Re: Linux Virus

2001-04-05 Thread Robert L. Yelvington
http://www.securityfocus.com/ there's a link on the main page regarding
latest linux worm

and

http://www.sans.org/y2k/adore.htm

-thx, robt

Shawn Garbett wrote:
> 
> Whoops,  using a Microsoft Windows box with Netscape here at work,
> ugh. Had to fight the @[EMAIL PROTECTED] box just to give me the correct URL:
> 
> http://www.msnbc.com/news/554789.asp
> 
> Tyrin Price wrote:
> 
> > * Shawn Garbett <[EMAIL PROTECTED]> [05Apr01 13:17 -0400]:
> >
> >> There's a new virus in town. Here's the news for the mouthpiece of
> >> Bill
> >> himself:
> >> http://www.allnetdevices.com/wired/news/2001/04/05/motorola_set.html
> >> It mentions an adorefind program, has anyone run this under
> >> Debian? Are
> >> there any recommended package upgrades to prevent these latest
> >> rounds of
> >> worms?
> >>
> > The URL above goes to an article having nothing to do with Linux.
> >



Re: Linux Virus

2001-04-03 Thread Harry Henry Gebel
On Sun, Apr 01, 2001 at 09:23:33AM +, hzi wrote: 

> When you use wvdial, you read e-mail as root, don't you? Wvdial is probably
> the most common way to set up a ppp conection, since it's suggested in the
> Debian docuemtntaion.

> So I guess my question would be how to use wvdial and still remain safe
> from "virus".

Once you sign on with wvdial all users can use the internet, so you don't
have to be logged in as root to read your email.

There is a program 'pppconfig' which I think is better than wvdial and also
makes it easy to allow users other than root to start and stop ppp
connections.

-- 
Harry Henry Gebel
West Dover Hundred, Delaware


pgpu3SpgCGy6s.pgp
Description: PGP signature


Re: Linux Virus

2001-04-01 Thread Brian May
> "Ethan" == Ethan Benson <[EMAIL PROTECTED]> writes:

Ethan> sudo with an ALL=ALL entry is just as dangerous (more so
Ethan> IMO, because it turns user passwords into multiple root
Ethan> passwords) then su.

Hopefully one day you will be able to something like this:

Obtain a Kerberos ticket for root so you can su to root without a
password, but use kernel capabilities so only trusted processes (eg. a
trusted xterm session) have access to the ticket file.

Of course you have to remember not to run untrusted processes in the
trusted xterm session (and the attack Ethan describes is still
possible unless you protect the .* files too), but I think it is a lot
better then allowing all processes access.
-- 
Brian May <[EMAIL PROTECTED]>



Re: Linux Virus

2001-04-01 Thread Ethan Benson
On Sat, Mar 31, 2001 at 11:06:31PM -0800, Karsten M. Self wrote:
> on Sat, Mar 31, 2001 at 08:45:25AM -0600, John Hasler ([EMAIL PROTECTED]) 
> wrote:
> > Ethan Benson writes:
> > > cat <> ~/.bashrc
> > > alias su='su -c ~/.virus'
> > > EOF
> > 
> > su might benefit from a configuration file that sets the permissable path
> > for -c.
> > 
> > Another possible fix might be for bash to somehow detect "gain-root"
> > commands and refuse to alias them.
> 
> Nope.
> 
> sudo provides this functionality.  'su' allows you to become an
> effective user.  To use 'su' to execute root commands, you require the
> root password.  What, exactly, are you protecting against.

my trick would work on sudo as well, at least the way most people
configure it -- by adding a line like this:

thierusername   ALL=(ALL) ALL

in which case they can use sudo to execute ANYTHING as root. so...

cat <> ~/.bashrc
alias sudo='sudo ~/.virus'
EOF

same thing as su, if the account we added this to is the admin of the
machine and they use su to gain root and perform the adminsitrative
task they needed to perform, and they just type `su' at thier command
prompt they will get a password: prompt as usual and will enter the
root password, but in reality they just executed:

su -c ~/.virus  see the su man page to see what this does.  

now if the admin does everything via sudo instead of using short su
sessions they will need a ALL=ALL line like above.  so next time they
sudo something, say:

sudo apt-get update

the shell will instead run

sudo ~/.virus

and sudo will ask the password and happily run ~/.virus as root.  

> Better, IMO, to use sudo to invoke su, and restrict rights to do so to
> specified users.

what does this buy you?  see above.  this is in fact less secure IMO,
since it turns ordinary user passwords into the root password.  if you
want to restrict who is allowed to go to root invoke the `wheel' group
policy. 

