Updating for the FreeBSD Security Advisory FreeBSD-SA-12:01.openssl

2012-05-03 Thread Leslie Jensen


The following message appears when I do

freebsd-update install


The following files will be added as part of updating to 8.2-RELEASE-p7:
/usr/src/lib/libc/gen/libc_dlopen.c

The following files will be updated as part of updating to 8.2-RELEASE-p7:
/boot/kernel/kernel
/lib/libcrypto.so.6
/usr/bin/openssl
/usr/include/openssl/ssl.h
/usr/include/openssl/ssl3.h
/usr/lib/libcrypto.a
/usr/lib/libssl.a
/usr/lib/libssl.so.6
/usr/lib32/libcrypto.a
/usr/lib32/libcrypto.so.6
/usr/lib32/libcrypto_p.a
/usr/lib32/libssl.a
/usr/lib32/libssl.so.6
/usr/lib32/libssl_p.a
/usr/src/sys/conf/newvers.sh
/var/db/mergemaster.mtree

WARNING: FreeBSD 8.2-RELEASE-p6 is approaching its End-of-Life date.
It is strongly recommended that you upgrade to a newer
release within the next 2 months.

root@bljbsd01~:freebsd-update install
Installing updates...install: ///usr/src/lib/libc/gen/libc_dlopen.c: No 
such file or directory

 done.



Should I worry about the libc_dlopen.c, or is it ok?


Thanks

/Leslie


___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Follow up....Re: Updating for the FreeBSD Security Advisory FreeBSD-SA-12:01.openssl

2012-05-03 Thread Leslie Jensen



2012-05-03 19:04, Leslie Jensen skrev:


The following message appears when I do

freebsd-update install


The following files will be added as part of updating to 8.2-RELEASE-p7:
/usr/src/lib/libc/gen/libc_dlopen.c

The following files will be updated as part of updating to 8.2-RELEASE-p7:
/boot/kernel/kernel
/lib/libcrypto.so.6
/usr/bin/openssl
/usr/include/openssl/ssl.h
/usr/include/openssl/ssl3.h
/usr/lib/libcrypto.a
/usr/lib/libssl.a
/usr/lib/libssl.so.6
/usr/lib32/libcrypto.a
/usr/lib32/libcrypto.so.6
/usr/lib32/libcrypto_p.a
/usr/lib32/libssl.a
/usr/lib32/libssl.so.6
/usr/lib32/libssl_p.a
/usr/src/sys/conf/newvers.sh
/var/db/mergemaster.mtree

WARNING: FreeBSD 8.2-RELEASE-p6 is approaching its End-of-Life date.
It is strongly recommended that you upgrade to a newer
release within the next 2 months.

root@bljbsd01~:freebsd-update install
Installing updates...install: ///usr/src/lib/libc/gen/libc_dlopen.c: No
such file or directory
done.



Should I worry about the libc_dlopen.c, or is it ok?


Thanks

/Leslie


___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to
freebsd-questions-unsubscr...@freebsd.org



After a reboot my system now has the following label

FreeBSD 8.2-RELEASE-p3 #0

How come it downgrades the label from p6 to p3 when upgrading to p7.

I'm aware that I can rebuild the kernel but I just wanted to know.

/Leslie

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Follow up....Re: Updating for the FreeBSD Security Advisory FreeBSD-SA-12:01.openssl

2012-05-03 Thread andrew clarke
On Thu 2012-05-03 19:17:05 UTC+0200, Leslie Jensen (les...@eskk.nu) wrote:

 After a reboot my system now has the following label
 
 FreeBSD 8.2-RELEASE-p3 #0
 
 How come it downgrades the label from p6 to p3 when upgrading to p7.

This is a FAQ.  There's a thread about it here:

http://lists.freebsd.org/pipermail/freebsd-questions/2010-June/217031.html

Short answer: The patch level (-p3) displayed by uname -r after a
reboot will not change if freebsd-update has not touched the kernel.

As far as I know there haven't been any patches to the 8.2-REL kernel
since -p3.

/usr/src/sys/conf/newvers.sh is always updated by freebsd-update when
there is an update. (Although now that I think about it that might not
be true if you don't have the kernel sources installed?)

Not exactly intuitive.

Several Linux distros have a file named /etc/issue that shows the
distro name and version. Perhaps this or something similar could be
provided in future FreeBSD releases and updated by freebsd-update.

$ cat /etc/issue
Ubuntu 12.04 LTS \n \l

Regards
Andrew
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Follow up....Re: Updating for the FreeBSD Security Advisory FreeBSD-SA-12:01.openssl

2012-05-03 Thread Leslie Jensen



2012-05-03 20:35, andrew clarke skrev:

On Thu 2012-05-03 19:17:05 UTC+0200, Leslie Jensen (les...@eskk.nu) wrote:


After a reboot my system now has the following label

FreeBSD 8.2-RELEASE-p3 #0

How come it downgrades the label from p6 to p3 when upgrading to p7.


This is a FAQ.  There's a thread about it here:

http://lists.freebsd.org/pipermail/freebsd-questions/2010-June/217031.html

Short answer: The patch level (-p3) displayed by uname -r after a
reboot will not change if freebsd-update has not touched the kernel.

As far as I know there haven't been any patches to the 8.2-REL kernel
since -p3.

/usr/src/sys/conf/newvers.sh is always updated by freebsd-update when
there is an update. (Although now that I think about it that might not
be true if you don't have the kernel sources installed?)

Not exactly intuitive.

Several Linux distros have a file named /etc/issue that shows the
distro name and version. Perhaps this or something similar could be
provided in future FreeBSD releases and updated by freebsd-update.

$ cat /etc/issue
Ubuntu 12.04 LTS \n \l

Regards
Andrew
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org



Thank you :-)

I have read similar answers and was partly aware of this.

But I was just curious to why.

I'll accept it and let a kernel rebuild be a part of my updates.

/Leslie


___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Follow up....Re: Updating for the FreeBSD Security Advisory FreeBSD-SA-12:01.openssl

2012-05-03 Thread andrew clarke
On Thu 2012-05-03 20:48:17 UTC+0200, Leslie Jensen (les...@eskk.nu) wrote:

  Short answer: The patch level (-p3) displayed by uname -r after a
  reboot will not change if freebsd-update has not touched the kernel.

...

 I have read similar answers and was partly aware of this.
 
 But I was just curious to why.
 
 I'll accept it and let a kernel rebuild be a part of my updates.

If you're running the GENERIC kernel then you're only creating extra
work for yourself by rebuilding it for the sole purpose of having
uname -r show the correct patchlevel...

On the other hand if you're running a custom kernel then you only need
to rebuild the kernel when freebsd-update touches the kernel sources.
I don't recall the kernel was touched at all with the most recently
-p7 patch (openssl), for example, so there's absolutely no need to
rebuild it.

Apologies if this was already obvious.

Regards
Andrew
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: FreeBSD Security in Multiuser Environments

2012-04-02 Thread Ian Smith
In freebsd-questions Digest, Vol 408, Issue 10, Message: 5
On Sat, 31 Mar 2012 21:05:00 +0700 Erich Dollansky 
erichfreebsdl...@ovitrap.com wrote:
  On Saturday 31 March 2012 20:26:14 Julian H. Stacey wrote:
[..]
   Da Rock wrote:
On 03/31/12 17:46, Julian H. Stacey wrote:
[..]
 schu...@ime.usp.br wrote:
 Hello,

 I would like to raise a discussion about the security features
 of FreeBSD as a whole and how they might be employed to actually
 derive some meaningful guarantees.

 We have a list specialy for freebsd-security@. Please use it.

I thought this to be sensible advice.  Before seeing that I'd thought of 
copying it to rwatson@ who I figured might take an interest due to his 
involvement with Capsicum, acl(3) and such, but he certainly reads that 
list anyway (and more than likely, not this one :)

Hang on, hold the phone: The security list (specifically) is for 
security announcements. At least that what it said when I subscribed to 
it...
   
   Wrong.

Correct :)

   For list of mail lists see:
  http://lists.freebsd.org/mailman/listinfo
   
   Specifically:
  freebsd-secur...@freebsd.org
  http://lists.freebsd.org/mailman/listinfo/freebsd-security
   
  freebsd-security-notificati...@freebsd.org
  http://lists.freebsd.org/mailman/listinfo/freebsd-security-notifications

  this sounds very confusing for people who have simple question:
  
  'General system administrator questions of an FAQ nature are 
  off-topic for this list, but the creation and maintenance of a FAQ is 
  on-topic. Thus, the submission of questions (with answers) for 
  inclusion into the FAQ is welcome. Such question/answer sets should 
  be clearly marked as (at least FAQ submission) such in the subject. 
  '

schultz' post was nothing in the way of an FAQ issue, but a request for 
discussion of a wide range of system security issues, far indeed from a 
'simple question'.  Had you posted the two paragraphs before the one you 
quote above, this may have been a little clearer.  To wit:

This is a technical discussion list covering FreeBSD security issues. 
The intention is for the list to contain a high-signal, low-noise 
discussion of issues affecting the security of FreeBSD.

Welcome topics include Cryptography (as it relates to FreeBSD), OS bugs 
that affect security, and security design issues. Denial-of-service 
(DoS) issues are less important than problems that allow an attacker to 
achieve elevated privelige, but are still on-topic.

  This sounds that 'schultz' would be wrong there.

Not at all Erich, quite the opposite in my view; as someone who's been 
subscribed to freebsd-security@ for 12 or so years, I look forward to 
seeing informed responses to some of schultz' issues.  In any event, 
{s,}he promptly took Julian's advice to post it there, where one aspect 
has already attracted responses from des@ and pjd@

The best way to get a good sense of what issues are acceptible and/or 
useful topics for which lists, without having to subscribe, is to browse 
a list's archives for several months.  Works for me.  In this case try:

http://lists.freebsd.org/pipermail/freebsd-security/

cheers, Ian
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: FreeBSD Security in Multiuser Environments

2012-04-02 Thread Da Rock

On 04/02/12 17:48, Ian Smith wrote:

In freebsd-questions Digest, Vol 408, Issue 10, Message: 5
On Sat, 31 Mar 2012 21:05:00 +0700 Erich 
Dollanskyerichfreebsdl...@ovitrap.com  wrote:
On Saturday 31 March 2012 20:26:14 Julian H. Stacey wrote:
[..]
  Da Rock wrote:
On 03/31/12 17:46, Julian H. Stacey wrote:
[..]
  schu...@ime.usp.br wrote:
  Hello,

  I would like to raise a discussion about the security features
  of FreeBSD as a whole and how they might be employed to actually
  derive some meaningful guarantees.

  We have a list specialy for freebsd-security@. Please use it.

I thought this to be sensible advice.  Before seeing that I'd thought of
copying it to rwatson@ who I figured might take an interest due to his
involvement with Capsicum, acl(3) and such, but he certainly reads that
list anyway (and more than likely, not this one :)

Hang on, hold the phone: The security list (specifically) is for
security announcements. At least that what it said when I subscribed 
to
it...

