread Joshua Goodall
On Thu, 1 May 2003 03:07 am, Drew Scott Daniels wrote:
> http://packetstorm.linuxsecurity.com/filedesc/injectso-0.2.1.tar.html
> describes injectso, "a tool that can be used to inject shared libraries
> into running processes on Linux (x86/IA32 and Sparc)...".
>
> Maybe I misunderstand, but might it not be also possible to use this to
> inject replacements for shared libraries too?

I don't think I'd want to leave such a tool lying around on my production 
servers :}

More debianish would be some kind of additional dependency analyser that would 
restart afflicated daemons on your behalf.

J


pgp2zUVeXS32a.pgp
Description: signature