Re: sending password in the command line

2001-12-27 Thread etoffi
Merlin writes: > On Thursday 27 December 2001 16:46, Benjamin Smith wrote: > > > > Because that doesn't solve the original problem of the password being > > visible on the command line. The environment and the stdin were two > > suggested ways of passing the password. > > > ps -e shows the env

Re: mounting /tmp noexec (was: Campus Computers)

2001-12-27 Thread Joey Hess
Ian wrote: > why is this? Surely it is better security to do so? [EMAIL PROTECTED]:~>ls -l ./ls -rw---1 joey joey43916 Dec 26 22:46 ./ls [EMAIL PROTECTED]:~>/lib/ld-2.2.4.so ./ls CVS aalib.nohack.diff doc lsscreenshot.png GNUstep binhtm

Re: /etc/passwd ?

2001-12-27 Thread Arthur
just run "info false" [...] This version of `false' is implemented as a C program, and is thus more secure and faster than a shell script implementation, and may safely be used as a dummy shell for the purpose of disabling accounts. so, a "chsh -s /bin/false games" for disabling a telne

Re: /etc/passwd ?

2001-12-27 Thread Petre Daniel
most of them are relics of software that you probably dont need,but be carefully what account you erase. better comment them out.you can put a /etc/NOSHELL instead of /bin/sh or even /bin/false and they won't be able to login into the machine no more.. At 06:24 PM 12/27/01 -0600, Daniel Rychlik

/etc/passwd ?

2001-12-27 Thread Daniel Rychlik
I was wandering if I edited my /etc/passwd file and replaced all the /bin/sh to /bin/false , will that break anything? What Im seeing is accounts like lp, games, uucp, proxy, postgres, and a slew of others that I dont use.   Thanks in advance Debian Guruz! Daniel

RE: Secure 2.4.x kernel

2001-12-27 Thread Howland, Curtis
> -Original Message- > From: Gary MacDougall > > I'm gong to get flamed like hell for this, but I think the general > attitude of people that consider themselves "Linux Security > Guru's" sucks! > If you've ever visited #linux on IRC or talked with people in > a chat room > about Linux

Re: mounting /tmp noexec (was: Campus Computers)

2001-12-27 Thread Joey Hess
Ian wrote: > why is this? Surely it is better security to do so? joey@silk:~>ls -l ./ls -rw---1 joey joey43916 Dec 26 22:46 ./ls joey@silk:~>/lib/ld-2.2.4.so ./ls CVS aalib.nohack.diff doc lsscreenshot.png GNUstep binhtml mail

Re: /etc/passwd ?

2001-12-27 Thread Arthur
just run "info false" [...] This version of `false' is implemented as a C program, and is thus more secure and faster than a shell script implementation, and may safely be used as a dummy shell for the purpose of disabling accounts. so, a "chsh -s /bin/false games" for disabling a teln

Re: /etc/passwd ?

2001-12-27 Thread Petre Daniel
most of them are relics of software that you probably dont need,but be carefully what account you erase. better comment them out.you can put a /etc/NOSHELL instead of /bin/sh or even /bin/false and they won't be able to login into the machine no more.. At 06:24 PM 12/27/01 -0600, Daniel Rychlik

/etc/passwd ?

2001-12-27 Thread Daniel Rychlik
I was wandering if I edited my /etc/passwd file and replaced all the /bin/sh to /bin/false , will that break anything? What Im seeing is accounts like lp, games, uucp, proxy, postgres, and a slew of others that I dont use.   Thanks in advance Debian Guruz! Daniel

RE: Secure 2.4.x kernel

2001-12-27 Thread Howland, Curtis
> -Original Message- > From: Gary MacDougall > > I'm gong to get flamed like hell for this, but I think the general > attitude of people that consider themselves "Linux Security > Guru's" sucks! > If you've ever visited #linux on IRC or talked with people in > a chat room > about Linux

Re: sending password in the command line

2001-12-27 Thread Pedro Zorzenon Neto
On Thu, Dec 27, 2001 at 05:16:16PM +, Merlin wrote: > On Thursday 27 December 2001 16:46, Benjamin Smith wrote: > > > > Because that doesn't solve the original problem of the password being > > visible on the command line. The environment and the stdin were two > > suggested ways of passing the

Re: sending password in the command line

2001-12-27 Thread Robert van der Meulen
Hi, There's a secure-coding (or somesuch) mailinglist over at securityfocus, that might be better suited to these kinds of discussions.. Greets, Robert -- Linux Generation encrypted mail preferred. finger [EMAIL PROTECTED] for my GnuPG/PGP key.