> For restricted commands access, use the tool designed for this task,
> sudo.

my point is that if the admin's account is the one getting the nice
shell alias dropped into the next time they perform an administrative
command -- however they accomplish it, either sudo or su -- they will
potentially run the virus/trojan as root.  

in the case of a ordinary user who is allowed to run ONLY a very small
handful of very safe unrootable programs via sudo this alias trick
will fail.  at least assuming you specify the absolute pathname to the
command in /etc/sudoers.  

sudo with an ALL=ALL entry is just as dangerous (more so IMO, because
it turns user passwords into multiple root passwords) then su.

-- 
Ethan Benson
http://www.alaska.net/~erbenson/


pgplj47zmgavf.pgp
Description: PGP signature


Re: Linux Virus

2001-04-01 Thread Karsten M. Self
on Sat, Mar 31, 2001 at 08:45:25AM -0600, John Hasler ([EMAIL PROTECTED]) wrote:
> Ethan Benson writes:
> > cat <> ~/.bashrc
> > alias su='su -c ~/.virus'
> > EOF
> 
> su might benefit from a configuration file that sets the permissable path
> for -c.
> 
> Another possible fix might be for bash to somehow detect "gain-root"
> commands and refuse to alias them.

Nope.

sudo provides this functionality.  'su' allows you to become an
effective user.  To use 'su' to execute root commands, you require the
root password.  What, exactly, are you protecting against.

Better, IMO, to use sudo to invoke su, and restrict rights to do so to
specified users.

For restricted commands access, use the tool designed for this task,
sudo.

-- 
Karsten M. Self http://kmself.home.netcom.com/
 What part of "Gestalt" don't you understand?   There is no K5 cabal
  http://gestalt-system.sourceforge.net/ http://www.kuro5hin.org


pgpxhUs31xNsw.pgp
Description: PGP signature


Re: Linux Virus

2001-03-31 Thread Ethan Benson
On Sat, Mar 31, 2001 at 05:54:07PM -0600, John Hasler wrote:
> Ethan Benson writes:
> > cat <> ~/.bashrc
> > export PATH="$HOME/.evil:${PATH}"
> > EOF
> 
> > and put a bogus su shell script in ~/.evil
> 
> chmod a-w ~/.bashrc ~/.bash_profile
> 
> .bashrc and .bash_profile should be read-only by default, IMHO.

yup ive done this after seeing a few security holes in things like
xchat where a url gets passed unsafely to /bin/sh allowing for crap
like above.  unfortunatly its not terribly strong protection since in
many cases its not hard for the exploit to add a chmod u+w ~/.bashrc.  

bsd has a `user immutable' bit similar to linux's immutable bit
(except users can set and remove it on files they own, bsd's system
immutable is the equivilent to linux' immutable) except this doesn't
necessarily help either since a chflags nouchg ~/.bashrc isn't any
harder then chmod u+w ~/.bashrc... 

-- 
Ethan Benson
http://www.alaska.net/~erbenson/


pgprw8caqgYr5.pgp
Description: PGP signature


Re: Linux Virus

2001-03-31 Thread John Hasler
Ethan Benson writes:
> cat <> ~/.bashrc
> export PATH="$HOME/.evil:${PATH}"
> EOF

> and put a bogus su shell script in ~/.evil

chmod a-w ~/.bashrc ~/.bash_profile

.bashrc and .bash_profile should be read-only by default, IMHO.
-- 
John Hasler
[EMAIL PROTECTED] (John Hasler)
Dancing Horse Hill
Elmwood, WI



Re: Linux Virus

2001-03-31 Thread John Hasler
hzi writes:
> When you use wvdial, you read e-mail as root, don't you?

I can't think of any reason why that follows.

> Wvdial is probably the most common way to set up a ppp conection, since
> it's suggested in the Debian docuemtntaion.

Which documentation is that?
-- 
John Hasler
[EMAIL PROTECTED]
Dancing Horse Hill
Elmwood, Wisconsin



Re: Linux Virus

2001-03-31 Thread Erik Steffl
hzi wrote:
> 
> Hi-
> 
> When you use wvdial, you read e-mail as root, don't you? Wvdial is probably 
> the most common way to set up a ppp conection, since it's suggested in the 
> Debian docuemtntaion.
> 
> So I guess my question would be how to use wvdial and still remain safe from 
> "virus".

  this does not make sense at all. you use wvdial as root to connect
(you don't have to, I guess, but let's assume you do), there's nothing
to prevent you to use that given connection to read email as different
user. notice that there are independent processes going on here:

  - network (you have to have a connection to whereever you get email
from)
  - getting of email
  - reading of email

  each of these can be done by different user and definitely by
different programs.

  your first sentence: no, there's no reason to read email as root when
you use wvdial.

  also, while wvdial might be suggested po & poff and its supporting
files are set up during configuration and for lot of users that's
enough... also gnome and kde have their own programs to start ppp so I
guess lot of people using gnome and kde use those. but that's not
realted much to the current discussion...

erik



Re: Linux Virus

2001-03-31 Thread hzi

Hi-

When you use wvdial, you read e-mail as root, don't you? Wvdial is probably the 
most common way to set up a ppp conection, since it's suggested in the Debian 
docuemtntaion.

So I guess my question would be how to use wvdial and still remain safe from 
"virus".

Thank you,

Regards,

Henry



At 10:00 PM 3/28/2001 -0500, Ben Collins wrote:

On Thu, Mar 29, 2001 at 12:55:16PM +1000, Mark Devin wrote:

Does anyone know anything further on this new W32.Winux virus.
Check out this link:
http://news.cnet.com/news/0-1003-200-5329436.html?tag=st.cn.1.lthd

Surely this virus cannot overwrite executables that require root
permission? Or can it?


No, if this virus actually exists (and I doubt its true, or even
particularly threatening), it can only affect your files. Unless you are
in the bad habit of reading email as root, and executing random
attachments manually.


At this point the virus is just a proof of concept, no payload and no 
replication existing only on the author's HD and the copy he emailled to the 
anti-viral company.

the proven concept may be used to do more interesting things.



Re: Linux Virus

2001-03-31 Thread Ethan Benson

On Sat, Mar 31, 2001 at 08:45:25AM -0600, John Hasler wrote:
> Ethan Benson writes:
> > cat <> ~/.bashrc
> > alias su='su -c ~/.virus'
> > EOF
> 
> su might benefit from a configuration file that sets the permissable path
> for -c.

interesting idea, somewhat similar to sudo, though i think sudo's PATH
handling may be broken as of late. 

> Another possible fix might be for bash to somehow detect "gain-root"
> commands and refuse to alias them.

this is somewhat weaker, it could also do the following:

cat <> ~/.bashrc
export PATH="$HOME/.evil:${PATH}"
EOF

and put a bogus su shell script in ~/.evil

-- 
Ethan Benson
http://www.alaska.net/~erbenson/


pgppUhMy5swqO.pgp
Description: PGP signature


Re: Linux Virus

2001-03-31 Thread Karsten M. Self
on Sat, Mar 31, 2001 at 07:40:45PM +0200, Roberto Diaz ([EMAIL PROTECTED]) 
wrote:
> > Like every so-called Linux virus, it requires the user to behave stupidly
> > - it's really a trojan horse.  It has the same permission rules as any
> > other program, so it can't change root-owned files, unless they are
> > world-writable or you are running as root.
> > The thing that's special about it is that it can infect both Windows and
> > Linux executables - which is really quite impressive.  Otherwise it's
> > nothing special.
> 
> What chances do we have to get a virus from a malicious .deb package
> someone had leak into debian.org?
> 
> We always run apt-get as root.. dont we?

There have recently been some changes to the deb package format,
including the ability to sign packages (a feature enabled on RPM for
some time).  I've only picked up part of the discussion, but it's a
suggestion that's been outstanding for some time.

It doesn't solve all problems, but it does tighten the holes a bit.

Someone got a pointer to the discussion?  I'll research later today.

-- 
Karsten M. Self http://kmself.home.netcom.com/
 What part of "Gestalt" don't you understand?   There is no K5 cabal
  http://gestalt-system.sourceforge.net/ http://www.kuro5hin.org


pgp4GFe9AsHE9.pgp
Description: PGP signature


Re: Linux Virus

2001-03-31 Thread John Hasler
Roberto writes:
> What chances do we have to get a virus from a malicious .deb package
> someone had leak into debian.org?

It would have to acquire the signature of a Debian developer to get into
unstable, remain dormant for at least two weeks to get into testing, and
lie dormant there until the next release in order to get into stable.
-- 
John Hasler
[EMAIL PROTECTED]
Dancing Horse Hill
Elmwood, Wisconsin



Re: Linux Virus

2001-03-31 Thread Roberto Diaz
> Like every so-called Linux virus, it requires the user to behave stupidly
> - it's really a trojan horse.  It has the same permission rules as any
> other program, so it can't change root-owned files, unless they are
> world-writable or you are running as root.
> The thing that's special about it is that it can infect both Windows and
> Linux executables - which is really quite impressive.  Otherwise it's
> nothing special.

