Re: Portmap non-local set / unset attempt

2005-09-23 Thread Wolfgang S. Rupprecht
Martin SchrC6der <[EMAIL PROTECTED]> writes:
> On 2005-09-23 00:05:14 -0700, Wolfgang S. Rupprecht wrote:
>> appreciable added risk.  The only loose end is that sshd doesn't
>> currently log the RSA/DSA key that is used to gain access.  Ideally it
>
> Hu? Try 
> LogLevel VERBOSE

Your eloquent reply aside, setting the loglevel to versbose doesn't
add proper key accounting to the sshd login record.  What it does is
add yet more clutter to /var/log/authlog by emitting quite a few more
lines per login.  Sshd's logs seem more like debug printfs, scattered
willy-nilly around the code.  The information one would expect from a
security program is never gathered in one spot and output in a single
audit line to see who logged in as what user.

-wolfgang



Re: Portmap non-local set / unset attempt

2005-09-23 Thread frantisek holop
hmm, on Thu, Sep 22, 2005 at 07:09:12PM -0600, Theo de Raadt said that
> It IS POSSIBLE to set something up and have it be secure and NOT TOUCH
> IT, because many people have OpenBSD machines running older releases
> running without any modification for YEARS now, RISK FREE, without
> having to update ANY THING.


all right!

let the uptime pi**ing contest begin! ;-)

integer> uptime
 2:12PM  up 186 days,  1:11, 1 user, load averages: 0.23, 0.22, 0.17

integer> sysctl kern.version
kern.version=OpenBSD 3.7 (GENERIC) #38: Wed Mar 16 13:57:54 MST 2005
[EMAIL PROTECTED]:/usr/src/sys/arch/i386/compile/GENERIC

-f

ps. i think this is still a baby ;-)
-- 
save a tree.  eat a beaver.



RE: Re: Portmap non-local set / unset attempt

2005-09-23 Thread tony
Making is a process.
Toast is not a process.

>- --- Original Message --- -
>From: [EMAIL PROTECTED]
>To: misc@openbsd.org
>Sent: Fri, 23 Sep 2005 02:30:10
>
>[EMAIL PROTECTED] wrote:
>
>>> Security is everything you've ever said, plus a
>process.
>> 
>> If it is secure, it doesn't need a process. So
>why would security be a
>> process again? Because of the vendors making
>"mistakes" and fix it later?
>> 
>> Jimmy Scott
>
>It is a "process" in the same way that "making
>toast" is a process.
>The purchase of a "bread-crisping solution" that is
>UL-certified to not
>set your house on fire is the contribution of the
>"engineering" and
>"product development" stages.  In common usage,
>using this "solution"
>to toast your morning snack will produce crispy
>bread and will not
>produce a howling conflagration.  However, note
>that it is still very
>much possible to ignite your domicile by soaking a
>rag in lighter fluid,
>stuffing it into the bread-toasting slot, and
>jamming the switch closed
>with a butter knife.  For a less extreme example,
>it _may_ be possible
>to cause a fire by leaving a towel too near the
>toaster while it is
>operating, something which is easy to do and all
>too common.
>
>Having a morning snack and an un-burnt house at the
>same time, then, is
>contingent upon two things - possessing a toaster
>of adequate quality,
>and using it properly.  You don't get to have the
>whole package without
>a) looking for a good toaster in the first place,
>and b) learning how
>to use it.  Security operates similarly:  one boner
>mistake on anybody's
>part - coder, engineer or administrator - and your
>"security" vaporizes
>_instantly_.  Go read some of Bruce Schneier's
>screeds on the subject,
>they're informative.
>
>So yes, security most certainly _is_ partly a
>"process", various
>opinions to the contrary notwithstanding.  It is
>identical to the
>process of locking your doors and checking your
>windows before you
>go to bed at night, or of making sure that you're
>not stuffing a paper
>towel or a cardboard box top in your toaster in the
>morning before
>you've had coffee.  You could call it "habitual
>prudence", I suppose.
>
>Of course, computers being based on hard-core
>determinism and Boolean
>logic, a higher standard is possible.  I note in
>passing that the
>security of every operating system in common use
>(including OpenBSD) is
>_unproven_ [1], with the possible exception of
>Coyotos.  Asserting
>something that is unproven and which may actually
>be impossible to prove
>("X is more secure than Y") is not a good idea.  In
>other words, don't
>toss shit at the vendors unless you can _prove_,
>from a chain of
>irrefutable deduction, that your proposed solution
>is "more secure" than
>theirs.  (Something which is likely impossible, due
>to OpenBSD's design
>and the language in which it is written.)  Hint: 
>the manpower,
>brainpower, and computing power needed to
>accomplish this task _even if_
>it is possible is probably going to exceed anything
>you're willing to
>marshal to that end.
>
>Theo is right about one thing, however:  Bugs and
>security flaws arise
>from mistakes, every one of which is avoidable. 
>There are no "new"
>classes of bugs or design flaws, essentially every
>one has been
>generally known of and understood for decades.  It
>is only sloppy
>practices - dare I say it, "bad processes" - that
>permit these bugs
>to creep into various codebases and multiply.  The
>cure for this
>problem is "better processes".  The "easy" cure is
>for these processes
>to entail continuous auditing (the OBSD solution). 
>The harder cure
>is to work on establishing and maintaining a
>process that incorporates
>rigorous proof as a necessary component.  We may
>not ever see that, but
>hey - it's nice to dream, isn't it?
>
>-- 
>(c) 2005 Unscathed Haze via Central Plexus
><[EMAIL PROTECTED]>
>I am Chaos.  I am alive, and I tell you that you
>are Free.  -Eris
>Big Brother is watching you.  Learn to become
>Invisible.
>| Your message must be this wide to ride
>the Internet. |
>
>[1]  Rigorous proof, that is.  Anecdotal evidence
>does not establish
>proof of anything whatsoever.