  Wrong.

Correct :)


So thats turn left, right? Clear as mud now... :)


  For list of mail lists see:
http://lists.freebsd.org/mailman/listinfo

  Specifically:
freebsd-secur...@freebsd.org
http://lists.freebsd.org/mailman/listinfo/freebsd-security

freebsd-security-notificati...@freebsd.org

http://lists.freebsd.org/mailman/listinfo/freebsd-security-notifications

this sounds very confusing for people who have simple question:
  
'General system administrator questions of an FAQ nature are
off-topic for this list, but the creation and maintenance of a FAQ is
on-topic. Thus, the submission of questions (with answers) for
inclusion into the FAQ is welcome. Such question/answer sets should
be clearly marked as (at least FAQ submission) such in the subject.
'

schultz' post was nothing in the way of an FAQ issue, but a request for
discussion of a wide range of system security issues, far indeed from a
'simple question'.  Had you posted the two paragraphs before the one you
quote above, this may have been a little clearer.  To wit:

This is a technical discussion list covering FreeBSD security issues.
The intention is for the list to contain a high-signal, low-noise
discussion of issues affecting the security of FreeBSD.
I think that has clarified things sufficiently now. Looks like I should 
subscribe to that list too.

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: FreeBSD Security in Multiuser Environments

2012-04-01 Thread Peter Vereshagin
Hello.

2012/03/30 22:44:16 -0300 schu...@ime.usp.br = To 
freebsd-questions@freebsd.org :

 P.S.: If you want to attain desktop security, matters get even more
 complicated. If anyone is interested, I can discuss what I did there
 (basically virtual X servers and building ports as regular users).

Sure I am interested.

I myself try to run Xorg server in a chroot and its clients from a different
jail(s) via tcp on lo0.  Trouble still is I can't get my VT ttyvXs because of
that strange 'console ownership' stuff.

 Also, thanks for Capsicum, it sure is useful.

Who is that?

--
Peter Vereshagin pe...@vereshagin.org (http://vereshagin.org) pgp: A0E26627 
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: FreeBSD Security in Multiuser Environments

2012-04-01 Thread Matthew Seaman
On 01/04/2012 09:47, Peter Vereshagin wrote:
 Also, thanks for Capsicum, it sure is useful.

 Who is that?

Robert Watson, Jonathan Anderson and Ben Laurie are the principle 'who'
behind Capsicum.   Now, if you'ld asked 'What is that?' I'd've pointed
you towards

   https://www.cl.cam.ac.uk/research/security/capsicum/

It's a lightweight OS capability and sandbox framework, or in other
words a way of enforcing restrictions on what objects -- particularly
those built from foreign data eg. javascript in web pages -- can modify
or access on your local system.

Cheers,

Matthew

-- 
Dr Matthew J Seaman MA, D.Phil.
PGP: http://www.infracaninophile.co.uk/pgpkey




signature.asc
Description: OpenPGP digital signature


Re: FreeBSD Security in Multiuser Environments

2012-03-31 Thread Julian H. Stacey
Hi,
Reference:
 From: schu...@ime.usp.br 
 Date: Fri, 30 Mar 2012 22:44:16 -0300 
 Message-id:   20120330224416.13643xk4rsfd2...@webmail.ime.usp.br 

schu...@ime.usp.br wrote:
 Hello,
 
 I would like to raise a discussion about the security features
 of FreeBSD as a whole and how they might be employed to actually
 derive some meaningful guarantees.

We have a list specialy for freebsd-security@. Please use it.

Cheers,
Julian
-- 
Julian Stacey, BSD Unix Linux C Sys Eng Consultants Munich http://berklix.com
 Reply below not above, cumulative like a play script,  indent with  .
 Format: Plain text. Not HTML, multipart/alternative, base64, quoted-printable.
Mail from @yahoo dumped @berklix.  http://berklix.org/yahoo/
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: FreeBSD Security in Multiuser Environments

2012-03-31 Thread Da Rock

On 03/31/12 17:46, Julian H. Stacey wrote:

Hi,
Reference:

From:   schu...@ime.usp.br
Date:   Fri, 30 Mar 2012 22:44:16 -0300
Message-id: 20120330224416.13643xk4rsfd2...@webmail.ime.usp.br

schu...@ime.usp.br wrote:

Hello,

I would like to raise a discussion about the security features
of FreeBSD as a whole and how they might be employed to actually
derive some meaningful guarantees.

We have a list specialy for freebsd-security@. Please use it.
Hang on, hold the phone: The security list (specifically) is for 
security announcements. At least that what it said when I subscribed to 
it...

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: FreeBSD Security in Multiuser Environments

2012-03-31 Thread Julian H. Stacey
Hi,
Reference:
 From: Da Rock freebsd-questi...@herveybayaustralia.com.au 
 Date: Sat, 31 Mar 2012 21:25:37 +1000 
 Message-id:   4f76e9b1.5040...@herveybayaustralia.com.au 

Da Rock wrote:
 On 03/31/12 17:46, Julian H. Stacey wrote:
  Hi,
  Reference:
  From:  schu...@ime.usp.br
  Date:  Fri, 30 Mar 2012 22:44:16 -0300
  Message-id:20120330224416.13643xk4rsfd2...@webmail.ime.usp.br
  schu...@ime.usp.br wrote:
  Hello,
 
  I would like to raise a discussion about the security features
  of FreeBSD as a whole and how they might be employed to actually
  derive some meaningful guarantees.
  We have a list specialy for freebsd-security@. Please use it.
 Hang on, hold the phone: The security list (specifically) is for 
 security announcements. At least that what it said when I subscribed to 
 it...

Wrong.

For list of mail lists see:
http://lists.freebsd.org/mailman/listinfo

Specifically:
freebsd-secur...@freebsd.org
http://lists.freebsd.org/mailman/listinfo/freebsd-security

freebsd-security-notificati...@freebsd.org
http://lists.freebsd.org/mailman/listinfo/freebsd-security-notifications

Cheers,
Julian
-- 
Julian Stacey, BSD Unix Linux C Sys Eng Consultants Munich http://berklix.com
 Reply below not above, cumulative like a play script,  indent with  .
 Format: Plain text. Not HTML, multipart/alternative, base64, quoted-printable.
Mail from @yahoo dumped @berklix.  http://berklix.org/yahoo/
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: FreeBSD Security in Multiuser Environments

2012-03-31 Thread Erich Dollansky
Hi,

On Saturday 31 March 2012 20:26:14 Julian H. Stacey wrote:
 Hi,
 Reference:
  From:   Da Rock freebsd-questi...@herveybayaustralia.com.au 
  Date:   Sat, 31 Mar 2012 21:25:37 +1000 
  Message-id: 4f76e9b1.5040...@herveybayaustralia.com.au 
 
 Da Rock wrote:
  On 03/31/12 17:46, Julian H. Stacey wrote:
   Hi,
   Reference:
   From:schu...@ime.usp.br
   Date:Fri, 30 Mar 2012 22:44:16 -0300
   Message-id:  20120330224416.13643xk4rsfd2...@webmail.ime.usp.br
   schu...@ime.usp.br wrote:
   Hello,
  
   I would like to raise a discussion about the security features
   of FreeBSD as a whole and how they might be employed to actually
   derive some meaningful guarantees.
   We have a list specialy for freebsd-security@. Please use it.
  Hang on, hold the phone: The security list (specifically) is for 
  security announcements. At least that what it said when I subscribed to 
  it...
 
 Wrong.
 
 For list of mail lists see:
   http://lists.freebsd.org/mailman/listinfo
 
 Specifically:
   freebsd-secur...@freebsd.org
   http://lists.freebsd.org/mailman/listinfo/freebsd-security
 
   freebsd-security-notificati...@freebsd.org
   http://lists.freebsd.org/mailman/listinfo/freebsd-security-notifications
 
this sounds very confusing for people who have simple question:

'General system administrator questions of an FAQ nature are off-topic for this 
list, but the creation and maintenance of a FAQ is on-topic. Thus, the 
submission of questions (with answers) for inclusion into the FAQ is welcome. 
Such question/answer sets should be clearly marked as (at least FAQ 
submission) such in the subject. '

This sounds that 'schultz' would be wrong there.

Erich
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


FreeBSD Security in Multiuser Environments

2012-03-30 Thread schultz

Hello,

I would like to raise a discussion about the security features
of FreeBSD as a whole and how they might be employed to actually
derive some meaningful guarantees.

I have found myself administering a system with many potentially
untrusted users. Furthermore, some users do not trust some of the
programs they run and are thus allowed to ask for some slave
accounts. A slave account is a user account accessible only to
root and the master user. This can lead to a hierachy of authority.
Also, each account has potentially confidential data that may be
accessed only by the account itself and its ancestor accounts. This
includes when a user is logged on and what the user is running.
Finally, the system must always be up so no user untrusted by root
may trash it.

This is a pretty harsh set of restrictions and is almost unmanageable.
However, I have taken three steps to ensure security: base system
hardening, using sudo for privilege granting and using rctl(8) for
resource accounting and control. Gathering enough information in these
three areas has been an ongoing task for almost half a year, and I
would like to discuss some problems of my approach.

In terms of system hardening, I have:
  * Encrypted the whole (except /boot) system with geli(8)
(HMAC/SHA256 and AES-XTS). It is not as nice and much slower
than proper filesystem-level checksumming but it is what
FreeBSD provides (ZFS is too unstable).
  * Disabled useless and potentially dangerous services: cron, devd
and sendmail.
  * Removed every setuid bit. The system works even then.
  * Hardened /dev: every non necessary device has had the 0007 bits
stripped. Optional groups were created (e.g. audio, mixer and mic
for devices /dev/{mixer,dsp,audio}*).
  * Hardened the sysctls:
- security.bsd.see_other_uids=0: Users can only see own processes.
- security.bsd.unprivileged_proc_debug=0
- security.bsd.unprivileged_read_msgbuf=0: The log is considered
  sensitive information.
- security.bsd.hardlink_check_uid=1: Avoid hardlinks to old SUID
  binaries.
- kern.log_console_output=0
- kern.coredump=0
- vm.overcommit=1: This avoids retarded Linux-like behaviour on
  OOM conditions.
  * Changed permissions on /root to 0700: root deserves privacy.
  * A boot script changes some permissions:
- /var/log to 0750: the logs are considered sensitive information.
- /var/run/dmesg.boot to 0640: this is also sensitive information.
  * Added a group sudoers and made sudo setuid only to users in
sudoers: would have avoided trouble with recent sudo exploit if
only trusted users have slaves.