What chances do we have to get a virus from a malicious .deb package
someone had leak into debian.org?

We always run apt-get as root.. dont we?


Regards

Roberto


Roberto Diaz <[EMAIL PROTECTED]>
http://vivaldi.ddts.net 
Powered by ddt dynamic DNS
Powered by GNU running on a Linux kernel.
Powered by Debian (The real wonder)

Concerto Grosso Op. 3/8 A minor
Antonio Vivaldi (so... do you need beautiful words?)




Re: Linux Virus

2001-03-31 Thread John Hasler
Ethan Benson writes:
> cat <> ~/.bashrc
> alias su='su -c ~/.virus'
> EOF

su might benefit from a configuration file that sets the permissable path
for -c.

Another possible fix might be for bash to somehow detect "gain-root"
commands and refuse to alias them.
-- 
John Hasler
[EMAIL PROTECTED]
Dancing Horse Hill
Elmwood, Wisconsin



Re: Linux Virus

2001-03-31 Thread Ethan Benson
On Fri, Mar 30, 2001 at 05:46:19PM -0800, Karsten M. Self wrote:
> 
> Hmm...dual-booting considered harmful.  Interesting.  
> 
> Short version being that relying on OS filesystem protections to keep
> you from mangling your system files is an invalid assumption if:
> 
>   - You're booting multiple OSs.
>   - One or more of the OSs offers filesystem access to others.
>   - The filesystem access doesn't respect user-level permissions offered
> by the host OS.
> 
> Very interesting.

the other OS need not supply its own filesystem access either.
windows and MacOS neither have a clue what ext2 is, and simply ignore
ext2 partition types (0x83 or Apple_UNIX_SVR2).  however for windows
there is a program (or used to be) which would read the raw ext2
partition and parse the filesystem on its own, making it accessable to
the windows side.  permissions are obviously not enforced.  

macos has a (rather broken) extension which allows ext2 filesystems to
mount like any other mac filesystem.  it was read-only last i checked,
and barely worked, i think the author abandoned it.  in any event it
ignored permissions as well.  (since the underlying OS has no clue
what permissions are) 

your only hope really is to only boot securable OSes, for the windows
side use NT or W2K and not 9x or ME, and be sure to configure it to be
secure (don't login to users in the administrators group, fix the
broken filesystem permissions etc)

> You're not paranoid.  They really *are* out to get you.

;-)

-- 
Ethan Benson
http://www.alaska.net/~erbenson/


pgpzeiwS5VMGt.pgp
Description: PGP signature


Re: Linux Virus

2001-03-31 Thread Ethan Benson
On Fri, Mar 30, 2001 at 05:54:25PM -0800, Karsten M. Self wrote:
> on Wed, Mar 28, 2001 at 10:53:33PM -0500, William T Wilson ([EMAIL 
> PROTECTED]) wrote:
> > On Thu, 29 Mar 2001, Mark Devin wrote:
> > 
> > > Surely this virus cannot overwrite executables that require root
> > > permission? Or can it?
> > 
> > Like every so-called Linux virus, it requires the user to behave stupidly
> > - it's really a trojan horse.  
> 
> No, it's not a trojan, it's a virus.
> 
> A trojan, classic definition, is a program that tricks you into running
> it, which allows it to run its majick, and generally transfer, in whole,
> to another system.  The confidence game needs to be played each time the
> program is run.
> 
> A virus actively infects other files.  The confidence game needs to be
> played once.  Afterward, you're running what should be good files, which
> have been modified in place.  Systems such as md5sums should pick these
> out (you'd need a pretty sophisticated virus to catch that), but the
> roster of infected files on your system could change on a variable
> basis.

though one could argue that the virus was delivered by a trojan...

> > It has the same permission rules as any other program, so it can't
> > change root-owned files, unless they are world-writable or you are
> > running as root.
> 
> The hard step is going from user-level executable to system-level
> executable.  You'd need a user-owned binary which a root-owned process
> might run to make this transition.

cat <> ~/.bashrc
alias su='su -c ~/.virus'
EOF

-- 
Ethan Benson
http://www.alaska.net/~erbenson/


pgpRLOTb3RUaP.pgp
Description: PGP signature


Re: Linux Virus

2001-03-30 Thread Karsten M. Self
on Wed, Mar 28, 2001 at 10:53:33PM -0500, William T Wilson ([EMAIL PROTECTED]) 
wrote:
> On Thu, 29 Mar 2001, Mark Devin wrote:
> 
> > Surely this virus cannot overwrite executables that require root
> > permission? Or can it?
> 
> Like every so-called Linux virus, it requires the user to behave stupidly
> - it's really a trojan horse.  