Re: Portmap non-local set / unset attempt

2005-09-23 Thread Szechuan Death

[EMAIL PROTECTED] wrote:


Security is everything you've ever said, plus a process.


If it is secure, it doesn't need a process. So why would security be a
process again? Because of the vendors making "mistakes" and fix it later?

Jimmy Scott


It is a "process" in the same way that "making toast" is a process.
The purchase of a "bread-crisping solution" that is UL-certified to not
set your house on fire is the contribution of the "engineering" and
"product development" stages.  In common usage, using this "solution"
to toast your morning snack will produce crispy bread and will not
produce a howling conflagration.  However, note that it is still very
much possible to ignite your domicile by soaking a rag in lighter fluid,
stuffing it into the bread-toasting slot, and jamming the switch closed
with a butter knife.  For a less extreme example, it _may_ be possible
to cause a fire by leaving a towel too near the toaster while it is
operating, something which is easy to do and all too common.

Having a morning snack and an un-burnt house at the same time, then, is
contingent upon two things - possessing a toaster of adequate quality,
and using it properly.  You don't get to have the whole package without
a) looking for a good toaster in the first place, and b) learning how
to use it.  Security operates similarly:  one boner mistake on anybody's
part - coder, engineer or administrator - and your "security" vaporizes
_instantly_.  Go read some of Bruce Schneier's screeds on the subject,
they're informative.

So yes, security most certainly _is_ partly a "process", various
opinions to the contrary notwithstanding.  It is identical to the
process of locking your doors and checking your windows before you
go to bed at night, or of making sure that you're not stuffing a paper
towel or a cardboard box top in your toaster in the morning before
you've had coffee.  You could call it "habitual prudence", I suppose.

Of course, computers being based on hard-core determinism and Boolean
logic, a higher standard is possible.  I note in passing that the
security of every operating system in common use (including OpenBSD) is
_unproven_ [1], with the possible exception of Coyotos.  Asserting
something that is unproven and which may actually be impossible to prove
("X is more secure than Y") is not a good idea.  In other words, don't
toss shit at the vendors unless you can _prove_, from a chain of
irrefutable deduction, that your proposed solution is "more secure" than
theirs.  (Something which is likely impossible, due to OpenBSD's design
and the language in which it is written.)  Hint:  the manpower,
brainpower, and computing power needed to accomplish this task _even if_
it is possible is probably going to exceed anything you're willing to
marshal to that end.

