Re: Security issues for nfs mount

1997-09-14 Thread ioannis

 :-)

 In this case you may as well post your root passwd in Yahoo.





On Fri, Sep 12, 1997 at 09:02:59PM +0100, G. Kapetanios wrote:
> 
> Hi,
> 
> Although I am not familiar at all with the inner workings of nfs 
> the description below indicates a risk that an unauthorised client may
> read files on the specific directory which is being exported by nfs read
> only. However my worry is not whether somebody else will read the files 
> which in my cased is only a piece of software. My worry is whether anybody
> can write to the directory being exported or any other directory of my
> computer , given that the stuff on the exported directory are
> mathematical software unrelated with the workings of the operating system
> .. I would be grateful if someone could clarify this point 
> 
>Thanks
>George 

-- 
Ioannis Tambouras 
[EMAIL PROTECTED], West Palm Beach, Florida
Signed pgp-key on key server. 


--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
[EMAIL PROTECTED] . Trouble? 
e-mail to [EMAIL PROTECTED] .


Re: Security issues for nfs mount

1997-09-12 Thread G. Kapetanios

Hi,

Although I am not familiar at all with the inner workings of nfs 
the description below indicates a risk that an unauthorised client may
read files on the specific directory which is being exported by nfs read
only. However my worry is not whether somebody else will read the files 
which in my cased is only a piece of software. My worry is whether anybody
can write to the directory being exported or any other directory of my
computer , given that the stuff on the exported directory are
mathematical software unrelated with the workings of the operating system
. I would be grateful if someone could clarify this point 

   Thanks
   George 

On Fri, 12 Sep 1997 [EMAIL PROTECTED] wrote:

> 
>  
>  I could resist to your request, Jim, and appear before you with further 
>  clarifications, for you are an active contributor in the Debian project
>  and we are quite fortunate to have you here among us; moreover, there in 
>  an ancient saying, that "hard is the knowledge of the good."  And the
>  knowledge of nfs is a great part of knowledge. If I had not been busy, I
>  might have reviewed all the relevant rcf's, which is a complete education 
>  in nfs mechanics and then I should have been at once able to answer your
>  question about the IO mechanics. But, indeed, I have only a limited time,
>  and therefore, I do not know the truth about such matters; I will, however, 
>  gladly assist you in the investigation of them. We say that an nfs server
>  running nfs-ver_1, or nfs-ver_2, can be tricked to perform unauthorized IO.
>  But, there is a good deal of difficulty in describing this sort of knowledge
>  in a public list, therefore we better investigate the description of it,
>  instead on the specific steps that we are now supposing.
> 
>  Lets reflect on the nature of the io request.
> 
>  The file handle is a simple structure of 32 bytes for version 2 (although
>  this was increased with version 3 to 64 bytes) and is created by the
>  server, who passes it back to the client, and then the client uses the 
>  file handle to access the file. All the server does does is validate the
>  file handle (the ticket) when the io request is made. Supply the right 
>  handle and you are in. 
> 
>  Guessing the fields of the structure is not extremely difficult. Most
>  of the information is already known: major and minor device numbers,
>  i-node number, etc. Everything is known except the i-node
>  generation number whose purpose is to provide security and is chosen 
>  when the open request is made. The generation number is implementation
>  dependent; it may, even, be a sequential(!) number, but allow, for the 
>  sake of this discussion, this to be a truly random number. My distinct 
>  recollection from the relevant rfc [1] is that the width of this number
>  is small, either 16 or 32 bits, we could, of course, if we must, go back
>  to the specification and verify the truth of this, yet this weakness of
>  (traditional) nfs is so well known and is as old as I dare remember. It will
>  not take a giant to place many requests until one succeeds, and it does 
>  not prevent an 12-year old to run an exploit that was written very many
>  years ago. 
> 
> 
> 
> [1] The "opaque" structure, the file handle definition, is a simple
> typedef in rfc1094 . The actual details should then be in the XDR
> rfc1014 , I must assume, for I do not have it here locally to examine.
> 
> 
> > >   The traditional unix nfs filesystem is _insecure_ : the
> > >  i-node generation number, which is part of the file handles, is easy
> > >  to guess. 
> > 
> > I'm curious.  How would an attack on nfs using this method proceed?
> 
> 
> -- 
> Ioannis Tambouras 
> [EMAIL PROTECTED], West Palm Beach, Florida
> Signed pgp-key on key server. 
> 
> 
> --
> TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
> [EMAIL PROTECTED] . 
> Trouble?  e-mail to [EMAIL PROTECTED] .
> 
> 

---
George Kapetanios
Churchill College
Cambridge, CB3 0DSE-Mail: [EMAIL PROTECTED]
U.K.  WWW: http://garfield.chu.cam.ac.uk/~gk205/work_info.html
---



--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
[EMAIL PROTECTED] . 
Trouble?  e-mail to [EMAIL PROTECTED] .