As for using sudo to grant privilege, for each master-slave
relationship between users u and v, I have added a line like
u ALL = (v) NOPASSWD: ALL to /etc/sudoers. Then the user u is
supposed to become v by issuing sudo -i -u v and to execute a
command as v by issuing sudo -i -u v 

It is worth noticing that sudo closes all file descriptors greater than
or equal to 3. It is important not to let your pseudo-terminal leak
through file descriptors 0, 1 and 2 if you have a shell connected to
it.  Also, the -i is mandatory because otherwise a file descriptor
open at directory . is leaked via the cwd file descriptor. I
believe this is enough, but since this is not properly documented, I
am not sure.

As for resource limiting via rctl(8), for each user u root does not
trust, I have added three rules:
  * user:u:vmemoryuse:deny=MEM
  * user:u:maxproc:deny=PROCS
  * user:u:pseudoterminals:deny=0

Here MEM and PROCS are limits on total virtual memory usage and
total occupied entries in the process table for process u,
respectively. Furthermore, I never give access to pseudo-terminals to
untrusted users because all sessions are started from ssh or ptys of
trusted users. Also, ptys must be available otherwise trusted users can
not work on the machine. Finally, I have noticed rctl -u user:u
reports a single pty open for user u no matter how many open ptys u has
(except of course if u has no open pty, in which case 0 is reported).

One naively would expect these restrictions to be enough to prevent
abuse (trashing or DoS) as long as the sum of the MEM values (rounded
up to page size) is less than or equal to the total physical memory
plus swap space less the system (and trusted users') memory usage and
the sum of the PROC values is less than the process table size minus
the number of trusted processes. I sincerely do not know if this is the
case.

However, using vmemoryuse as a limit is overkill: it counts the total
mapped pages, not the total anonymous pages, which are the ones that
actually take resources. Of course, this assumes the memory management
data structures (including the page table) are accounted as anonymous
memory of the corresponding process, since it is easy (especially on
amd64), to map pages sparsely to greatly increase the size of the
page table. However, I do not know if this assumption holds on

Fw: Merry Christmas from the FreeBSD Security Team

2011-12-23 Thread Bas Smeelen
_  
From: FreeBSD Security Officer [mailto:cperc...@freebsd.org]
To: freebsd-secur...@freebsd.org
Sent: Fri, 23 Dec 2011 16:41:20 +0100
Subject: Merry Christmas from the FreeBSD Security Team

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi all,

No, the Grinch didn't steal the FreeBSD security officer GPG key, and your eyes
aren't deceiving you: We really did just send out 5 security advisories.

The timing, to put it bluntly, sucks.  We normally aim to release advisories on
Wednesdays in order to maximize the number of system administrators who will be
at work already; and we try very hard to avoid issuing advisories any time close
to holidays for the same reason.  The start of the Christmas weekend -- in some
parts of the world it's already Saturday -- is absolutely not when we want to be
releasing security advisories.

Unfortunately my hand was forced: One of the issues (FreeBSD-SA-11:08.telnetd)
is a remote root vulnerability which is being actively exploited in the wild;
bugs really don't come any worse than this.  On the positive side, most people
have moved past telnet and on to SSH by now; but this is still not an issue we
could postpone until a more convenient time.

While I'm writing, a note to freebsd-update users: FreeBSD-SA-11:07.chroot has a
rather messy fix involving adding a new interface to libc; this has the awkward
side effect of causing the sizes of some symbols (aka. functions) in libc to
change, resulting in cascading changes into many binaries.  The long list of
updated files is irritating, but isn't a sign that anything in freebsd-update
went wrong.

- -- 
Colin Percival
Security Officer, FreeBSD | freebsd.org | The power to serve
Founder / author, Tarsnap | tarsnap.com | Online backups for the truly paranoid
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.18 (FreeBSD)

iEYEARECAAYFAk70oR8ACgkQFdaIBMps37IHEwCeNT8dws04qyJ8yuOz7g2xd9Xs
IsoAn0QfaSE6i90zFBuk1k0isvrDMYO3
=p94J
-END PGP SIGNATURE-

merry Christmas

Disclaimer: http://www.ose.nl/email

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: [Spam] Fw: Merry Christmas from the FreeBSD Security Team

2011-12-23 Thread Daniel Staal
--As of December 23, 2011 5:45:42 PM +0100, Bas Smeelen is alleged to have 
said:



While I'm writing, a note to freebsd-update users:
FreeBSD-SA-11:07.chroot has a rather messy fix involving adding a new
interface to libc; this has the awkward side effect of causing the sizes
of some symbols (aka. functions) in libc to change, resulting in
cascading changes into many binaries.  The long list of updated files is
irritating, but isn't a sign that anything in freebsd-update went wrong.


--As for the rest, it is mine.

I appreciate the hard work, though I could wish it were better timed.  ;)

However, the above does worry me a bit: Is that same library change likely 
to affect ports?  Any way to tell which, if so?  (Or should I just start 
reinstalling everything...)


Daniel T. Staal

---
This email copyright the author.  Unless otherwise noted, you
are expressly allowed to retransmit, quote, or otherwise use
the contents for non-commercial purposes.  This copyright will
expire 5 years after the author's death, or in 30 years,
whichever is longer, unless such a period is in excess of
local copyright law.
---
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: FreeBSD Security Advisory FreeBSD-SA-09:12.bind

2009-08-02 Thread Tim Judd
Trying to apply this to a 6.4 box with no manpages install.  Install
fails because the man3 directory doesn't exist.  is this expected?
Adding the src.conf knob of WITHOUT_MAN=1 still prevents the updated
libraries to install.

I'm just following the directions on the advisory and doesn't install
cleanly.  I'm not running named/bind on the box, so there is no
immediate pressure, but I'd still like to apply the fix.



Thanks!
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Freebsd-update and Freebsd Security Advisory

2007-07-12 Thread Zbigniew Szalbot

Dear all,

I hope you can help me understand various ways to patch FBSD system. Today
I got a FreeBSD Security Advisory which advised me to apply
libarchive.patch. Which I did. All went file. But then I issued
freebsd-update fetch and the system fetched two metapatches or so. I went
ahead and installed them (it took less than a second) so don't know if they
were really installed. I guess these were the same patches for libarchive.

I think I am doing a bad thing mixing these two patching systems. What
should I do now? Should I go back and revert some changes?

FreeBSD szalbot.homedns.org 6.2-RELEASE-p5 FreeBSD 6.2-RELEASE-p5 #3: Wed
Jul  4 08:21:48 CEST 2007
[EMAIL PROTECTED]:/usr/obj/usr/src/sys/SZALBOT  i386

When I issue freebsd-update fetch, I get

Looking up update.FreeBSD.org mirrors... 1 mirrors found.
Fetching metadata signature from update1.FreeBSD.org... done.
Fetching metadata index... done.
Inspecting system... done.
Preparing to download files... done.

No updates needed to update system to 6.2-RELEASE-p6.

Am I safe to continue patching the system either way or should I keep only
to one?

Many thanks for your advice!

Warm regards,

Zbigniew Szalbot

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: Freebsd-update and Freebsd Security Advisory

2007-07-12 Thread Olivier Nicole
 I think I am doing a bad thing mixing these two patching systems. What
 should I do now? Should I go back and revert some changes?

No it seems you don't need to revert anything. But you should avoid
mixing in the future.

 No updates needed to update system to 6.2-RELEASE-p6.

That is already the last update, so there is nothing more needed,
freebsd-update detected that.

You were 6.2-RELEASE-p5 which was the last before the libarchive,
patched libarchive, so you are p6 which is OK.

 Am I safe to continue patching the system either way or should I keep only
 to one?

I don't know how freebsd-update works, so I cannot tell you what is
safe doing, except do not mix.

I know that for system patch, I will either apply the patch manually
and rebuild the kernel, or update the full system and rebuild
everything, depending on my mood and on the possible impact on the
system. I just try to keep trak of what I have done.

Best regards,

Olivier
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


RE: [FreeBSD-Announce] FreeBSD Security AdvisoryFreeBSD-SA-06:23.openssl [REVISED]

2006-09-30 Thread Pascal Bleyler
HI,

 -Original Message-
 From: [EMAIL PROTECTED] 
 [mailto:[EMAIL PROTECTED] On Behalf Of 
 FreeBSD Security Advisories
 Sent: Friday, September 29, 2006 4:00 PM
 To: FreeBSD Security Advisories
 Subject: [FreeBSD-Announce] FreeBSD Security 
 AdvisoryFreeBSD-SA-06:23.openssl [REVISED]
 
 
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 ==
 ===
 FreeBSD-SA-06:23.openssl
 Security Advisory
   The 
 FreeBSD Project
 
 Topic:  Multiple problems in crypto(3)
..snip.. 
 1) Upgrade your vulnerable system to 4-STABLE, 5-STABLE, or 
 6-STABLE, or to the RELENG_6_1, RELENG_6_0, RELENG_5_5, 
 RELENG_5_4, RELENG_5_3, or RELENG_4_11 security branch dated 
 after the correction date.
 
 2) To patch your present system:
 
 The following patch has been verified to apply to FreeBSD 
 4.11, 5.3, 5.4, 5.5, 6.0, and 6.1 systems.
 
 a) Download the patch from the location below, and verify the 
 detached PGP signature using your PGP utility.
 
 # fetch http://security.FreeBSD.org/patches/SA-06:23/openssl.patch
 # fetch http://security.FreeBSD.org/patches/SA-06:23/openssl.patch.asc
 b) Execute the following commands as root:
 
 # cd /usr/src
 # patch  /path/to/patch
 
 c) Recompile the operating system as described in
 URL: http://www.freebsd.org/handbook/makeworld.html and 
 reboot the system.


I have done these 3 steps already:
# make buildworld
# make buildkernel
# make installkernel

Do i need to do these steps too?
# mergemaster -p
# make installworld
# mergemaster

I have FreeBSD 6.1 Release

Thanks for your help
Pascal Bleyler

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: [FreeBSD-Announce] FreeBSD Security AdvisoryFreeBSD-SA-06:23.openssl [REVISED]

2006-09-30 Thread Matthew Seaman
Pascal Bleyler wrote:
 ==
 ===
 FreeBSD-SA-06:23.openssl
 Security Advisory

[snip]

 I have done these 3 steps already:
 # make buildworld
 # make buildkernel
 # make installkernel
 
 Do i need to do these steps too?
 # mergemaster -p
 # make installworld
 # mergemaster
 
 I have FreeBSD 6.1 Release

Yes, you absolutely do need to do those steps.  The OpenSSL
vulnerabilities were in various shared libraries installed as part of
the base system.  Just replacing the kernel won't do a thing to fix
those shlibs.  'make installworld' will, and you need to run mergemaster
to keep your /etc files in sync with the rest of the world.

Cheers,

Matthew

-- 
Dr Matthew J Seaman MA, D.Phil.   7 Priory Courtyard
  Flat 3
PGP: http://www.infracaninophile.co.uk/pgpkey Ramsgate
  Kent, CT11 9PW



signature.asc
Description: OpenPGP digital signature


Fw: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-06:23.openssl

2006-09-28 Thread Bill Moran

Can anyone define exceptionally large as noted in this statement?:

NOTE ALSO: The above patch reduces the functionality of libcrypto(3) by
prohibiting the use of exceptionally large public keys.  It is believed
that no existing applications legitimately use such key lengths as would
be affected by this change.