Theo is right about one thing, however:  Bugs and security flaws arise
from mistakes, every one of which is avoidable.  There are no "new"
classes of bugs or design flaws, essentially every one has been
generally known of and understood for decades.  It is only sloppy
practices - dare I say it, "bad processes" - that permit these bugs
to creep into various codebases and multiply.  The cure for this
problem is "better processes".  The "easy" cure is for these processes
to entail continuous auditing (the OBSD solution).  The harder cure
is to work on establishing and maintaining a process that incorporates
rigorous proof as a necessary component.  We may not ever see that, but
hey - it's nice to dream, isn't it?

--
(c) 2005 Unscathed Haze via Central Plexus <[EMAIL PROTECTED]>
I am Chaos.  I am alive, and I tell you that you are Free.  -Eris
Big Brother is watching you.  Learn to become Invisible.
| Your message must be this wide to ride the Internet. |

[1]  Rigorous proof, that is.  Anecdotal evidence does not establish
proof of anything whatsoever.



Re: Portmap non-local set / unset attempt

2005-09-23 Thread Martin Schröder
On 2005-09-23 00:05:14 -0700, Wolfgang S. Rupprecht wrote:
> appreciable added risk.  The only loose end is that sshd doesn't
> currently log the RSA/DSA key that is used to gain access.  Ideally it

Hu? Try 
LogLevel VERBOSE

Best
Martin
-- 
http://www.tm.oneiros.de



Re: Portmap non-local set / unset attempt

2005-09-23 Thread Wolfgang S. Rupprecht
Tim Hammerquist <[EMAIL PROTECTED]> writes:
> [*] I would consider leaving PermitRootLogin enabled a firing
> offense in itself.

PermitRootLogin is needed for rdisting.  Without that you end up
having to maintain N systems.

/etc/ssh/sshd_config:

Protocol 2
PermitRootLogin without-password
PasswordAuthentication no
ChallengeResponseAuthentication no
X11Forwarding yes
ClientAliveInterval  60
ClientAliveCountMax  30

If you only allow 2k RSA/DSA passwords you aren't exposing yourself to
appreciable added risk.  The only loose end is that sshd doesn't
currently log the RSA/DSA key that is used to gain access.  Ideally it
would record the comment field from ~/ssh/authorized_keys into
/var/log/authlog.  That way, as long as everyone had their own key,
you could always tell who logged in as root, same as the case of
trampoline logins via a normal use account.

-wolfgang
-- 
Wolfgang S. Rupprechthttp://www.wsrcc.com/wolfgang/
  Microsoft Vista - because "Virus Installer" was too long.



Re: Portmap non-local set / unset attempt

2005-09-22 Thread jimmy
Quoting "Clint M. Sand" <[EMAIL PROTECTED]>:

> On Thu, Sep 22, 2005 at 07:09:12PM -0600, Theo de Raadt wrote:
> > > > People keep yammering this bullshit about "Security is a process".
> > > > Bullshit!  Lies!  It's about paying attention to the frigging details
> > > > when they are right in front of your face.  And it is very clear other
> > > > vendors do not pay attention to the details, considering the work I
> > > > did here was talked about all over BUGTRAQ back in that month.  No
> > > > wonder these vendors and their blogboys have to have this "Security is
> > > > a process" mantra to protect themselves from looking bad.
> > > >
> > >
> > >
> > > "Security is a process" is intended to mean 2 things. One is that the
> > > idea that you can "set and forget" anything and think it's somehow
> > > "secure" is a joke. To "secure" a network includes at a minimum, keeping
> > > up with vendor patches for example. Processes like patch management help
> > > keep systems secure. It does not say "Security is ONLY a process".
> > >
> > > Secondly, it is meant to refute the moronic idea that some admins seem
> > > to have is that buying any product makes you "secure". Prevelant is the
> > > idea for example that if you have a "firewall" then you are now "secure".
> > > Or, "I have Norton AntiVirus so now my PC is secured".
> >
> > No, no no.
> >
> > You are playing the same semantic games that avoid responsibility at
> > the ENGINEERING and PRODUCT DEVELOPMENT STAGES.
> >
> > It's so very very Microsoft.
> >
> > Just like the air-conditioning technicians I keep firing because they
> > can't read schematics and charts.
> >
> > Which is why I now know MORE about air-conditioners than most of the
> > technicians who come here.
> >
> > The phrase, and everything you said, is all excuses for the vendors.
> >
> > It IS POSSIBLE to set something up and have it be secure and NOT TOUCH
> > IT, because many people have OpenBSD machines running older releases
> > running without any modification for YEARS now, RISK FREE, without
> > having to update ANY THING.
>
> No, you can put an openbsd box up and leave it for years with root login
> enabled and password for a password. It takes more than correct code.
> It's correct code plus correct usage. I think the GOBBLES sshd exploit
> is proof enough that "set and forget" is not "risk free".
>
> Security is everything you've ever said, plus a process.
>
>