No, it's not a trojan, it's a virus.

A trojan, classic definition, is a program that tricks you into running
it, which allows it to run its majick, and generally transfer, in whole,
to another system.  The confidence game needs to be played each time the
program is run.

A virus actively infects other files.  The confidence game needs to be
played once.  Afterward, you're running what should be good files, which
have been modified in place.  Systems such as md5sums should pick these
out (you'd need a pretty sophisticated virus to catch that), but the
roster of infected files on your system could change on a variable
basis.

> It has the same permission rules as any other program, so it can't
> change root-owned files, unless they are world-writable or you are
> running as root.

The hard step is going from user-level executable to system-level
executable.  You'd need a user-owned binary which a root-owned process
might run to make this transition.

-- 
Karsten M. Self http://kmself.home.netcom.com/
 What part of "Gestalt" don't you understand?   There is no K5 cabal
  http://gestalt-system.sourceforge.net/ http://www.kuro5hin.org


pgpxSkwqT3zYV.pgp
Description: PGP signature


Re: Linux Virus

2001-03-30 Thread Karsten M. Self
on Wed, Mar 28, 2001 at 07:11:00PM -0900, Ethan Benson ([EMAIL PROTECTED]) 
wrote:
> On Wed, Mar 28, 2001 at 10:53:33PM -0500, William T Wilson wrote:
> > On Thu, 29 Mar 2001, Mark Devin wrote:

<...>

> > The thing that's special about it is that it can infect both Windows and
> > Linux executables - which is really quite impressive.  Otherwise it's
> > nothing special.
> 
> something more nefarious would be for the virus when run from windows
> to find linux partitions and use internal ext2 support to modify
> binaries on the linux filesystems.   

Hmm...dual-booting considered harmful.  Interesting.  

Short version being that relying on OS filesystem protections to keep
you from mangling your system files is an invalid assumption if:

  - You're booting multiple OSs.
  - One or more of the OSs offers filesystem access to others.
  - The filesystem access doesn't respect user-level permissions offered
by the host OS.

Very interesting.

You're not paranoid.  They really *are* out to get you.

-- 
Karsten M. Self http://kmself.home.netcom.com/
 What part of "Gestalt" don't you understand?   There is no K5 cabal
  http://gestalt-system.sourceforge.net/ http://www.kuro5hin.org


pgpZXYmWTILHS.pgp
Description: PGP signature


Re: Linux Virus

2001-03-29 Thread Dave Sherohman
On Wed, Mar 28, 2001 at 10:19:10PM -0500, Ben Collins wrote:
> Anyone can do that. I can write a C program and send it to you that
> emails me /etc/passwd and /etc/shadow. You still have to be dumb enough
> to execute it. That's not a virus, that's social trickery. Now, if it
> emails itself (and remember with Linux there are several dozen email
> programs, so finding the right address book format is pretty hard), then
> it is viral, sort of, since you still have to manually execute it.

Based on my reading of the relevant news stories, this thing looks like
a true virus in the old sense of the term: it infects other files and
uses them to spread itself.  Although I don't expect it to get very far,
this sort of thing is potentially far more serious than the Outlook macro
worms that everyone is calling "viruses" these days.  An old-style virus
only requires one person to be stupid enough to run it and then it hides
pretty well; a macro worm requires every victim to be stupid enough to
either run it manually or use a piece of software (Outlook, outdated BIND,
whatever) which allows it to execute without user intervention.

For instance, I could write a program, let's call it my_virus, which
infects all files in the current directory and its parent directory,
as this Winux virus is described as doing.  I email it all over the
world and a copy happens to arrive in your sysadmin's mailbox while he's
working on something in /bin.  His mind is out to lunch, so he reads
his mail and runs my_virus while still root.  Every file in /bin and /
is now infected and will infect other files.

A week later, you rebuild your pet C project, super_time_waster, and
send a copy to your friend.  You think it's perfectly benign - you have
the source, so how could it be a trojan, right?  And /bin/ls tells you
it's the version you just buit 5 minutes ago.  Too bad that /bin/ls just
infected everything in the directory (including super_time_waster) as
it told you that...  (Worse, after the next reboot, you'll be running
an infected kernel, assuming it's at (or symlinked from) /vmlinuz.
Depending on the virus's structure, this could make your system unbootable
or rapidly infect every executable file on the system.)