It would be nice if exceptionally large were replaced with keys in
excess of x bits in size or something.  I don't expect that this will
affect me, but ambiguous statements like that make me uncomfortable.

Begin forwarded message:

Date: Thu, 28 Sep 2006 13:13:53 GMT
From: FreeBSD Security Advisories [EMAIL PROTECTED]
To: FreeBSD Security Advisories [EMAIL PROTECTED]
Cc: 
Subject: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-06:23.openssl


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

=
FreeBSD-SA-06:23.opensslSecurity Advisory
  The FreeBSD Project

Topic:  Multiple problems in crypto(3)

Category:   contrib
Module: openssl
Announced:  2006-09-28
Credits:Dr S N Henson, Tavis Ormandy, Will Drewry
Affects:All FreeBSD releases.
Corrected:  2006-09-28 13:02:37 UTC (RELENG_6, 6.1-PRERELEASE)
2006-09-28 13:03:14 UTC (RELENG_6_1, 6.1-RELEASE-p8)
2006-09-28 13:03:41 UTC (RELENG_6_0, 6.0-RELEASE-p13)
2006-09-28 13:03:57 UTC (RELENG_5, 5.5-STABLE)
2006-09-28 13:04:16 UTC (RELENG_5_5, 5.5-RELEASE-p6)
2006-09-28 13:04:47 UTC (RELENG_5_4, 5.4-RELEASE-p20)
2006-09-28 13:05:08 UTC (RELENG_5_3, 5.3-RELEASE-p35)
2006-09-28 13:05:59 UTC (RELENG_4, 4.11-STABLE)
2006-09-28 13:06:23 UTC (RELENG_4_11, 4.11-RELEASE-p23)
CVE Name:   CVE-2006-2937, CVE-2006-2940, CVE-2006-3738, CVE-2006-4343

For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit URL:http://security.FreeBSD.org/.

I.   Background

FreeBSD includes software from the OpenSSL Project.  The OpenSSL Project is
a collaborative effort to develop a robust, commercial-grade, full-featured,
and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols as well as a full-strength
general purpose cryptography library.

II.  Problem Description

Several problems have been found in OpenSSL:

1. During the parsing of certain invalid ASN1 structures an error condition
is mishandled, possibly resulting in an infinite loop.  [CVE-2006-2937]

2. A buffer overflow exists in the SSL_get_shared_ciphers function.
[CVE-2006-3738]

3. A NULL pointer may be dereferenced in the SSL version 2 client code.
[CVE-2006-4343]

In addition, many applications using OpenSSL do not perform any validation
of the lengths of public keys being used. [CVE-2006-2940]

III. Impact

Servers which parse ASN1 data from untrusted sources may be vulnerable to
a denial of service attack. [CVE-2006-2937]

An attacker accessing a server which uses SSL version 2 may be able to
execute arbitrary code with the privileges of that server.  [CVE-2006-3738]

A malicious SSL server can cause clients connecting using SSL version 2 to
crash. [CVE-2006-4343]

Applications which perform public key operations using untrusted keys may
be vulnerable to a denial of service attack. [CVE-2006-2940]

IV.  Workaround

No workaround is available, but not all of the vulnerabilities mentioned
affect all applications.

V.   Solution

Perform one of the following:

1) Upgrade your vulnerable system to 4-STABLE, 5-STABLE, or 6-STABLE,
or to the RELENG_6_1, RELENG_6_0, RELENG_5_5, RELENG_5_4, RELENG_5_3,
or RELENG_4_11 security branch dated after the correction date.

2) To patch your present system:

The following patches have been verified to apply to FreeBSD 4.11, 5.3,
5.4, 5.5, 6.0, and 6.1 systems.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# fetch http://security.FreeBSD.org/patches/SA-06:23/openssl.patch
# fetch http://security.FreeBSD.org/patches/SA-06:23/openssl.patch.asc

b) Execute the following commands as root:

# cd /usr/src
# patch  /path/to/patch

c) Recompile the operating system as described in
URL: http://www.freebsd.org/handbook/makeworld.html and reboot the
system.

NOTE: Any third-party applications, including those installed from the
FreeBSD ports collection, which are statically linked to libcrypto(3)
should be recompiled in order to use the corrected code.

NOTE ALSO: The above patch reduces the functionality of libcrypto(3) by
prohibiting the use of exceptionally large public keys.  It is believed
that no existing applications legitimately use such key lengths as would
be affected by this change.

VI

Re: Fw: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-06:23.openssl

2006-09-28 Thread Colin Percival
Bill Moran wrote:
 Can anyone define exceptionally large as noted in this statement?:
 
 NOTE ALSO: The above patch reduces the functionality of libcrypto(3) by
 prohibiting the use of exceptionally large public keys.  It is believed
 that no existing applications legitimately use such key lengths as would
 be affected by this change.
 
 It would be nice if exceptionally large were replaced with keys in
 excess of x bits in size or something.  I don't expect that this will
 affect me, but ambiguous statements like that make me uncomfortable.

DH and DSA are limited to 1 bits.  RSA is limited to 16400 or 4112 bits
depending upon whether the public exponent is less or more than 72 bits.

I wouldn't have allowed this change into the security branches if I was not
very very confident that no applications would be affected by this.

Colin Percival
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: Fw: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-06:23.openssl

2006-09-28 Thread Bill Moran
In response to Colin Percival [EMAIL PROTECTED]:

 Bill Moran wrote:
  Can anyone define exceptionally large as noted in this statement?:
  
  NOTE ALSO: The above patch reduces the functionality of libcrypto(3) by
  prohibiting the use of exceptionally large public keys.  It is believed
  that no existing applications legitimately use such key lengths as would
  be affected by this change.
  
  It would be nice if exceptionally large were replaced with keys in
  excess of x bits in size or something.  I don't expect that this will
  affect me, but ambiguous statements like that make me uncomfortable.
 
 DH and DSA are limited to 1 bits.  RSA is limited to 16400 or 4112 bits
 depending upon whether the public exponent is less or more than 72 bits.
 
 I wouldn't have allowed this change into the security branches if I was not
 very very confident that no applications would be affected by this.
 
 Colin Percival

I'm not questioning your ability to make these decisions, Colin.
Far, far from it.

I'm the type that is made uncomfortable by any statement that reads
_anything_ like don't worry, we've taken care of it.  

Take that email as two separate statements:
1) I'm curious as to exactly how big exceptionally large is.
2) I think this security advisory could be improved by including the
   answer to #1.

Thanks for the quick response, and all the work you do.

-- 
Bill Moran
Collaborative Fusion Inc.
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


RE: FreeBSD Security Survey

2006-05-22 Thread Ted Mittelstaedt

Colin,

  Just a couple problems with the survey:

Question #6 needs a Sometimes as it is not going to be a yes
or no question for many people.

Your also ignoring the fact that many security holes are a lot
easier to ignore and just block off the affected service.  For example
we run an older RADIUS daemon that has the hole in it that CERT
documented a few years ago.  But we restrict incoming radius
queries to this server to the NAS only.  When the FreeBSD telnetd
problem came out a few years back I didn't bother patching systems,
I just disabled telnetd and waited until it was time to replace the
server with a new version of FreeBSD.

The thing is, though, that when your dealing with a production
server you really have to understand what is involved to apply a
patch.  You don't just go to a production system that a lot of people
are using and run some automated patch-me program that fucks around
with a bunch of files on that server under the hood.  You have to
apply the patch to a test system, by hand, to know exactly what
it's changing, then run your test suite on the test system to make
sure the production system isn't going to tank when you touch it,
then schedule a time to touch the production system and patch it,
and make sure you have plenty of time in your schedule available
post-patch just in case something reacts wrong.

  And, when the FBSD system is a server you have built under spec
for a customer, it's a whole different ballgame because before you
spend a minute of time on it, you have to go to the customer and
tell them a security patch came out for their server and they got to
pay you a couple hundred bucks to install it on their server you
built for them.  Your not going to work for free.  And the customer
may take the attitude that they are planning on replacing the server
in 6 months anyway, and at that time you can just use a new version of
FBSD that doesen't have the hole, and they are just going to take
their chances until then.

  In that situation even if patching their server was merely a matter of
spending 2 minutes logging into it and running an updater, you still
wouldn't
do it and you know why?  Because the second you start doing work for
that customer for free, they are going to expect it.  It's better from
a business perspective for you to warn them their server is open and
they have to pay you to patch it, have them decline for the moment
and leave it unpatched because they are going to gamble for another
6 months that it won't be attacked, and then have a cracker bust it up
so you can tell them I told you we needed to patch that and you decided
to cheap out, look what you get  (of course you say it in a more
diplomatic way)

  Your survey responses lack any responses that indicate that leaving
the system unpatched may be deliberately done, for monetary reasons,
your responses in the survey assume that all system admins that
understand the security implications of leaving a system wide open
are going to always patch them, and only ignorant/newbie system
admins are going to run an unpatched system.

  And the other problem too is that there's still a lot of hardware
out there that runs FreeBSD 4.11 much better than 5.X and later.
I have a number of Compaq dual-PPro deskpros for example that work
fine under 4.11 but run slow as molassas under newer versions of
FreeBSD.  send-pr reports are pointless here since many people
have already complained about such behavior with a lot of different
gear, and it appears all the FBSD developers today are building
on nice new gigahertz hardware not old stuff, and have the attitude
to just scrap the old hardware, and buy new, it's cheap enough.

  You need to add another question like:

X) why are you running an obsolete version of FreeBSD:

  ) hardware I have doesen't work well with newer versions of FBSD

  But, I realize that very likely you won't add this because it's
not something the FBSD development team wants to hear.  (ie: spend
more time optimizing and working through the PR database and less time
coming out with new gee-whiz FBSD versions and trying to get people to
upgrade)

  Good luck with it, but understand also that the same issues apply to
patching Windows systems.  When we install a Windows server, we never
turn on auto-updates, we only do this for desktops.  And before applying
a MS patch to a Windows server it has to go through the same rigamarole
of testing and such that a patch to a FBSD server would.  Too many times
in the past, patches have broken application software.

Ted

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Colin Percival
Sent: Sunday, May 21, 2006 10:34 PM
To: FreeBSD Questions
Subject: FreeBSD Security Survey


Dear FreeBSD users and system administrators,

While the FreeBSD Security Team has traditionally been very good at
investigating and responding to security issues in FreeBSD, this only
solves half of the security problem: Unless users

RE: FreeBSD Security Survey

2006-05-22 Thread Gayn Winters
 [mailto:[EMAIL PROTECTED] On Behalf Of Ted 
 Mittelstaedt
 Sent: Sunday, May 21, 2006 11:20 PM
 To: Colin Percival; FreeBSD Questions
 Subject: RE: FreeBSD Security Survey
 
 Colin,
 
   Just a couple problems with the survey:
 
 Question #6 needs a Sometimes as it is not going to be a yes
 or no question for many people.
 