Re: sending password in the command line

2001-12-27 Thread Benjamin Smith
On Thu, Dec 27, 2001 at 05:16:16PM +, Merlin wrote: > On Thursday 27 December 2001 16:46, Benjamin Smith wrote: > > > > Because that doesn't solve the original problem of the password being > > visible on the command line. The environment and the stdin were two > > suggested ways of passing the

Re: sending password in the command line

2001-12-27 Thread Merlin
On Thursday 27 December 2001 16:46, Benjamin Smith wrote: > > Because that doesn't solve the original problem of the password being > visible on the command line. The environment and the stdin were two > suggested ways of passing the password. > Why is all that for ? Isn't you who's writing the pr

Re: sending password in the command line

2001-12-27 Thread xbud
This will not work I believe ps aux will show the environment variable's value instead of the variable. Which in your case would be the password, rendering your idea bad! =/ I would chroot the users' environments (jail them) so that they can only see their own processes... of course this mig

Re: sending password in the command line

2001-12-27 Thread David Flatz
Benjamin Smith said: > > #!/usr/bin/perl > > print('enter pass: '); > > $tmp = <>; > > system('myprogram enable $user $tmp $ip'); > > I think the first bit of code would work but why not use pipe opens in > perl? ie. > > open(PASS, "|myprogram enable $user $ip); > write PASS "PASSWORD"; > the b

Re: sending password in the command line

2001-12-27 Thread Benjamin Smith
On Thu, Dec 27, 2001 at 05:22:03PM +0100, David Flatz wrote: > Pedro Zorzenon Neto said: > > Thanks for you sugestion David, > > > > As it is a Perl script that will call the program, I'll do in the Perl > > code something like this: > > > > $tmp=`umask 177; tempfile`; > > fopen (PASS,">$

RE: Secure 2.4.x kernel

2001-12-27 Thread Gary MacDougall
> Now, I do not know about American law, but at least in Finland the >guy whose gun (assault rifles are illegal anyway unless they are >rendered non-automatic) was stolen, is likely to get punished as well! >It depends on how the gun was stored: it needs to be locked away in a >different location

Re: sending password in the command line

2001-12-27 Thread Robert van der Meulen
Quoting David Flatz ([EMAIL PROTECTED]): > #!/usr/bin/perl > print('enter pass: '); > $tmp = <>; > system('myprogram enable $user $tmp $ip'); Because then you would still pass the password on the commandline. Greets, Robert -- Linux Generation encrypted

Re: sending password in the command line

2001-12-27 Thread Johannes Weiss
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, If you send your password through a network the sniffer could also sniff the TCP-stream, try ngrep -d port Weissi -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE8K0ze3lkVkvL9Fp

Re: sending password in the command line

2001-12-27 Thread Pedro Zorzenon Neto
On Thu, Dec 27, 2001 at 02:11:42PM -0200, Pedro Zorzenon Neto wrote: > > $tmp=`umask 177; tempfile`; > fopen (PASS,">$tmp"); > print PASS $password; > fclose PASS; > `cat $tmp | myprogram enable $user $ip; rm -f $tmp`; sorry... open (PASS,"| myprogram enable $user $ip"); print PA

Re: sending password in the command line

2001-12-27 Thread David Flatz
Pedro Zorzenon Neto said: > Thanks for you sugestion David, > > As it is a Perl script that will call the program, I'll do in the Perl > code something like this: > > $tmp=`umask 177; tempfile`; > fopen (PASS,">$tmp"); > print PASS $password; > fclose PASS; > `cat $tmp | myprogram e

Re: sending password in the command line

2001-12-27 Thread Pedro Zorzenon Neto
On Thu, Dec 27, 2001 at 04:46:45PM +0100, David Flatz wrote: > Pedro Zorzenon Neto said: > > $ PASS="password" myprogram enable username IP > > > > then "myprogram" will read the PASS from the environment. > > is there anyway a regular user could capture passwords? > > yes it is "ps