Then your friend, of course, runs super_time_waster, confident in its
authenticity, and infects all of his files.  Without a copy of the
original my_virus executable going anywhere near his system.

I hate to disagree with you Ben, but that's about as viral as it gets.

-- 
Linux will do for applications what the Internet did for networks. 
- IBM, "Peace, Love, and Linux"
Geek Code 3.1:  GCS d? s+: a- C++ UL++$ P++>+++ L+++> E- W--(++) N+ o+
!K w---$ O M- V? PS+ PE Y+ PGP t 5++ X+ R++ tv b+ DI D G e* h+ r y+



RE: Linux Virus

2001-03-29 Thread Joris Lambrecht
This article might point out some things
http://www.theregister.co.uk/content/8/17938.html

-Original Message-
From: John Griffiths [mailto:[EMAIL PROTECTED]
Sent: donderdag 29 maart 2001 5:08
To: Ben Collins
Cc: Mark Devin; Debian-user
Subject: Re: Linux Virus


At 10:00 PM 3/28/2001 -0500, Ben Collins wrote:
>On Thu, Mar 29, 2001 at 12:55:16PM +1000, Mark Devin wrote:
>> Does anyone know anything further on this new W32.Winux virus.
>> Check out this link:
>> http://news.cnet.com/news/0-1003-200-5329436.html?tag=st.cn.1.lthd
>> 
>> Surely this virus cannot overwrite executables that require root
>> permission? Or can it?
>
>No, if this virus actually exists (and I doubt its true, or even
>particularly threatening), it can only affect your files. Unless you are
>in the bad habit of reading email as root, and executing random
>attachments manually.

At this point the virus is just a proof of concept, no payload and no
replication existing only on the author's HD and the copy he emailled to the
anti-viral company.

the proven concept may be used to do more interesting things.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]



Re: Linux Virus

2001-03-28 Thread brian moore
On Wed, Mar 28, 2001 at 10:43:12PM -0500, Ben Collins wrote:
> Arguably, there is less of a chance of that under Linux. Most people who
> use Windows (like 99.9%) use either Outlook, Eudora or Netscape for
> email. On Linux, the numbers cannot be used against it. If you target a
> Linux virus for Pine, or whatever, chances are you wont propogate very
> far. Trying to write a virus that works on "most" Linux email clients is
> beyond the scope of a small viral program.

Well, maybe it'll come with an autoconf generated configure. :)

-b.,
who remembers the old "You can spot a virus for CP/M when it has to
be shipped on 100 different floppy formats and requires 3 floppies
worth of drivers."

-- 
CueCat decoder .signature by Larry Wall:
#!/usr/bin/perl -n
printf "Serial: %s Type: %s Code: %s\n", map { tr/a-zA-Z0-9+-/ -_/; $_ = unpack
'u', chr(32 + length()*3/4) . $_; s/\0+$//; $_ ^= "C" x length; } /\.([^.]+)/g; 



Re: Linux Virus

2001-03-28 Thread Rich Puhek
Well... remember that most of the recent Melissa style worms are slapped
together with Visual Basic... Not a great risk that ext2 support will
show up :-)

--Rich

...and the paperclip winked at me and said: "It looks like you're
writing a macro virus... Would you like help?"
(another stolen .sig)

Ethan Benson wrote:
> 
> something more nefarious would be for the virus when run from windows
> to find linux partitions and use internal ext2 support to modify
> binaries on the linux filesystems.


-- 

_
 
Rich Puhek   
ETN Systems Inc. 
_



Re: Linux Virus

2001-03-28 Thread Ethan Benson
On Wed, Mar 28, 2001 at 10:53:33PM -0500, William T Wilson wrote:
> On Thu, 29 Mar 2001, Mark Devin wrote:
> 
> > Surely this virus cannot overwrite executables that require root
> > permission? Or can it?
> 
> Like every so-called Linux virus, it requires the user to behave stupidly
> - it's really a trojan horse.  It has the same permission rules as any
> other program, so it can't change root-owned files, unless they are
> world-writable or you are running as root.

or your running MacOSX where pretty much all binaries are writable by
the default user account.  

> The thing that's special about it is that it can infect both Windows and
> Linux executables - which is really quite impressive.  Otherwise it's
> nothing special.

something more nefarious would be for the virus when run from windows
to find linux partitions and use internal ext2 support to modify
binaries on the linux filesystems.   