If it is secure, it doesn't need a process. So why would security be a
process again? Because of the vendors making "mistakes" and fix it later?

Jimmy Scott


This message has been sent through ihosting.be
To report spamming or other unaccepted behavior
by a iHosting customer, please send a message 
to [EMAIL PROTECTED]




Re: Portmap non-local set / unset attempt

2005-09-22 Thread Tim Hammerquist
Clint M. Sand wrote:
> > > Theo de Raadt wrote:
> > > > It's about paying attention to the frigging details when
> > > > they are right in front of your face.
[ snippage ]
> 
> No, you can put an openbsd box up and leave it for years with
> root login enabled and password for a password. It takes more
> than correct code.  It's correct code plus correct usage.

Wouldn't setting a root password of "password" (aside from being
grounds for immediate termination[*]) be a *prime* example of
*ignoring* the "frigging details when they are right in front of
your face"?

[*] I would consider leaving PermitRootLogin enabled a firing
offense in itself.

Tim Hammerquist



RE: Re: Portmap non-local set / unset attempt

2005-09-22 Thread tony
>Security is everything you've ever said, plus a
>process.

No. security does not require the process.
Attempted security (that doesn't quite work) requires a process.
Like the difference between does work and should work.



Re: Portmap non-local set / unset attempt

2005-09-22 Thread Clint M. Sand
On Thu, Sep 22, 2005 at 07:09:12PM -0600, Theo de Raadt wrote:
> > > People keep yammering this bullshit about "Security is a process".
> > > Bullshit!  Lies!  It's about paying attention to the frigging details
> > > when they are right in front of your face.  And it is very clear other
> > > vendors do not pay attention to the details, considering the work I
> > > did here was talked about all over BUGTRAQ back in that month.  No
> > > wonder these vendors and their blogboys have to have this "Security is
> > > a process" mantra to protect themselves from looking bad.
> > > 
> > 
> > 
> > "Security is a process" is intended to mean 2 things. One is that the
> > idea that you can "set and forget" anything and think it's somehow
> > "secure" is a joke. To "secure" a network includes at a minimum, keeping
> > up with vendor patches for example. Processes like patch management help
> > keep systems secure. It does not say "Security is ONLY a process".
> > 
> > Secondly, it is meant to refute the moronic idea that some admins seem 
> > to have is that buying any product makes you "secure". Prevelant is the
> > idea for example that if you have a "firewall" then you are now "secure". 
> > Or, "I have Norton AntiVirus so now my PC is secured". 
> 
> No, no no.
> 
> You are playing the same semantic games that avoid responsibility at
> the ENGINEERING and PRODUCT DEVELOPMENT STAGES.
> 
> It's so very very Microsoft.
> 
> Just like the air-conditioning technicians I keep firing because they
> can't read schematics and charts.
> 
> Which is why I now know MORE about air-conditioners than most of the
> technicians who come here.
> 
> The phrase, and everything you said, is all excuses for the vendors.
> 
> It IS POSSIBLE to set something up and have it be secure and NOT TOUCH
> IT, because many people have OpenBSD machines running older releases
> running without any modification for YEARS now, RISK FREE, without
> having to update ANY THING.

