Re: A question about Knark and modules

2001-06-19 Thread Ben Harvey
On Sun, Jun 17, 2001 at 07:55:40PM -0800, Ethan Benson wrote:
 
 a bit.  lids makes system adminsitration utterly impossible.  unless
 you leave enough holes open which an attacker can use to bypass it
 all. 
well nearly...
at least you can prevent new or unknown process/files from acessing stuff. 
If there is an exploit for an existing piece of software you are back at 
square one.

The advantage is extremely granular control: a program at a specific inode
can be given capabilities while everything else has them refused.

the disadvantage is that you end up with a million little holes (complexity)
fortunately the files that have these added capabilities are also 
protected (from trojaning - buffer overruns etc still work)

 
 the thing is once you make exceptions for the system adminsistrator to
 use to maintain the you open the holes the attacker needs to trojan
 your system and to remove the additional obsticales you installed.  

yes it is possible with lids, but it is a _lot_ harder:
processes can be hidden.
binaries RO (trojaning is difficult)
logs append 
/etc/somefile can only be read when you allow it. 

 
 system adminsitrator == root
 cracker == root
 
cracker==root sysadmin==root+LIDS_password
if someone can sniff me typing in my lids password (encrypted in the kernel)
then I am stuffed.

In short Lids can be a pain to set up, but would also be a pain to crack,
especially if the cracker doesn't know exactly which rules I have set up.
a good cracker could do it.

btw I notice that they are still working on fork bomb protection. that would
be nice :)

-- 



Re: A question about Knark and modules

2001-06-18 Thread Ben Harvey

On Sun, Jun 17, 2001 at 07:55:40PM -0800, Ethan Benson wrote:
 
 a bit.  lids makes system adminsitration utterly impossible.  unless
 you leave enough holes open which an attacker can use to bypass it
 all. 
well nearly...
at least you can prevent new or unknown process/files from acessing stuff. 
If there is an exploit for an existing piece of software you are back at 
square one.

The advantage is extremely granular control: a program at a specific inode
can be given capabilities while everything else has them refused.

the disadvantage is that you end up with a million little holes (complexity)
fortunately the files that have these added capabilities are also 
protected (from trojaning - buffer overruns etc still work)

 
 the thing is once you make exceptions for the system adminsistrator to
 use to maintain the you open the holes the attacker needs to trojan
 your system and to remove the additional obsticales you installed.  

yes it is possible with lids, but it is a _lot_ harder:
processes can be hidden.
binaries RO (trojaning is difficult)
logs append 
/etc/somefile can only be read when you allow it. 

 
 system adminsitrator == root
 cracker == root
 
cracker==root sysadmin==root+LIDS_password
if someone can sniff me typing in my lids password (encrypted in the kernel)
then I am stuffed.

In short Lids can be a pain to set up, but would also be a pain to crack,
especially if the cracker doesn't know exactly which rules I have set up.
a good cracker could do it.

btw I notice that they are still working on fork bomb protection. that would
be nice :)

-- 


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]