-- 
Ethan Benson
http://www.alaska.net/~erbenson/


pgpqGGpOEF0Gb.pgp
Description: PGP signature


Re: Linux Virus

2001-03-28 Thread William T Wilson
On Thu, 29 Mar 2001, Mark Devin wrote:

> Surely this virus cannot overwrite executables that require root
> permission? Or can it?

Like every so-called Linux virus, it requires the user to behave stupidly
- it's really a trojan horse.  It has the same permission rules as any
other program, so it can't change root-owned files, unless they are
world-writable or you are running as root.

The thing that's special about it is that it can infect both Windows and
Linux executables - which is really quite impressive.  Otherwise it's
nothing special.




Re: Linux Virus

2001-03-28 Thread Ben Collins
On Thu, Mar 29, 2001 at 01:33:30PM +1000, John Griffiths wrote:
> t 10:29 PM 3/28/2001 -0500, Ben Collins wrote:
> >On Thu, Mar 29, 2001 at 01:26:39PM +1000, John Griffiths wrote:
> >> >IMO, this is nothing completely new or innovative. ASM has been around a
> >> >long time, even before viruses. It all boils down to people being smart
> >> >enough not to accept attachments form people they don't know, and
> >> >especially don't execute programs sent to you randomly over the
> >> >internet.
> >> 
> >> Agreed up to a point. But all you need is one person to open it blind and 
> >> then the rest go out to the adsress book and appear (to the next 
> >> recipients) to be someone they know. which alters the balance somewhat.
> >
> >Good point...kind of a "the chain is only as strong as its weakest link"
> >scenario :)
> >
> 
> Also worth noting that the last few headline virusses on windows have done no 
> more damage than a user-level virus operating on a unix machine.
> 
> they have been notable in the denial of service aspects of their replication, 
> and the cunning nature of their social engineering.

Arguably, there is less of a chance of that under Linux. Most people who
use Windows (like 99.9%) use either Outlook, Eudora or Netscape for
email. On Linux, the numbers cannot be used against it. If you target a
Linux virus for Pine, or whatever, chances are you wont propogate very
far. Trying to write a virus that works on "most" Linux email clients is
beyond the scope of a small viral program.

-- 
 ---===-=-==-=---==-=--
/  Ben Collins  --  ...on that fantastic voyage...  --  Debian GNU/Linux   \
`  [EMAIL PROTECTED]  --  [EMAIL PROTECTED]  --  [EMAIL PROTECTED]  '
 `---=--===-=-=-=-===-==---=--=---'



Re: Linux Virus

2001-03-28 Thread John Griffiths
t 10:29 PM 3/28/2001 -0500, Ben Collins wrote:
>On Thu, Mar 29, 2001 at 01:26:39PM +1000, John Griffiths wrote:
>> >IMO, this is nothing completely new or innovative. ASM has been around a
>> >long time, even before viruses. It all boils down to people being smart
>> >enough not to accept attachments form people they don't know, and
>> >especially don't execute programs sent to you randomly over the
>> >internet.
>> 
>> Agreed up to a point. But all you need is one person to open it blind and 
>> then the rest go out to the adsress book and appear (to the next recipients) 
>> to be someone they know. which alters the balance somewhat.
>
>Good point...kind of a "the chain is only as strong as its weakest link"
>scenario :)
>

Also worth noting that the last few headline virusses on windows have done no 
more damage than a user-level virus operating on a unix machine.

they have been notable in the denial of service aspects of their replication, 
and the cunning nature of their social engineering.

plus re-insalling my OS is a lot less painful than losing my personal files. 
(backups notwithstanding)



Re: Linux Virus

2001-03-28 Thread Ben Collins
On Thu, Mar 29, 2001 at 01:26:39PM +1000, John Griffiths wrote:
> >IMO, this is nothing completely new or innovative. ASM has been around a
> >long time, even before viruses. It all boils down to people being smart
> >enough not to accept attachments form people they don't know, and
> >especially don't execute programs sent to you randomly over the
> >internet.
> 
> Agreed up to a point. But all you need is one person to open it blind and 
> then the rest go out to the adsress book and appear (to the next recipients) 
> to be someone they know. which alters the balance somewhat.

Good point...kind of a "the chain is only as strong as its weakest link"
scenario :)

-- 
 ---===-=-==-=---==-=--
/  Ben Collins  --  ...on that fantastic voyage...  --  Debian GNU/Linux   \
`  [EMAIL PROTECTED]  --  [EMAIL PROTECTED]  --  [EMAIL PROTECTED]  '
 `---=--===-=-=-=-===-==---=--=---'



Re: Linux Virus

2001-03-28 Thread John Griffiths
>IMO, this is nothing completely new or innovative. ASM has been around a
>long time, even before viruses. It all boils down to people being smart
>enough not to accept attachments form people they don't know, and
>especially don't execute programs sent to you randomly over the
>internet.