 Your also ignoring the fact that many security holes are a lot
 easier to ignore and just block off the affected service.  For example
 we run an older RADIUS daemon that has the hole in it that CERT
 documented a few years ago.  But we restrict incoming radius
 queries to this server to the NAS only.  When the FreeBSD telnetd
 problem came out a few years back I didn't bother patching systems,
 I just disabled telnetd and waited until it was time to replace the
 server with a new version of FreeBSD.
 
 The thing is, though, that when your dealing with a production
 server you really have to understand what is involved to apply a
 patch.  You don't just go to a production system that a lot of people
 are using and run some automated patch-me program that fucks around
 with a bunch of files on that server under the hood.  You have to
 apply the patch to a test system, by hand, to know exactly what
 it's changing, then run your test suite on the test system to make
 sure the production system isn't going to tank when you touch it,
 then schedule a time to touch the production system and patch it,
 and make sure you have plenty of time in your schedule available
 post-patch just in case something reacts wrong.
 
   And, when the FBSD system is a server you have built under spec
 for a customer, it's a whole different ballgame because before you
 spend a minute of time on it, you have to go to the customer and
 tell them a security patch came out for their server and they got to
 pay you a couple hundred bucks to install it on their server you
 built for them.  Your not going to work for free.  And the customer
 may take the attitude that they are planning on replacing the server
 in 6 months anyway, and at that time you can just use a new version of
 FBSD that doesen't have the hole, and they are just going to take
 their chances until then.
 
   In that situation even if patching their server was merely 
 a matter of
 spending 2 minutes logging into it and running an updater, you still
 wouldn't
 do it and you know why?  Because the second you start doing work for
 that customer for free, they are going to expect it.  It's better from
 a business perspective for you to warn them their server is open and
 they have to pay you to patch it, have them decline for the moment
 and leave it unpatched because they are going to gamble for another
 6 months that it won't be attacked, and then have a cracker bust it up
 so you can tell them I told you we needed to patch that and 
 you decided
 to cheap out, look what you get  (of course you say it in a more
 diplomatic way)
 
   Your survey responses lack any responses that indicate that leaving
 the system unpatched may be deliberately done, for monetary reasons,
 your responses in the survey assume that all system admins that
 understand the security implications of leaving a system wide open
 are going to always patch them, and only ignorant/newbie system
 admins are going to run an unpatched system.
 
   And the other problem too is that there's still a lot of hardware
 out there that runs FreeBSD 4.11 much better than 5.X and later.
 I have a number of Compaq dual-PPro deskpros for example that work
 fine under 4.11 but run slow as molassas under newer versions of
 FreeBSD.  send-pr reports are pointless here since many people
 have already complained about such behavior with a lot of different
 gear, and it appears all the FBSD developers today are building
 on nice new gigahertz hardware not old stuff, and have the attitude
 to just scrap the old hardware, and buy new, it's cheap enough.
 
   You need to add another question like:
 
 X) why are you running an obsolete version of FreeBSD:
 
   ) hardware I have doesen't work well with newer versions of FBSD
 
   But, I realize that very likely you won't add this because it's
 not something the FBSD development team wants to hear.  (ie: spend
 more time optimizing and working through the PR database and less time
 coming out with new gee-whiz FBSD versions and trying to get people to
 upgrade)
 
   Good luck with it, but understand also that the same issues apply to
 patching Windows systems.  When we install a Windows server, we never
 turn on auto-updates, we only do this for desktops.  And 
 before applying
 a MS patch to a Windows server it has to go through the same 
 rigamarole
 of testing and such that a patch to a FBSD server would.  Too 
 many times
 in the past, patches have broken application software.
 
 Ted

Colin,

I had the same problem with #6 and also with #12.  #9, which 
offered a time-line, was better.  All needed an other field.

In my case, the servers aren't

Re: FreeBSD Security Survey

2006-05-22 Thread Alex Zbyslaw
I'd have to agree with most of Ted and Gayn's points.  Also, it's hard 
to answer many of the questions when they are different for different 
servers.  Unless there is a serious bug in something like SSH, then a 
paying client with a seriously firewalled server and no malicious users 
might get upgraded every four months.  My own server might get upgraded 
weekly when I'm not too busy, or not for four months when I am.  But a 
security bug with a network service would get much more immediate 
attention.  If I still administered machines in an academic environment, 
my answers would be quite different, but the risk analysis that led to 
the different answers would (theoretically) be the same.


--Alex


___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


FreeBSD Security Survey

2006-05-21 Thread Colin Percival
Dear FreeBSD users and system administrators,

While the FreeBSD Security Team has traditionally been very good at
investigating and responding to security issues in FreeBSD, this only
solves half of the security problem: Unless users and administrators
of FreeBSD systems apply the security patches provided, the advisories
issued accomplish little beyond alerting potential attackers to the
presence of vulnerabilities.

The Security Team has been concerned for some time by anecdotal reports
concerning the number of FreeBSD systems which are not being promptly
updated or are running FreeBSD releases which have passed their End of
Life dates and are no longer supported. In order to better understand
which FreeBSD versions are in use, how people are (or aren't) keeping
them updated, and why it seems so many systems are not being updated, I
have put together a short survey of 12 questions. The information gathered
will inform the work done by the Security Team, as well as my own personal
work on FreeBSD this summer.

If you administrate system(s) running FreeBSD (in the broad sense of are
responsible for keeping system(s) secure and up to date), please visit
  http://people.freebsd.org/~cperciva/survey.html
and complete the survey below before May 31st, 2006.

Thanks,
Colin Percival
FreeBSD Security Officer

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-06:07.pf

2006-01-25 Thread Brian A. Seklecki



III. Impact

By sending carefully crafted sequence of IP packet fragments, a remote
attacker can cause a system running pf with a ruleset containing a
'scrub fragment crop' or 'scrub fragment drop-ovl' rule to crash.

IV.  Workaround

Do not use 'scrub fragment crop' or 'scrub fragment drop-ovl' rules
on systems running pf.  In most cases, such rules can be replaced by
'scrub fragment reassemble' rules; see the pf.conf(5) manual page for


All:

Just to clarify on the syntax, since it's not actually mentioned in 
pf.conf(5):


Per the PF FAQ, a rule:

scrub in all or scrub all

Implies scrub in all fragment reassemble as a default argument/flags to 
scrub when not are specified, and none of the other scrubbing options 
(no-df, random-id, etc.).  This per observation of pfctl -s all:


$ sudo grep -i scrub /etc/pf.conf
scrub in all
$ sudo pfctl -s all | grep -i scrub
scrub in all fragment reassemble

Correct?

To the credit of the FAQ Author, it does state This is the default 
behavior when no fragment option is specified. ... but that still begs 
the question: What are the default scrubbing options, other than fragment 
reassembly, when none are specified?


Might be useful to mention these things in the FAQ and the advisory.

TIA,
~lava


more details.

Systems which do not use pf, or use pf but do not use the aforementioned
rules, are not affected by this issue.


___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


open source freebsd security appliance project

2006-01-23 Thread Vincent Chen
Hi, all

I have tried to build a security applicance based on FreeBSD 4.7 since 2001.
Which contains:

central syslog server (syslogd)
ntp sevice (ntpd)
dhcp server (dhcpd)
dns (bind)

IPSec (ipsec-tools)
PPTP (mpd)

firewall (ipfilter)
traffic shape (ALTQ)
IDS (snort)

Utilization monitor (MRTG)

Web console including
1. report system for firewall, ids, system
2. configuration interface for some sub-system (not actually working yet)


Recently, I upgraded this appliance to FreeBSD 6.0. Now I got:

* a new list of required package
* a custom kernel configuration file for 6.0
* collection of my custom packages (mostly perl based)

Old web pages for this appliance avaliable here:

http://isolution.dyndns.biz/en/si/sc/feature.html

Some code are broken after upgrade to 6.0. A document to put them all togather
is not completed yet. I plan to start a open source project base on current
resource and the goal is to build a small and compact FreeBSD security
appliance, most importantly cost effective. The first step is starting a close
test before release it to public and discuss how to proceed. If you are FreeBSD
power user and interested, you are welcome to contact me and receive a copy of
current work. Any suggestions are always welcome.


Vincent Chen





___  最新版 Yahoo!奇摩即時通訊 
7.0,免費網路電話任你打!  http://messenger.yahoo.com.tw/
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: open source freebsd security appliance project

2006-01-23 Thread Danial Thom
The question of the day is: why are you porting
it to 6.0? Have you proven that its better?

There are many commercial appliances that are
sticking with 4.x because its more suitable for
that kind of application. The issue with an
open-source type of appliance is capacity; The
kind of people that really need such an appliance
AND have the talent in house to benefit from it
usually need more than ALTQ and IPFIREWALL can
deliver. You'll only diminish that by going to
6.0, while also introducing the one thing that
will keep anyone from using any product:
instability. After all, a slow stable appliance
is of some use to some people; while even a
really fast unstable appliance is of use to
no-one at all.

DT

--- Vincent Chen [EMAIL PROTECTED] wrote:

 Hi, all
 
 I have tried to build a security applicance
 based on FreeBSD 4.7 since 2001.
 Which contains:
 
 central syslog server (syslogd)
 ntp sevice (ntpd)
 dhcp server (dhcpd)
 dns (bind)
 
 IPSec (ipsec-tools)
 PPTP (mpd)
 
 firewall (ipfilter)
 traffic shape (ALTQ)
 IDS (snort)
 
 Utilization monitor (MRTG)
 
 Web console including
 1. report system for firewall, ids, system
 2. configuration interface for some sub-system
 (not actually working yet)
 
 
 Recently, I upgraded this appliance to FreeBSD
 6.0. Now I got:
 
 * a new list of required package
 * a custom kernel configuration file for 6.0
 * collection of my custom packages (mostly perl
 based)
 
 Old web pages for this appliance avaliable
 here:
 

http://isolution.dyndns.biz/en/si/sc/feature.html
 
 Some code are broken after upgrade to 6.0. A
 document to put them all togather
 is not completed yet. I plan to start a open
 source project base on current
 resource and the goal is to build a small and
 compact FreeBSD security
 appliance, most importantly cost effective. The
 first step is starting a close
 test before release it to public and discuss
 how to proceed. If you are FreeBSD
 power user and interested, you are welcome to
 contact me and receive a copy of
 current work. Any suggestions are always
 welcome.
 