No, you can put an openbsd box up and leave it for years with root login
enabled and password for a password. It takes more than correct code.
It's correct code plus correct usage. I think the GOBBLES sshd exploit
is proof enough that "set and forget" is not "risk free". 

Security is everything you've ever said, plus a process.



Re: Portmap non-local set / unset attempt

2005-09-22 Thread Theo de Raadt
> Which is why I now know MORE about air-conditioners than most of the
> technicians who come here.
> 
> The phrase, and everything you said, is all excuses for the vendors.

I bet that the air-conditoner technicians believe that
"Air-conditioner maintainance is a process".

Which is why they can never do a proper job.

It is a cop-out when they say it, it is a cop-out when a unix vendor
says it, and it is a copout whenever ANYONE SAYS IT.



Re: Portmap non-local set / unset attempt

2005-09-22 Thread Theo de Raadt
> > People keep yammering this bullshit about "Security is a process".
> > Bullshit!  Lies!  It's about paying attention to the frigging details
> > when they are right in front of your face.  And it is very clear other
> > vendors do not pay attention to the details, considering the work I
> > did here was talked about all over BUGTRAQ back in that month.  No
> > wonder these vendors and their blogboys have to have this "Security is
> > a process" mantra to protect themselves from looking bad.
> > 
> 
> 
> "Security is a process" is intended to mean 2 things. One is that the
> idea that you can "set and forget" anything and think it's somehow
> "secure" is a joke. To "secure" a network includes at a minimum, keeping
> up with vendor patches for example. Processes like patch management help
> keep systems secure. It does not say "Security is ONLY a process".
> 
> Secondly, it is meant to refute the moronic idea that some admins seem 
> to have is that buying any product makes you "secure". Prevelant is the
> idea for example that if you have a "firewall" then you are now "secure". 
> Or, "I have Norton AntiVirus so now my PC is secured". 

No, no no.

You are playing the same semantic games that avoid responsibility at
the ENGINEERING and PRODUCT DEVELOPMENT STAGES.

It's so very very Microsoft.

Just like the air-conditioning technicians I keep firing because they
can't read schematics and charts.

Which is why I now know MORE about air-conditioners than most of the
technicians who come here.

The phrase, and everything you said, is all excuses for the vendors.

It IS POSSIBLE to set something up and have it be secure and NOT TOUCH
IT, because many people have OpenBSD machines running older releases
running without any modification for YEARS now, RISK FREE, without
having to update ANY THING.



Re: Portmap non-local set / unset attempt

2005-09-22 Thread Clint M. Sand
On Thu, Sep 22, 2005 at 02:02:13PM -0600, Theo de Raadt wrote:



> People keep yammering this bullshit about "Security is a process".
> Bullshit!  Lies!  It's about paying attention to the frigging details
> when they are right in front of your face.  And it is very clear other
> vendors do not pay attention to the details, considering the work I
> did here was talked about all over BUGTRAQ back in that month.  No
> wonder these vendors and their blogboys have to have this "Security is
> a process" mantra to protect themselves from looking bad.
> 


"Security is a process" is intended to mean 2 things. One is that the
idea that you can "set and forget" anything and think it's somehow
"secure" is a joke. To "secure" a network includes at a minimum, keeping
up with vendor patches for example. Processes like patch management help
keep systems secure. It does not say "Security is ONLY a process".

Secondly, it is meant to refute the moronic idea that some admins seem 
to have is that buying any product makes you "secure". Prevelant is the
idea for example that if you have a "firewall" then you are now "secure". 
Or, "I have Norton AntiVirus so now my PC is secured". 



Re: Portmap non-local set / unset attempt

2005-09-22 Thread Michael Favinsky
That's what I thought. I have no idea why Legato continues to use portmapper
at all. They've been telling me they're going to stop using it since at
least 1999.

I actually came up with a workaround that I think might expose a potential
issue in rpcinfo.