Re: sending password in the command line

2001-12-27 Thread David Flatz
Pedro Zorzenon Neto said: > $ PASS="password" myprogram enable username IP > > then "myprogram" will read the PASS from the environment. > is there anyway a regular user could capture passwords? yes it is "ps auxe" try getting the password via like "mysql -p" David Flatz

Re: sending password in the command line

2001-12-27 Thread Pedro Zorzenon Neto
On Thu, Dec 27, 2001 at 05:16:16PM +, Merlin wrote: > On Thursday 27 December 2001 16:46, Benjamin Smith wrote: > > > > Because that doesn't solve the original problem of the password being > > visible on the command line. The environment and the stdin were two > > suggested ways of passing th

Re: sending password in the command line

2001-12-27 Thread Robert van der Meulen
Hi, There's a secure-coding (or somesuch) mailinglist over at securityfocus, that might be better suited to these kinds of discussions.. Greets, Robert -- Linux Generation encrypted mail preferred. finger [EMAIL PROTECTED] for my GnuPG/PGP key.

sending password in the command line

2001-12-27 Thread Pedro Zorzenon Neto
Hi Friends, I am developing a software to provide access control to users of a network. The gateway has ipchains rules to DENY packets from all 192.168.0.0/16 hosts to the 0.0.0.0/0 world. If the user (a regular user, not root) does: $ myprogram enable username password IP the pr

Re: sending password in the command line

2001-12-27 Thread Benjamin Smith
On Thu, Dec 27, 2001 at 05:16:16PM +, Merlin wrote: > On Thursday 27 December 2001 16:46, Benjamin Smith wrote: > > > > Because that doesn't solve the original problem of the password being > > visible on the command line. The environment and the stdin were two > > suggested ways of passing th

Re: sending password in the command line

2001-12-27 Thread Merlin
On Thursday 27 December 2001 16:46, Benjamin Smith wrote: > > Because that doesn't solve the original problem of the password being > visible on the command line. The environment and the stdin were two > suggested ways of passing the password. > Why is all that for ? Isn't you who's writing the p

Re: sending password in the command line

2001-12-27 Thread xbud
This will not work I believe ps aux will show the environment variable's value instead of the variable. Which in your case would be the password, rendering your idea bad! =/ I would chroot the users' environments (jail them) so that they can only see their own processes... of course this mi

Re: sending password in the command line

2001-12-27 Thread David Flatz
Benjamin Smith said: > > #!/usr/bin/perl > > print('enter pass: '); > > $tmp = <>; > > system('myprogram enable $user $tmp $ip'); > > I think the first bit of code would work but why not use pipe opens in > perl? ie. > > open(PASS, "|myprogram enable $user $ip); > write PASS "PASSWORD"; > the

Re: sending password in the command line

2001-12-27 Thread Benjamin Smith
On Thu, Dec 27, 2001 at 05:22:03PM +0100, David Flatz wrote: > Pedro Zorzenon Neto said: > > Thanks for you sugestion David, > > > > As it is a Perl script that will call the program, I'll do in the Perl > > code something like this: > > > > $tmp=`umask 177; tempfile`; > > fopen (PASS,">

RE: Secure 2.4.x kernel

2001-12-27 Thread Gary MacDougall
> Now, I do not know about American law, but at least in Finland the >guy whose gun (assault rifles are illegal anyway unless they are >rendered non-automatic) was stolen, is likely to get punished as well! >It depends on how the gun was stored: it needs to be locked away in a >different locatio

Re: sending password in the command line

2001-12-27 Thread Robert van der Meulen
Quoting David Flatz ([EMAIL PROTECTED]): > #!/usr/bin/perl > print('enter pass: '); > $tmp = <>; > system('myprogram enable $user $tmp $ip'); Because then you would still pass the password on the commandline. Greets, Robert -- Linux Generation encrypted

Re: sending password in the command line

2001-12-27 Thread Johannes Weiss
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, If you send your password through a network the sniffer could also sniff the TCP-stream, try ngrep -d port Weissi -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE8K0ze3lkVkvL9F