 
 Vincent Chen
 
 
 
 
 

___
  ³Ì·sª© Yahoo!©_¼¯§Y®É³q°T
 7.0¡A§K¶Oºô¸ô¹q¸Ü¥ô§A¥´¡I 
 http://messenger.yahoo.com.tw/
 ___
 freebsd-questions@freebsd.org mailing list

http://lists.freebsd.org/mailman/listinfo/freebsd-questions
 To unsubscribe, send any mail to
 [EMAIL PROTECTED]
 


__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


News Article: FreeBSD Security

2005-07-04 Thread Remington L
We might want to update the FreeBSD Press section. This is a recent 
article from SecurityFocus which discusses FreeBSD security vs Linux
http://www.securityfocus.com/news/11230
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: News Article: FreeBSD Security

2005-07-04 Thread Kris Kennaway
On Mon, Jul 04, 2005 at 07:37:02AM -0700, Remington L wrote:
 We might want to update the FreeBSD Press section. This is a recent 
 article from SecurityFocus which discusses FreeBSD security vs Linux
 http://www.securityfocus.com/news/11230

Talk to [EMAIL PROTECTED] or submit a PR.

Kris


pgpnRtvUvdgS3.pgp
Description: PGP signature


[FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-04:16.fetch

2004-11-18 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

=
FreeBSD-SA-04:16.fetch  Security Advisory
  The FreeBSD Project

Topic:  Overflow error in fetch

Category:   core
Module: fetch
Announced:  2004-11-18
Credits:Colin Percival
Affects:All FreeBSD versions.
Corrected:  2004-11-18 12:02:13 UTC (RELENG_5, 5.3-STABLE)
2004-11-18 12:03:05 UTC (RELENG_5_3, 5.3-RELEASE-p1)
2004-11-18 12:04:29 UTC (RELENG_5_2, 5.2.1-RELEASE-p12)
2004-11-18 12:05:36 UTC (RELENG_5_1, 5.1-RELEASE-p18)
2004-11-18 12:05:50 UTC (RELENG_5_0, 5.0-RELEASE-p22)
2004-11-18 12:02:29 UTC (RELENG_4, 4.10-STABLE)
2004-11-18 12:06:06 UTC (RELENG_4_10, 4.10-RELEASE-p4)
2004-11-18 12:06:22 UTC (RELENG_4_9, 4.9-RELEASE-p13)
2004-11-18 12:06:36 UTC (RELENG_4_8, 4.8-RELEASE-p26)
2004-11-18 12:06:52 UTC (RELENG_4_7, 4.7-RELEASE-p28)
FreeBSD only:   YES

For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit
URL:http://www.freebsd.org/security/.

I.   Background

The fetch(1) utility is a tool for fetching files via FTP, HTTP, and HTTPS.

II.  Problem Description

An integer overflow condition in the processing of HTTP headers can result
in a buffer overflow.

III. Impact

A malicious server or CGI script can respond to an HTTP or HTTPS request in
such a manner as to cause arbitrary portions of the client's memory to be
overwritten, allowing for arbitrary code execution.

IV.  Workaround

There is no known workaround for the affected application, although
the ftp(1) application in the FreeBSD base system, and several 
applications in the FreeBSD Ports collection provide similar 
functionality and could be used in place of fetch(1).

V.   Solution

Perform one of the following:

1) Upgrade your vulnerable system to 4-STABLE or 5-STABLE, or to the
RELENG_5_3, RELENG_5_2, RELENG_4_10, or RELENG_4_8 security branch dated
after the correction date.

2) To patch your present system:

The following patches have been verified to apply to FreeBSD 4.8, 4.10,
5.2, and 5.3 systems.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# ftp ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-04:16/fetch.patch
# ftp ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-04:16/fetch.patch.asc

b) Execute the following commands as root:

# cd /usr/src
# patch  /path/to/patch
# cd /usr/src/usr.bin/fetch
# make obj  make depend  make  make install

3) IMPORTANT NOTE to users of FreeBSD Update:

FreeBSD Update (security/freebsd-update in the FreeBSD Ports collection)
is a binary security update system for the FreeBSD base system.  It is 
not supported or endorsed by the FreeBSD Security team, but its author
has requested that the following note be included in this advisory:

  FreeBSD Update uses the fetch(1) utility for downloading security
  updates to the FreeBSD base system.  While these updates are 
  cryptographically signed, and FreeBSD Update is therefore immune from
  most attacks, it is exposed to this vulnerability since the files
  must be fetched before their integrity can be verified.

  As a workaround, FreeBSD Update can be made to use the ftp(1) utility
  for downloading updates as follows:

  # sed -i.bak -e 's/fetch -qo/ftp -o/' /usr/local/sbin/freebsd-update
  # freebsd-update fetch
  # mv /usr/local/sbin/freebsd-update.bak /usr/local/sbin/freebsd-update
  # freebsd-update install

VI.  Correction details

The following list contains the revision numbers of each file that was
corrected in FreeBSD.

Branch   Revision
  Path
- -
RELENG_4
  src/usr.bin/fetch/fetch.c 1.10.2.28
RELENG_4_10
  src/UPDATING  1.73.2.90.2.5
  src/sys/conf/newvers.sh   1.44.2.34.2.6
  src/usr.bin/fetch/fetch.c 1.10.2.23.2.1
RELENG_4_9
  src/UPDATING 1.73.2.89.2.14
  src/sys/conf/newvers.sh  1.44.2.32.2.14
  src/usr.bin/fetch/fetch.c 1.10.2.21.2.1
RELENG_4_8
  src/UPDATING 1.73.2.80.2.29
  src/sys/conf/newvers.sh  1.44.2.29.2.27
  src/usr.bin/fetch/fetch.c 1.10.2.20.2.1
RELENG_4_7
  src/UPDATING 1.73.2.74.2.32
  src/sys/conf/newvers.sh

freebsd-security-announce

2004-08-31 Thread Moti Levy
is this list active ?
i am subscribed to it but received no emails from it in the past three 
months .

anyone knows ?
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: freebsd-security-announce

2004-08-31 Thread Matthew Seaman
On Tue, Aug 31, 2004 at 08:44:43AM -0400, Moti Levy wrote:
 is this list active ?
 i am subscribed to it but received no emails from it in the past three 
 months .
 
 anyone knows ?

It doesn't appear in the list of FreeBSD mailing lists at:

http://lists.freebsd.org/mailman/listinfo

which suggests that it has gone the way of all flesh.

Perhaps [EMAIL PROTECTED] or
[EMAIL PROTECTED] would serve you better.

Cheers,

Matthew

-- 
Dr Matthew J Seaman MA, D.Phil.   26 The Paddocks
  Savill Way
PGP: http://www.infracaninophile.co.uk/pgpkey Marlow
Tel: +44 1628 476614  Bucks., SL7 1TH UK


pgpfC8GUQomYw.pgp
Description: PGP signature


Re: freebsd-security-announce

2004-08-31 Thread Moti Levy
Matthew Seaman wrote:
On Tue, Aug 31, 2004 at 08:44:43AM -0400, Moti Levy wrote:
 

is this list active ?
i am subscribed to it but received no emails from it in the past three 
months .

anyone knows ?
   

It doesn't appear in the list of FreeBSD mailing lists at:
   http://lists.freebsd.org/mailman/listinfo
which suggests that it has gone the way of all flesh.
Perhaps [EMAIL PROTECTED] or
[EMAIL PROTECTED] would serve you better.
Cheers,
Matthew
 

i am subscribed t notifications as well ,
with two diffrent email address .
still no luck :-(
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: freebsd-security-announce

2004-08-31 Thread Radek Kozlowski
On Tue, Aug 31, 2004 at 09:02:23AM -0400, Moti Levy wrote:
 It doesn't appear in the list of FreeBSD mailing lists at:
 
http://lists.freebsd.org/mailman/listinfo
 
 which suggests that it has gone the way of all flesh.
 
 Perhaps [EMAIL PROTECTED] or
 [EMAIL PROTECTED] would serve you better.
 
  Cheers,
 
  Matthew
 
  
 
 i am subscribed t notifications as well ,
 with two diffrent email address .
 still no luck :-(

http://lists.freebsd.org/pipermail/freebsd-security-notifications/

There haven't been any security notifications recently, that's why
you're not receiving any mail.

-Radek
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


freebsd security patches

2004-06-23 Thread bogdan

   Hy I want to know more freebsd contributors' /
users' websites. I searched a lot for links like:
http://www.0xfce3.net/files/freebsd/ or
http://garage.freebsd.pl/ (which contains a lot if
interesting security related patches/programs)

Google is of no help ... I can scarcely find one
or two interesting sites ...

  Can people reading this mail submit freebsd
security related websites ? (related to unnoficial
kernel patches, file patches or programms)

   Please cc me the replies. Thank you,
Bogdan



__
Do you Yahoo!?
Yahoo! Mail - You care about security. So do we.
http://promotions.yahoo.com/new_mail
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


About FreeBSD Security Advisory FreeBSD-SA-04:11.msync

2004-05-27 Thread Andrea Venturoli
** Reply to note from FreeBSD Security Advisories [EMAIL PROTECTED] Wed, 26 May 2004 
13:32:51 +0200 (CEST)

From /usr/src/UPDATING:

NOTE: In some cases involving NFS, the incorrect behaviour may
actually be preferrable.  Setting the vm.old_msync sysctl
variable to 1 will revert msync(2) to its old behaviour.

Just wondering what this means...

 bye  Thanks
av.


___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


/usr/src/UPDATING vs FreeBSD Security Advisory FreeBSD-SA-04:04.tcp

2004-03-06 Thread Stacey Roberts
Hello,
 I've just (with cvsup) started upgrading one of my boxes in line with the recent 
advisory (FreeBSD Security Advisory FreeBSD-SA-04:04.tcp), and I'm at the point where 
I am reading /usr/src/UPDATING as per all recommendations from the HandBook to various 
user group advisories.

However, I noticed that there is no mention of this specific advisory anywhere in 
UPDATING. So.., have I missed something? Here's what I did: -

1] su to root
2] cd /usr/share/examples/cvsup
3] Edit stable-supfile - changed default_host to read *default 
host=cvsup.uk.FreeBSD.org
4] Ran cvsup stable-supfile

Aren't details of this advisory (and others?) supposed to be in /usr/src/UPDATING? I 
only askbecause I'd not want to proceed from this point only to realise later on that 
the system *wasn't* patched after all.

I'd appreciate some advice, or pointer to some change in procedure that I might have 
missed somewhere along the line, please.

Thanks for the time.

Regards,

Stacey
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: /usr/src/UPDATING vs FreeBSD Security Advisory FreeBSD-SA-04:04.tcp

2004-03-06 Thread Cordula's Web
 I've just (with cvsup) started upgrading one of my boxes in
 line with the recent advisory (FreeBSD Security Advisory
 FreeBSD-SA-04:04.tcp), and I'm at the point where I am reading
 /usr/src/UPDATING as per all recommendations from the HandBook
 to various user group advisories.
 
 Aren't details of this advisory (and others?) supposed to be in
 /usr/src/UPDATING? I only askbecause I'd not want to proceed from
 this point only to realise later on that the system *wasn't* patched
 after all.

UPDATING is not the place for this. You'll have to check the
revisions of the files manually against those in the advisory.