Re: Security issues for nfs mount

1997-09-12 Thread ioannis

 
 I could resist to your request, Jim, and appear before you with further 
 clarifications, for you are an active contributor in the Debian project
 and we are quite fortunate to have you here among us; moreover, there in 
 an ancient saying, that "hard is the knowledge of the good."  And the
 knowledge of nfs is a great part of knowledge. If I had not been busy, I
 might have reviewed all the relevant rcf's, which is a complete education 
 in nfs mechanics and then I should have been at once able to answer your
 question about the IO mechanics. But, indeed, I have only a limited time,
 and therefore, I do not know the truth about such matters; I will, however, 
 gladly assist you in the investigation of them. We say that an nfs server
 running nfs-ver_1, or nfs-ver_2, can be tricked to perform unauthorized IO.
 But, there is a good deal of difficulty in describing this sort of knowledge
 in a public list, therefore we better investigate the description of it,
 instead on the specific steps that we are now supposing.

 Lets reflect on the nature of the io request.

 The file handle is a simple structure of 32 bytes for version 2 (although
 this was increased with version 3 to 64 bytes) and is created by the
 server, who passes it back to the client, and then the client uses the 
 file handle to access the file. All the server does does is validate the
 file handle (the ticket) when the io request is made. Supply the right 
 handle and you are in. 

 Guessing the fields of the structure is not extremely difficult. Most
 of the information is already known: major and minor device numbers,
 i-node number, etc. Everything is known except the i-node
 generation number whose purpose is to provide security and is chosen 
 when the open request is made. The generation number is implementation
 dependent; it may, even, be a sequential(!) number, but allow, for the 
 sake of this discussion, this to be a truly random number. My distinct 
 recollection from the relevant rfc [1] is that the width of this number
 is small, either 16 or 32 bits, we could, of course, if we must, go back
 to the specification and verify the truth of this, yet this weakness of
 (traditional) nfs is so well known and is as old as I dare remember. It will
 not take a giant to place many requests until one succeeds, and it does 
 not prevent an 12-year old to run an exploit that was written very many
 years ago. 



[1] The "opaque" structure, the file handle definition, is a simple
typedef in rfc1094 . The actual details should then be in the XDR
rfc1014 , I must assume, for I do not have it here locally to examine.


> >   The traditional unix nfs filesystem is _insecure_ : the
> >  i-node generation number, which is part of the file handles, is easy
> >  to guess. 
> 
> I'm curious.  How would an attack on nfs using this method proceed?


-- 
Ioannis Tambouras 
[EMAIL PROTECTED], West Palm Beach, Florida
Signed pgp-key on key server. 


--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
[EMAIL PROTECTED] . 
Trouble?  e-mail to [EMAIL PROTECTED] .


Re: Security issues for nfs mount

1997-09-12 Thread Jim Pick

Ioannis Tambouras wrote:
>   The traditional unix nfs filesystem is _insecure_ : the
>  i-node generation number, which is part of the file handles, is easy
>  to guess. 

I'm curious.  How would an attack on nfs using this method proceed?

Cheers,

 - Jim



pgpYNozTVDntA.pgp
Description: PGP signature


Re: Security issues for nfs mount

1997-09-12 Thread ioannis

  The traditional unix nfs filesystem is _insecure_ : the
 i-node generation number, which is part of the file handles, is easy
 to guess. 
 


-- 
Ioannis Tambouras 
[EMAIL PROTECTED], West Palm Beach, Florida
Signed pgp-key on key server. 


--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
[EMAIL PROTECTED] . 
Trouble?  e-mail to [EMAIL PROTECTED] .


Re: Security issues for nfs mount

1997-09-11 Thread Jim Pick

> Hi,
> 
> I was wondering whether there is anything to worry about if I let 
> another machine nfs mount, read only, root-squash, one directory on my
> machine. Any help will be greatly appreciated.
> 
> Thanks
> George 

I don't think there should be problem with that.  

(unless, of course, you don't restrict who can connect, and you leave 
important information like credit card numbers or passwords in that
directory)

Cheers,

 - Jim



pgpqfwHZ40Dx7.pgp
Description: PGP signature


Re: Security issues for nfs mount

1997-09-11 Thread joost witteveen
> 
> Hi,
> 
> I was wondering whether there is anything to worry about if I let 
> another machine nfs mount, read only, root-squash, one directory on my
> machine. Any help will be greatly appreciated.

The only problem I can think of is that root-squash may not be enough
(an attacker may still read files owned by "shadow", etc). So

/tmphostname(ro,squash_uids=0-100,squash_gids=0-80)

may be slightly more safe. But after that, I don't anticipate any
problems. 

If anyone still knows problems with that, I'd be interested to hear!


-- 
joost witteveen, [EMAIL PROTECTED]
#!/usr/bin/perl -sp0777ihttp://www.dcs.ex.ac.uk/~aba/rsa/


--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
[EMAIL PROTECTED] . 
Trouble?  e-mail to [EMAIL PROTECTED] .


Security issues for nfs mount

1997-09-11 Thread G. Kapetanios

Hi,

I was wondering whether there is anything to worry about if I let 
another machine nfs mount, read only, root-squash, one directory on my
machine. Any help will be greatly appreciated.

Thanks
George 


---
George Kapetanios
Churchill College
Cambridge, CB3 0DSE-Mail: [EMAIL PROTECTED]
U.K.  WWW: http://garfield.chu.cam.ac.uk/~gk205/work_info.html
---



--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
[EMAIL PROTECTED] . 
Trouble?  e-mail to [EMAIL PROTECTED] .