Re: sending password in the command line

2001-12-27 Thread Pedro Zorzenon Neto
On Thu, Dec 27, 2001 at 02:11:42PM -0200, Pedro Zorzenon Neto wrote: > > $tmp=`umask 177; tempfile`; > fopen (PASS,">$tmp"); > print PASS $password; > fclose PASS; > `cat $tmp | myprogram enable $user $ip; rm -f $tmp`; sorry... open (PASS,"| myprogram enable $user $ip"); print P

Re: sending password in the command line

2001-12-27 Thread David Flatz
Pedro Zorzenon Neto said: > Thanks for you sugestion David, > > As it is a Perl script that will call the program, I'll do in the Perl > code something like this: > > $tmp=`umask 177; tempfile`; > fopen (PASS,">$tmp"); > print PASS $password; > fclose PASS; > `cat $tmp | myprogram

Re: sending password in the command line

2001-12-27 Thread Pedro Zorzenon Neto
On Thu, Dec 27, 2001 at 04:46:45PM +0100, David Flatz wrote: > Pedro Zorzenon Neto said: > > $ PASS="password" myprogram enable username IP > > > > then "myprogram" will read the PASS from the environment. > > is there anyway a regular user could capture passwords? > > yes it is "p

Re: sending password in the command line

2001-12-27 Thread David Flatz
Pedro Zorzenon Neto said: > $ PASS="password" myprogram enable username IP > > then "myprogram" will read the PASS from the environment. > is there anyway a regular user could capture passwords? yes it is "ps auxe" try getting the password via like "mysql -p" David Flatz -- T

sending password in the command line

2001-12-27 Thread Pedro Zorzenon Neto
Hi Friends, I am developing a software to provide access control to users of a network. The gateway has ipchains rules to DENY packets from all 192.168.0.0/16 hosts to the 0.0.0.0/0 world. If the user (a regular user, not root) does: $ myprogram enable username password IP the p

Re: Secure 2.4.x kernel

2001-12-27 Thread Juha Jäykkä
> Just because people are "dumb" or not as fortunate as other more > "privy" people, doesn't mean that the law should bypass the > "unfortunate". The law (at least in the US) were specifically > created to protect people in such circumstances. Why should > computer law be any different? Actual

Re: mounting /tmp noexec (was: Campus Computers)

2001-12-27 Thread Philip Blundell
In message <[EMAIL PROTECTED]>, Ian writes: >so surely, if nothing needs to be executed, it is better to mount >noexec? The thing about noexec is that you can almost always circumvent it. If you have a shell script in /tmp that you want to execute, you can use "sh /tmp/r00tk1t". If you have a b

Re: Secure 2.4.x kernel

2001-12-27 Thread Juha Jäykkä
> Just because people are "dumb" or not as fortunate as other more > "privy" people, doesn't mean that the law should bypass the > "unfortunate". The law (at least in the US) were specifically > created to protect people in such circumstances. Why should > computer law be any different? Actua

Re: Secure 2.4.x kernel - readonly

2001-12-27 Thread Tollef Fog Heen
* Alvin Oga | On Mon, 24 Dec 2001, Anthony DeRobertis wrote: | | > > making the disks readonly is not trivial ... | > > lots of work to make it readonly.. a fun project ... | > | > Not really. Nothing should write anywhere except /var and /tmp | > (did I miss any). Also, if you have users, th

Re: mounting /tmp noexec (was: Campus Computers)

2001-12-27 Thread Philip Blundell
In message <[EMAIL PROTECTED]>, Ian writes: >so surely, if nothing needs to be executed, it is better to mount >noexec? The thing about noexec is that you can almost always circumvent it. If you have a shell script in /tmp that you want to execute, you can use "sh /tmp/r00tk1t". If you have a

Re: Secure 2.4.x kernel - readonly

2001-12-27 Thread Tollef Fog Heen
* Alvin Oga | On Mon, 24 Dec 2001, Anthony DeRobertis wrote: | | > > making the disks readonly is not trivial ... | > > lots of work to make it readonly.. a fun project ... | > | > Not really. Nothing should write anywhere except /var and /tmp | > (did I miss any). Also, if you have users, t