-- 
Cordula's Web. http://www.cordula.ws/

___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: /usr/src/UPDATING vs FreeBSD Security Advisory FreeBSD-SA-04:04.tcp

2004-03-06 Thread Stacey Roberts
Hello,
 Thanks for the reply.

- Original Message -
From: Cordula's Web [EMAIL PROTECTED]
To: To [EMAIL PROTECTED]
Date: Sat, 06 Mar, 2004 10:51 GMT
Subject: Re: /usr/src/UPDATING vs FreeBSD Security Advisory FreeBSD-SA-04:04.tcp

  I've just (with cvsup) started upgrading one of my boxes in
  line with the recent advisory (FreeBSD Security Advisory
  FreeBSD-SA-04:04.tcp), and I'm at the point where I am reading
  /usr/src/UPDATING as per all recommendations from the HandBook
  to various user group advisories.
  
  Aren't details of this advisory (and others?) supposed to be in
  /usr/src/UPDATING? I only askbecause I'd not want to proceed from
  this point only to realise later on that the system *wasn't* patched
  after all.
 
 UPDATING is not the place for this. You'll have to check the
 revisions of the files manually against those in the advisory.
 

Okay.., cheers for that. I appreciate your taking the time.

Regards,

Stacey

 -- 
 Cordula's Web. http://www.cordula.ws/
 

-- 
Stacey Roberts
B. Sc (HONS) Computer Science

Web: www.vickiandstacey.com
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


FreeBSD Security Advisory FreeBSD-SA-04:01.mksnap_ffs part 2

2004-01-30 Thread Radko Keves
hi

i read FreeBSD Security Advisory FreeBSD-SA-04:01.mksnap_ffs

and have question about this workaround:

/bin/rm /sbin/mksnap_ffs

isn't better to do:
/bin/chmod u-s /sbin/mksnap_ffs

i think that suid flag is dangerous on this program not program as is
and when suid flag is down program is clear for everyone except root

if is dangerous program, so erase it isn't good workaround, because
every user can compile mksnap_ffs from source but suid flag can give
only root

thank and bye
-- 
The ancient Greeks' concept of a ``personal daemon'' was similar to 
the modern concept of a ``guardian angel'' --- ``eudaemonia'' is the 
state of being helped or protected by a kindly spirit. As a rule, 
UNIX systems seem to be infested with both daemons and demons. 
[Evi Nemeth]
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


FreeBSD security ....

2003-10-28 Thread Shrikant
Dear All ,

Is it possible that i give a Normal (without  wheel rights) user to  access  my server 
using ftp ,and he can only browse thru his home directory not above that .If it is 
possbile pls reply me . 


Shrikant
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD security ....

2003-10-28 Thread Rus Foster
On Tue, 28 Oct 2003, Shrikant wrote:

 Dear All ,

 Is it possible that i give a Normal (without wheel rights) user to
 access my server using ftp ,and he can only browse thru his home
 directory not above that .If it is possbile pls reply me .


This is more to do with the FTP server than normal access. If you install
proftpd you can lock the person in their HomeDirectory using DefaultRoot ~

Also some software will lock someone in if you change their home directory
from

/home/user

to

/home/./user

HTH

Rus

-- 
w: http://www.jvps.com  | Linux + FreeBSD Servers from $15/mo
e: [EMAIL PROTECTED]| Dedicated Servers from $119/mo
t: +44 7919 373537  | email: [EMAIL PROTECTED]
t: 1-888-327-6330   | email: [EMAIL PROTECTED]

___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD security ....

2003-10-28 Thread Edward Epstein
On October 28, 2003 4:34 am, Shrikant wrote:

Dear All ,

Is it possible that i give a Normal (without  wheel rights) user to  access 
 my server using ftp ,and he can only browse thru his home directory not
 above that .If it is possbile pls reply me .

If you create the file /etc/ftpchroot and put the name of the user in that 
file (one name per line), the ftp daemon in the base install will chroot the 
user to their home directory. For exact details and more options, read the 
ftpchroot manual page by typing man ftpchroot at a shell prompt.

Regards,
Ed

-- 

There are people who cheat on their spouse but not at cards, and vice versa, 
and both and neither. Reputation is not necessarily portable from one 
situation to another, and it's not easily expressed.
--Clay Shirkey. (http://www.shirky.com/writings/group_enemy.html)

It has been said that man is a rational animal.  All my life I have
been searching for evidence which could support this.
--Bertrand Russell.

The American empire is ideological, not territorial. We are the most 
ideological people in the world, and we are so united in our view that we 
don't understand there can be other views.
--Lt. Gen. William Odom, ret. (Former Director of NSA).

___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: [Full-Disclosure] FreeBSD Security AdvisoryFreeBSD-SA-03:14.arp [REVISED]

2003-09-26 Thread Michael Scheidell
 
 The following patch has been verified to apply to FreeBSD 5-CURRENT,
 4.9-PRERELEASE, and 4.8 systems.
 
 a) Download the relevant patch from the location below, and verify the
 detached PGP signature using your PGP utility.
 
 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:14/arp.patch
 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:14/arp.patch.asc

patch assume you didn't apply the original patch?

patch  /var/tmp/arp.patch
Hmm...  Looks like a new-style context diff to me...
The text leading up to this was:
--
|Index: sys/netinet/if_ether.c
|===
|RCS file: /home/ncvs/src/sys/netinet/if_ether.c,v
|retrieving revision 1.104
|retrieving revision 1.104.2.1
|diff -c -p -r1.104 -r1.104.2.1
|*** sys/netinet/if_ether.c 4 Mar 2003 23:19:52 -   1.104
|--- sys/netinet/if_ether.c 23 Sep 2003 20:08:42 -  1.104.2.1
--
Patching file sys/netinet/if_ether.c using Plan A...
Hunk #1 failed at 918.
1 out of 1 hunks failed--saving rejects to sys/netinet/if_ether.c.rej
done

-- 
Michael Scheidell, CEO
SECNAP Network Security, LLC 
Sales: 866-SECNAPNET / (1-866-732-6276)
Main: 561-368-9561 / www.secnap.net
Looking for a career in Internet security?
http://www.secnap.net/employment/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


wrong link refference in the freebsd security How-To

2003-03-20 Thread michael dreves
hey there,

Browsing the FreeBSD Security How-To pages i've found a wrong reference.

http://people.freebsd.org/~jkb/howto.html#cvs

In the relaed links sections you point to 

FreeBSD ipfw Configuration Page: http://www.metronet.com/~pgilley/freebsd/ipfw

which does no longer exist.

kind regards,

-michael

-- 
[EMAIL PROTECTED]
Key fingerprint = 8E06 D29C EFC5 7B9A C5FB  EC2F DC74 A106 ED35 857F

/~\ The ASCII
\ / Ribbon Campaign
 X  Against HTML
/ \ Email!


pgp0.pgp
Description: PGP signature


Re: Upgrading for FreeBSD Security Advisory FreeBSD-SA-03:04.sendmail

2003-03-10 Thread Mike Meyer
In [EMAIL PROTECTED], [EMAIL PROTECTED] typed:
 As per this announcement I updated my source tree to 'date=2003.03.08.10.10.00'
 picking a date later than the Mar 4th date of FreeBSD-SA-03:04.
 My question is that I get:
 
Copyright (c) 1992-2003 The FreeBSD Project.
Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
The Regents of the University of California. All rights reserved.
FreeBSD 4.8-RC #0: Sun Mar  9 23:03:55 EST 2003
 
 Does the label not apply if I specify a date? Does the 4.8-RC #0 represent a
 problem? I did get the correct version of sendmail.

This is a FAQ:

http://www.freebsd.org/doc/en_US.ISO8859-1/books/faq/admin.html#RELEASE-CANDIDATE


mike

-- 
Mike Meyer [EMAIL PROTECTED]  http://www.mired.org/consulting.html
Independent WWW/Perforce/FreeBSD/Unix consultant, email for more information.

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-questions in the body of the message


Re: Upgrading for FreeBSD Security Advisory FreeBSD-SA-03:04.sendmail

2003-03-10 Thread doug
Got it and thank you to all who replied. It is my memory that with some builds I
have gotten something other than #0. But maybe that was from building something
other than RELENG_4. I the sendmail fix was important enough where I felt the
need for some reassurance.

Thanks again.


On Mon, 10 Mar 2003, Mike Meyer wrote:

 In [EMAIL PROTECTED], [EMAIL PROTECTED] typed:
  As per this announcement I updated my source tree to 'date=2003.03.08.10.10.00'
  picking a date later than the Mar 4th date of FreeBSD-SA-03:04.
  My question is that I get:
 
 Copyright (c) 1992-2003 The FreeBSD Project.
 Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
 The Regents of the University of California. All rights reserved.
 FreeBSD 4.8-RC #0: Sun Mar  9 23:03:55 EST 2003
 
  Does the label not apply if I specify a date? Does the 4.8-RC #0 represent a
  problem? I did get the correct version of sendmail.

 This is a FAQ:

 http://www.freebsd.org/doc/en_US.ISO8859-1/books/faq/admin.html#RELEASE-CANDIDATE


   mike

 --
 Mike Meyer [EMAIL PROTECTED]http://www.mired.org/consulting.html
 Independent WWW/Perforce/FreeBSD/Unix consultant, email for more information.


_
Douglas Denault
[EMAIL PROTECTED]
Voice: 301-469-8766
  Fax: 301-469-0601

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-questions in the body of the message


Re: Upgrading for FreeBSD Security Advisory FreeBSD-SA-03:04.sendmail

2003-03-10 Thread Mike Meyer
In [EMAIL PROTECTED], [EMAIL PROTECTED] typed:
 Got it and thank you to all who replied. It is my memory that with some builds I
 have gotten something other than #0. But maybe that was from building something
 other than RELENG_4. I the sendmail fix was important enough where I felt the
 need for some reassurance.

The #0 is a counter of the number of builds done in that kernel build
directory. You somehow started with a clean directory this time, so
the number was reset to zero. If you build that kernel again - with or
without cvsup - without cleaning out the directory, it will go to
1, then 2, and so on.

mike
-- 
Mike Meyer [EMAIL PROTECTED]  http://www.mired.org/consulting.html
Independent WWW/Perforce/FreeBSD/Unix consultant, email for more information.

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-questions in the body of the message


Re: Upgrading for FreeBSD Security Advisory FreeBSD-SA-03:04.sendmail

2003-03-10 Thread doug
I cleaned /usr/obj/usr/... but not /usr/src which was at some version of 4.7.
Also my root partition is a bit small so I played some games with /modules
/modules.old and kernel.old. The count is driven off one of those?

I did not mess with anything in /usr/src including /sys/../compile/.

On Mon, 10 Mar 2003, Mike Meyer wrote:

 In [EMAIL PROTECTED], [EMAIL PROTECTED] typed:
  Got it and thank you to all who replied. It is my memory that with some builds I
  have gotten something other than #0. But maybe that was from building something
  other than RELENG_4. I the sendmail fix was important enough where I felt the
  need for some reassurance.