Since I couldn't get nsrexecd to automatically register with the portmapper,
I tried to register it manually using rpcinfo -s. An entry was added, but it
made the protocol number 2 instead of tcp (6), which is what I need.

# rpcinfo -s 390113 1 7937
# rpcinfo -p localhost
   program vers proto   port
102   tcp111  portmapper
102   udp111  portmapper
3901131 2   7937
# rpcinfo -t localhost 390113
rpcinfo: RPC: Program not registered
program 390113 is not available

I looked and couldn't find any way to set the protocol to TCP (6). Looking
at the source for rpcinfo, I found the following:

if ((pmap_set(prog_num, version_num, PF_INET,
(u_short)port_num)) == 0) {
fprintf(stderr, "rpcinfo: Could not set registration "
"for prog %s version %s port %s\n",
argv[0], argv[1], argv[2]);
exit(1);
}

Seems like rpcinfo will always set the protocol to the constant PF_INET,
which is actually AF_INET, which is actually 2.

In order to work around this, I created the following short program:

#include 
main()
{
pmap_set(390113, 1, 6, 7937);
}

Notice the 6 in the 3rd argument to pmap_set, rather than the constant
PF_INET (2).

After deleting the previous portmapper entry and running my little kludge, I
get the following:

# rpcinfo -p localhost
   program vers proto   port
102   tcp111  portmapper
102   udp111  portmapper
3901131   tcp   7937
# rpcinfo -t localhost 390113
program 390113 version 1 ready and waiting

Which brings me to ask: Should an additional argument be added to rpcinfo -s
to specify a protocol, rather than forcing the constant PF_INET?
 

-Original Message-
From: Theo de Raadt [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 22, 2005 1:02 PM
To: Michael Favinsky
Cc: 'misc@openbsd.org'
Subject: Re: Portmap non-local set / unset attempt 

> I'm receiving the following messages from portmap when starting Legato 
> Networker's nsrexecd. The nsrexecd I'm running is the Linux version 
> under
> emulation:
> 
> portmap[16083]: non-local unset attempt (might be from 127.0.0.1)
> portmap[16083]: non-local set attempt (might be from 127.0.0.1)
> 
> The program (number 390113) does not successfully register with the
> portmapper:
> 
> # rpcinfo -p localhost
>program vers proto   port
> 102   tcp111  portmapper
> 102   udp111  portmapper
> 
> Is this a security "feature?"

Yes, most definately.

Changes made years ago slightly changed the communications API between
libc/rpc and the portmap daemon, to make it much harder to generate spoofed
RPC mappings.  An attacker would make such mappings point one RPC service at
another RPC service, and with the right forwarding games you can get
mis-interpretation by an end point reulting in some risks.

Therefore our portmap sets up special 127.0.0.1 local bound sockets, and
only accepts set/unset operations on those sockets.  The *:111 sockets can
still be used to make other requests, but not deal with binding
establishment.

The program you are using is linked against a RPC library that is using your
external address to change the mappings, ie. perhaps your external IP
address.  That is the old legacy way that the Sun code used to do it, and it
was a bug, and it is full of risk.

It's astounding that other people have not fixed this yet, considering that
I did the work on that nearly 10 years ago.

revision 1.3
date: 1996/06/29 19:03:50;  author: deraadt;  state: Exp;  lines: +135 -64
multiple receivers, port checking. testing help from bitblt

People keep yammering this bullshit about "Security is a process".
Bullshit!  Lies!  It's about paying attention to the frigging details when
they are right in front of your face.  And it is very clear other vendors do
not pay attention to the details, considering the work I did here was talked
about all over BUGTRAQ back in that month.  No wonder these vendors and
their blogboys have to have this "Security is a process" mantra to protect
themselves from looking bad.

> Is there a way to get nrsexecd to register with the portmapper?

You cannot get a Linux binary to talk to our portmap, without modifying our
portmap code to not have this security check.  And that would be a shame.

Sorry...