Agreed up to a point. But all you need is one person to open it blind and then 
the rest go out to the adsress book and appear (to the next recipients) to be 
someone they know. which alters the balance somewhat.



Re: Linux Virus

2001-03-28 Thread Ben Collins
On Thu, Mar 29, 2001 at 01:07:49PM +1000, John Griffiths wrote:
> At 10:00 PM 3/28/2001 -0500, Ben Collins wrote:
> >On Thu, Mar 29, 2001 at 12:55:16PM +1000, Mark Devin wrote:
> >> Does anyone know anything further on this new W32.Winux virus.
> >> Check out this link:
> >> http://news.cnet.com/news/0-1003-200-5329436.html?tag=st.cn.1.lthd
> >> 
> >> Surely this virus cannot overwrite executables that require root
> >> permission? Or can it?
> >
> >No, if this virus actually exists (and I doubt its true, or even
> >particularly threatening), it can only affect your files. Unless you are
> >in the bad habit of reading email as root, and executing random
> >attachments manually.
> 
> At this point the virus is just a proof of concept, no payload and no 
> replication existing only on the author's HD and the copy he emailled to the 
> anti-viral company.
> 
> the proven concept may be used to do more interesting things.

The concept is still dependent on the user executing an attachment
(depending on their email client, which most Linux clients are smart),
and it can still only affect user owned files, not root (unless said
email is read, and attachment is executed, by root).

Anyone can do that. I can write a C program and send it to you that
emails me /etc/passwd and /etc/shadow. You still have to be dumb enough
to execute it. That's not a virus, that's social trickery. Now, if it
emails itself (and remember with Linux there are several dozen email
programs, so finding the right address book format is pretty hard), then
it is viral, sort of, since you still have to manually execute it.

Yes, it is pretty nifty that it can run on i386-Linux and Windows using
basic asm. However, that is a very limited thing, and for it to really
do someting useful, it will need to do a lot more, and will most likely
be less able to run on both Windows and Linux from one binary.

IMO, this is nothing completely new or innovative. ASM has been around a
long time, even before viruses. It all boils down to people being smart
enough not to accept attachments form people they don't know, and
especially don't execute programs sent to you randomly over the
internet.

-- 
 ---===-=-==-=---==-=--
/  Ben Collins  --  ...on that fantastic voyage...  --  Debian GNU/Linux   \
`  [EMAIL PROTECTED]  --  [EMAIL PROTECTED]  --  [EMAIL PROTECTED]  '
 `---=--===-=-=-=-===-==---=--=---'



Re: Linux Virus

2001-03-28 Thread John Griffiths
At 10:00 PM 3/28/2001 -0500, Ben Collins wrote:
>On Thu, Mar 29, 2001 at 12:55:16PM +1000, Mark Devin wrote:
>> Does anyone know anything further on this new W32.Winux virus.
>> Check out this link:
>> http://news.cnet.com/news/0-1003-200-5329436.html?tag=st.cn.1.lthd
>> 
>> Surely this virus cannot overwrite executables that require root
>> permission? Or can it?
>
>No, if this virus actually exists (and I doubt its true, or even
>particularly threatening), it can only affect your files. Unless you are
>in the bad habit of reading email as root, and executing random
>attachments manually.

At this point the virus is just a proof of concept, no payload and no 
replication existing only on the author's HD and the copy he emailled to the 
anti-viral company.

the proven concept may be used to do more interesting things.



Re: Linux Virus

2001-03-28 Thread Ben Collins
On Thu, Mar 29, 2001 at 12:55:16PM +1000, Mark Devin wrote:
> Does anyone know anything further on this new W32.Winux virus.
> Check out this link:
> http://news.cnet.com/news/0-1003-200-5329436.html?tag=st.cn.1.lthd
> 
> Surely this virus cannot overwrite executables that require root
> permission? Or can it?

No, if this virus actually exists (and I doubt its true, or even
particularly threatening), it can only affect your files. Unless you are
in the bad habit of reading email as root, and executing random
attachments manually.

-- 
 ---===-=-==-=---==-=--
/  Ben Collins  --  ...on that fantastic voyage...  --  Debian GNU/Linux   \
`  [EMAIL PROTECTED]  --  [EMAIL PROTECTED]  --  [EMAIL PROTECTED]  '
 `---=--===-=-=-=-===-==---=--=---'