 The #0 is a counter of the number of builds done in that kernel build
 directory. You somehow started with a clean directory this time, so
 the number was reset to zero. If you build that kernel again - with or
 without cvsup - without cleaning out the directory, it will go to
 1, then 2, and so on.

   mike
 --
 Mike Meyer [EMAIL PROTECTED]http://www.mired.org/consulting.html
 Independent WWW/Perforce/FreeBSD/Unix consultant, email for more information.


_
Douglas Denault
[EMAIL PROTECTED]
Voice: 301-469-8766
  Fax: 301-469-0601

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-questions in the body of the message


Re: Upgrading for FreeBSD Security Advisory FreeBSD-SA-03:04.sendmail

2003-03-10 Thread Mike Meyer
[Context lost to top posting]

In [EMAIL PROTECTED], [EMAIL PROTECTED] typed:
 I cleaned /usr/obj/usr/... but not /usr/src which was at some version of 4.7.
 Also my root partition is a bit small so I played some games with /modules
 /modules.old and kernel.old. The count is driven off one of those?

Cleaning out /usr/obj/ will reset the counter, as the build directory
for the *kernel targets is in /usr/obj/usr/src/sys.

mike
-- 
Mike Meyer [EMAIL PROTECTED]  http://www.mired.org/consulting.html
Independent WWW/Perforce/FreeBSD/Unix consultant, email for more information.

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-questions in the body of the message


Upgrading for FreeBSD Security Advisory FreeBSD-SA-03:04.sendmail

2003-03-09 Thread doug
As per this announcement I updated my source tree to 'date=2003.03.08.10.10.00'
picking a date later than the Mar 4th date of FreeBSD-SA-03:04.

From the announcement:

   1) Upgrade your vulnerable system to 4-STABLE; or to the RELENG_5_0,
   RELENG_4_7, or RELENG_4_6 security branch dated after the correction
   date (5.0-RELEASE-p4, 4.7-RELEASE-p7, or 4.6.2-RELEASE-p10,
   respectively).

   [NOTE: At the time of this writing, the FreeBSD 4-STABLE branch is
   labeled `4.8-RC1'.]

My question is that I get:

   Copyright (c) 1992-2003 The FreeBSD Project.
   Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
   The Regents of the University of California. All rights reserved.
   FreeBSD 4.8-RC #0: Sun Mar  9 23:03:55 EST 2003

Does the label not apply if I specify a date? Does the 4.8-RC #0 represent a
problem? I did get the correct version of sendmail.




_
Douglas Denault
[EMAIL PROTECTED]
Voice: 301-469-8766
  Fax: 301-469-0601

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-questions in the body of the message


Re: Upgrading for FreeBSD Security Advisory FreeBSD-SA-03:04.sendmail

2003-03-09 Thread Jim Mock
On Mon, 10 Mar 2003 at 00:47:59 -0500, [EMAIL PROTECTED] wrote:
 As per this announcement I updated my source tree to
 'date=2003.03.08.10.10.00' picking a date later than the Mar 4th date
 of FreeBSD-SA-03:04.
 
 From the announcement:
 
1) Upgrade your vulnerable system to 4-STABLE; or to the RELENG_5_0,
RELENG_4_7, or RELENG_4_6 security branch dated after the correction
date (5.0-RELEASE-p4, 4.7-RELEASE-p7, or 4.6.2-RELEASE-p10,
respectively).
 
[NOTE: At the time of this writing, the FreeBSD 4-STABLE branch is
labeled `4.8-RC1'.]
 
 My question is that I get:
 
Copyright (c) 1992-2003 The FreeBSD Project.
Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
The Regents of the University of California. All rights reserved.
FreeBSD 4.8-RC #0: Sun Mar  9 23:03:55 EST 2003
 
 Does the label not apply if I specify a date? Does the 4.8-RC #0 represent a
 problem? I did get the correct version of sendmail.

No, the label of RC1 doesn't apply if you cvsup and build/install
world, it only applies to snapshots and ISOs for QA purposes.  If you
update build/install world you'll only see RC.  This is normal, and
you're not seeing anything out of the ordinary.

- jim

-- 
- jim mock. email: [EMAIL PROTECTED] web: http://soupnazi.org -
- freebsd project: [EMAIL PROTECTED]opendarwin: [EMAIL PROTECTED] -

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-questions in the body of the message


Re: FreeBSD Security Advisory FreeBSD-SA-03:04.sendmail

2003-03-03 Thread Oscar Ricardo Silva
Anybody know how we should approach this for older versions of FreeBSD?  Is 
upgrading source and rebuilding the only way?  I was wondering if there 
were binary versions or patches for older versions so we don't have 
upgrade, rebuild and reboot.



At 09:11 AM 3/3/2003 -0800, FreeBSD Security Advisories, you wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
=
FreeBSD-SA-03:04.sendmail   Security Advisory
  The FreeBSD Project
Topic:  sendmail header parsing buffer overflow

Category:   contrib
Module: contrib_sendmail
Announced:  2003-03-03
Credits:Mark Dowd (ISS)
Affects:All releases prior to 4.8-RELEASE and 5.0-RELEASE-p4
FreeBSD 4-STABLE prior to the correction date
Corrected:  2003-03-03
FreeBSD only:   NO
I.   Background

FreeBSD includes sendmail(8), a general purpose internetwork mail
routing facility, as the default Mail Transfer Agent (MTA).
II.  Problem Description

ISS has identified a buffer overflow that may occur during header
parsing in all versions of sendmail after version 5.79.
In addition, Sendmail, Inc. has identified and corrected a defect in
buffer handling within sendmail's RFC 1413 ident protocol support.
III. Impact

A remote attacker could create a specially crafted message that may
cause sendmail to execute arbitrary code with the privileges of the
user running sendmail, typically root.  The malicious message might be
handled (and therefore the vulnerability triggered) by the initial
sendmail MTA, any relaying sendmail MTA, or by the delivering sendmail
process.  Exploiting this defect is particularly difficult, but is
believed to be possible.
The defect in the ident routines is not believed to be exploitable.

IV.  Workaround

There is no workaround, other than disabling sendmail.

V.   Solution

Do one of the following:

1) Upgrade your vulnerable system to 4-STABLE; or to the RELENG_5_0,
RELENG_4_7, or RELENG_4_6 security branch dated after the correction
date (5.0-RELEASE-p4, 4.7-RELEASE-p7, or 4.6.2-RELEASE-p10,
respectively).
[NOTE: At the time of this writing, the FreeBSD 4-STABLE branch is
 labeled `4.8-RC1'.]
2) To patch your present system:

The following patch has been verified to apply to FreeBSD 5.0, 4.7,
and 4.6 systems.
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:04/sendmail.patch
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:04/sendmail.patch.asc
b) Execute the following commands as root:

# cd /usr/src
# patch  /path/to/patch
# cd /usr/src/lib/libsm
# make obj  make depend  make
# cd /usr/src/lib/libsmutil
# make obj  make depend  make
# cd /usr/src/usr.sbin/sendmail
# make obj  make depend  make  make install
3) For i386 systems only, a patched sendmail binary is available.
Select the correct binary based on your FreeBSD version and whether or
not you want STARTTLS support.  If you want STARTTLS support, you must
have the crypto distribution installed.
a) Download the relevant binary from the location below, and verify
the detached PGP signature using your PGP utility.
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:04/sendmail-4.6-i386-crypto.bin.gz
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:04/sendmail-4.6-i386-crypto.bin.gz.asc
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:04/sendmail-4.6-i386-nocrypto.bin.gz
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:04/sendmail-4.6-i386-nocrypto.bin.gz.asc
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:04/sendmail-4.7-i386-crypto.bin.gz
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:04/sendmail-4.7-i386-crypto.bin.gz.asc
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:04/sendmail-4.7-i386-nocrypto.bin.gz
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:04/sendmail-4.7-i386-nocrypto.bin.gz.asc
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:04/sendmail-5.0-i386-crypto.bin.gz
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:04/sendmail-5.0-i386-crypto.bin.gz.asc
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:04/sendmail-5.0-i386-nocrypto.bin.gz
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:04/sendmail-5.0-i386-nocrypto.bin.gz.asc
b) Install the binary.  Execute the following commands as root.
Note that these examples utilizes the FreeBSD 4.7 crypto binary.
Substitute BINARYGZ with the file name which you downloaded in
step (a).
# BINARYGZ=/path/to/sendmail-4.7-i386-crypto.bin.gz
# gunzip ${BINARYGZ}
# install -s -o root -g smmsp -m 2555 ${BINARYGZ%.gz} 
/usr/libexec/sendmail/sendmail

c) Restart sendmail.  Execute the following command as root.

# /bin/sh /etc/rc.sendmail restart

VI.  Correction details

The following list contains the revision numbers of each file that was
corrected in FreeBSD

Re: FreeBSD Security Advisory FreeBSD-SA-03:04.sendmail

2003-03-03 Thread Kris Kennaway
On Mon, Mar 03, 2003 at 03:56:40PM -0600, Oscar Ricardo Silva wrote:
 Anybody know how we should approach this for older versions of FreeBSD?  Is 
 upgrading source and rebuilding the only way?  I was wondering if there 
 were binary versions or patches for older versions so we don't have 
 upgrade, rebuild and reboot.

What you see in the advisory is all that is provided by FreeBSD.  If
you're on an older release, it's not supported any longer and you need
to figure out how to fix it on your own.  That may involve upgrading
to a supported release, or manually fixing the problem described in
the advisory.  In this case you can probably disable the base system
sendmail and use the sendmail port.

Kris


pgp0.pgp
Description: PGP signature


Re: FreeBSD Security Advisory FreeBSD-SA-03:04.sendmail

2003-03-03 Thread Mike Meyer
In [EMAIL PROTECTED], Kris Kennaway [EMAIL PROTECTED] typed:
 On Mon, Mar 03, 2003 at 03:56:40PM -0600, Oscar Ricardo Silva wrote:
  Anybody know how we should approach this for older versions of FreeBSD?  Is 
  upgrading source and rebuilding the only way?  I was wondering if there 
  were binary versions or patches for older versions so we don't have 
  upgrade, rebuild and reboot.
 What you see in the advisory is all that is provided by FreeBSD.  If
 you're on an older release, it's not supported any longer and you need
 to figure out how to fix it on your own.  That may involve upgrading
 to a supported release, or manually fixing the problem described in
 the advisory.  In this case you can probably disable the base system
 sendmail and use the sendmail port.

Or the postfix port, or the qmail port, or the exim port. At least two
of those three have had zero security problems, and it's probably true
for all three of them.

mike
-- 
Mike Meyer [EMAIL PROTECTED]  http://www.mired.org/consulting.html
Independent WWW/Perforce/FreeBSD/Unix consultant, email for more information.

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-questions in the body of the message