This message may contain information that is privileged, confidential and
exempt from disclosure under applicable law. If you are not the intended
recipient of this message you may not store, disclo

Re: Portmap non-local set / unset attempt

2005-09-22 Thread Theo de Raadt
> I'm receiving the following messages from portmap when starting Legato
> Networker's nsrexecd. The nsrexecd I'm running is the Linux version under
> emulation:
> 
> portmap[16083]: non-local unset attempt (might be from 127.0.0.1)
> portmap[16083]: non-local set attempt (might be from 127.0.0.1)
> 
> The program (number 390113) does not successfully register with the
> portmapper:
> 
> # rpcinfo -p localhost
>program vers proto   port
> 102   tcp111  portmapper
> 102   udp111  portmapper
> 
> Is this a security "feature?"

Yes, most definately.

Changes made years ago slightly changed the communications API between
libc/rpc and the portmap daemon, to make it much harder to generate
spoofed RPC mappings.  An attacker would make such mappings point one
RPC service at another RPC service, and with the right forwarding
games you can get mis-interpretation by an end point reulting in some
risks.

Therefore our portmap sets up special 127.0.0.1 local bound sockets,
and only accepts set/unset operations on those sockets.  The *:111
sockets can still be used to make other requests, but not deal with
binding establishment.

The program you are using is linked against a RPC library that is
using your external address to change the mappings, ie. perhaps your
external IP address.  That is the old legacy way that the Sun code
used to do it, and it was a bug, and it is full of risk.

It's astounding that other people have not fixed this yet, considering
that I did the work on that nearly 10 years ago.

revision 1.3
date: 1996/06/29 19:03:50;  author: deraadt;  state: Exp;  lines: +135 -64
multiple receivers, port checking. testing help from bitblt

People keep yammering this bullshit about "Security is a process".
Bullshit!  Lies!  It's about paying attention to the frigging details
when they are right in front of your face.  And it is very clear other
vendors do not pay attention to the details, considering the work I
did here was talked about all over BUGTRAQ back in that month.  No
wonder these vendors and their blogboys have to have this "Security is
a process" mantra to protect themselves from looking bad.

> Is there a way to get nrsexecd to register
> with the portmapper?

You cannot get a Linux binary to talk to our portmap, without
modifying our portmap code to not have this security check.  And that
would be a shame.

Sorry...



Portmap non-local set / unset attempt

2005-09-22 Thread Michael Favinsky
I'm receiving the following messages from portmap when starting Legato
Networker's nsrexecd. The nsrexecd I'm running is the Linux version under
emulation:

portmap[16083]: non-local unset attempt (might be from 127.0.0.1)
portmap[16083]: non-local set attempt (might be from 127.0.0.1)

The program (number 390113) does not successfully register with the
portmapper:

# rpcinfo -p localhost
   program vers proto   port
102   tcp111  portmapper
102   udp111  portmapper

Is this a security "feature?" Is there a way to get nrsexecd to register
with the portmapper?

Although it's probably not necessary, here's a dmesg from the server in
question:

OpenBSD 3.6 (GENERIC) #59: Fri Sep 17 12:32:57 MDT 2004
[EMAIL PROTECTED]:/usr/src/sys/arch/i386/compile/GENERIC
cpu0: Intel Pentium II ("GenuineIntel" 686-class, 512KB L2 cache) 267 MHz
cpu0: FPU,V86,DE,PSE,TSC,MSR,PAE,MCE,CX8,SEP,MTRR,PGE,MCA,CMOV,MMX
real mem  = 100245504 (97896K)
avail mem = 84336640 (82360K)
using 1249 buffers containing 5115904 bytes (4996K) of memory
mainbus0 (root)
bios0 at mainbus0: AT/286+(d4) BIOS, date 03/06/98, BIOS32 rev. 0 @ 0xfd7ad
apm0 at bios0: Power Management spec V1.2
apm0: AC on, battery charge unknown
pcibios0 at bios0: rev 2.1 @ 0xfd740/0x8c0
pcibios0: PCI IRQ Routing Table rev 1.0 @ 0xfdf50/160 (8 entries)
pcibios0: PCI Interrupt Router at 000:04:0 ("Intel 82371FB ISA" rev 0x00)
pcibios0: PCI bus #1 is the last bus
WARNING: can't reserve area for I/O APIC.
bios0: ROM list: 0xc/0x8000
cpu0 at mainbus0
pci0 at mainbus0 bus 0: configuration mode 1 (no bios)
pchb0 at pci0 dev 0 function 0 "Intel 82443LX AGP" rev 0x03
ppb0 at pci0 dev 1 function 0 "Intel 82443LX AGP" rev 0x03
pci1 at ppb0 bus 1
vga1 at pci1 dev 0 function 0 "Cirrus Logic CL-GD5465" rev 0x03
wsdisplay0 at vga1: console (80x25, vt100 emulation)
wsdisplay0: screen 1-5 added (80x25, vt100 emulation)
pcib0 at pci0 dev 4 function 0 "Intel 82371AB PIIX4 ISA" rev 0x01
pciide0 at pci0 dev 4 function 1 "Intel 82371AB IDE" rev 0x01: DMA, channel
0 wired to compatibility, channel 1 wired to compatibility
wd0 at pciide0 channel 0 drive 0: 
wd0: 16-sector PIO, LBA, 3079MB, 6306048 sectors
wd0(pciide0:0:0): using PIO mode 4, Ultra-DMA mode 2
atapiscsi0 at pciide0 channel 1 drive 0
scsibus0 at atapiscsi0: 2 targets
cd0 at scsibus0 targ 0 lun 0:  SCSI0 5/cdrom
removable
cd0(pciide0:1:0): using PIO mode 4, DMA mode 2
uhci0 at pci0 dev 4 function 2 "Intel 82371AB USB" rev 0x01: irq 11
usb0 at uhci0: USB revision 1.0
uhub0 at usb0
uhub0: Intel UHCI root hub, class 9/0, rev 1.00/1.00, addr 1
uhub0: 2 ports with 2 removable, self powered
"Intel 82371AB Power Mgmt" rev 0x01 at pci0 dev 4 function 3 not configured
le1 at pci0 dev 6 function 0 "AMD 79c970 PCnet-PCI" rev 0x25: irq 5
le1: address 00:60:b0:f7:1d:a8
le1: 8 receive buffers, 2 transmit buffers
le2 at pci0 dev 10 function 0 "AMD 79c970 PCnet-PCI" rev 0x25: irq 10
le2: address 00:60:b0:cd:39:8f
le2: 8 receive buffers, 2 transmit buffers
le3 at pci0 dev 12 function 0 "AMD 79c970 PCnet-PCI" rev 0x25: irq 11
le3: address 00:60:b0:ee:fa:b3
le3: 8 receive buffers, 2 transmit buffers
isa0 at pcib0
isadma0 at isa0
pckbc0 at isa0 port 0x60/5
pckbd0 at pckbc0 (kbd slot)
pckbc0: using irq 1 for kbd slot
wskbd0 at pckbd0: console keyboard, using wsdisplay0
pcppi0 at isa0 port 0x61
midi0 at pcppi0: 
sysbeep0 at pcppi0
lpt0 at isa0 port 0x378/4 irq 7
npx0 at isa0 port 0xf0/16: using exception 16
pccom0 at isa0 port 0x3f8/8 irq 4: ns16550a, 16 byte fifo
pccom0: console
fdc0 at isa0 port 0x3f0/6 irq 6 drq 2
fd0 at fdc0 drive 0: 1.44MB 80 cyl, 2 head, 18 sec
biomask fb4d netmask ff6d ttymask ffef
pctr: 686-class user-level performance counters enabled
mtrr: Pentium Pro MTRR support
dkcsum: wd0 matched BIOS disk 80
root on wd0a
rootdev=0x0 rrootdev=0x300 rawdev=0x302

Thanks for the feedback/help.

I don't control the following disclaimer so no flaming please.


This message may contain information that is privileged, confidential and
exempt from disclosure under applicable law. If you are not the intended
recipient of this message you may not store, disclose, copy, forward,
distribute or use this message or its contents for any purpose. If you have
received this communication in error, please notify us immediately by return
e-mail and delete the original message and any attachments from your e-mail
system. Thank you.