From owner-freebsd-security Tue Oct 8 05:34:55 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id FAA22980 for security-outgoing; Tue, 8 Oct 1996 05:34:55 -0700 (PDT) Received: from Arl-Mail-Svc-1.compuserve.com (arl-mail-svc-1.compuserve.com [149.174.211.4]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id FAA22975 for ; Tue, 8 Oct 1996 05:34:53 -0700 (PDT) Received: from CISPPP (ad19-082.compuserve.com [199.174.161.82]) by Arl-Mail-Svc-1.compuserve.com (8.7.3/8.6.9) with SMTP id IAA16458.; Tue, 8 Oct 1996 08:32:23 -0400 (EDT) Message-ID: <325A739F.926@AOL.com> Date: Tue, 08 Oct 1996 08:30:39 -0700 From: Disaster Recovery Yellow Pages Reply-To: DisasterYP@AOL.com Organization: The Systems Audit Group, Inc. X-Mailer: Mozilla 3.0 (Win16; I) MIME-Version: 1.0 To: FREEBSD-SECURITY@FREEBSD.ORG Subject: DISASTER RECOVERY SOURCEBOOK Content-Type: multipart/mixed; boundary="------------247D565F400E" Sender: owner-security@FREEBSD.ORG X-Loop: FreeBSD.org Precedence: bulk This is a multi-part message in MIME format. --------------247D565F400E Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit FYI: --------------247D565F400E Content-Type: text/plain; charset=us-ascii; name="111PRESS.TXT" Content-Transfer-Encoding: 7bit Content-Disposition: inline; filename="111PRESS.TXT" FOR IMMEDIATE RELEASE - DISASTER RECOVERY RESOURCE GUIDE October 8, 1996 Contact: Steven Lewis DisasterYP@AOL.com 617 - 332-3496 FIFTH EDITION OF THE DISASTER RECOVERY YELLOW PAGES(tm) BEGINS SHIPMENTS - - - UPDATED FOR 1996/7 (coincides with disastrous season) Newton, MA -- The fifth edition of the Disaster Recovery Yellow Pages(tm), by The Systems Audit Group, Inc. has begun shipping, just as people are digging out of this Winter's disasters, widespread Spring flooding, and coping with Summer's hurricanes. Based on nearly two decades of disaster planning experience, the Disaster Recovery Yellow Pages(tm) is a 290-page, comprehensive sourcebook designed to help users locate scores of crucial but hard-to-find recovery services throughout the United States and Canada. It contains over 2700 vendors and covers over 300 categories such as drying & dehumidification of paper & microfilm records, smoke odor counteracting services, trauma counselors, emergency rental of POS and other computer equipment, etc. The volume is an essential reference for risk managers, computer operations managers, emergency personnel, facility managers, security managers, librarians, record managers, systems executives, and business recovery coordinators, as well as claims adjusters, insurance agents, and any others responsible for putting organizations "back to normal" after a crisis. This reference contains five comprehensive sections, covering restoration services, mobile buildings, computer and emergency equipment, planning and data recovery software, as well as training publications and videos. In addition, The Disaster Recovery Yellow Pages(tm) also includes an alphabetical listing of companies for ease in locating a vendor without knowing an address. The Disaster Recovery Yellow Pages(tm) also includes a tutorial on areas which are frequently overlooked by users when preparing their disaster recovery plans, as well as hints on "getting started" and preparing a disaster plan. The Systems Audit Group, Inc., has worked for over a decade with leaders in the Disaster Recovery field to develop this comprehensive sourcebook, as well as using the experiences gained in working with over 80 organizations and institutions to prepare comprehensive recovery plans for the resumption of their operations following a disaster. These organizations have ranged from Banks and Insurance companies to Manufacturers, Retailers, Colleges, and other organizations. The Disaster Recovery Yellow Pages(tm) comes in a three-ring binder, for ease in adding sources which individual users have gathered that are unique to their own circumstances. The price is $98. per copy, plus $3 for shipping and handling. Regular updates are available. To obtain a free brochure, or to order The Disaster Recovery Yellow Pages(tm), contact The Systems Audit Group, Inc., 25 Ellison Road, Newton, Mass. 02159, Telephone 617-332-3496, FAX: 617-332-4358 E-Mail: DisasterYP@AOL.com Keywords: disaster, recovery, planning, facilities, computer --------------247D565F400E-- From owner-freebsd-security Tue Oct 8 07:26:03 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id HAA28915 for security-outgoing; Tue, 8 Oct 1996 07:26:03 -0700 (PDT) Received: from kdat.calpoly.edu (kdat.csc.calpoly.edu [129.65.54.101]) by freefall.freebsd.org (8.7.5/8.7.3) with SMTP id HAA28910 for ; Tue, 8 Oct 1996 07:26:00 -0700 (PDT) Received: (from nlawson@localhost) by kdat.calpoly.edu (8.6.12/N8) id HAA12805 for freebsd-security@freebsd.org; Tue, 8 Oct 1996 07:26:06 -0700 From: Nathan Lawson Message-Id: <199610081426.HAA12805@kdat.calpoly.edu> Subject: Re: DISASTER RECOVERY SOURCEBOOK To: freebsd-security@freebsd.org Date: Tue, 8 Oct 1996 07:26:05 -0700 (PDT) In-Reply-To: <325A739F.926@AOL.com> from "Disaster Recovery Yellow Pages" at Oct 8, 96 08:30:39 am X-Mailer: ELM [version 2.4 PL23] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk > FIFTH EDITION OF THE > DISASTER RECOVERY YELLOW PAGES(tm) > > (coincides with disastrous season) Is this a fault-tolerant NIS system? :-) > Newton, MA -- The fifth edition of the Disaster Recovery > Yellow Pages(tm), by The Systems Audit Group, Inc. has > begun shipping, just as people are digging out of this > Winter's disasters, widespread Spring flooding, and > coping with Summer's hurricanes. I read this to be "widespread SYN flooding". It must be true that you read what you expect to see. -- Nate Lawson "There are a thousand hacking at the branches of CPE Senior evil to one who is striking at the root." CSL Admin -- Henry David Thoreau, 'Walden', 1854 From owner-freebsd-security Thu Oct 10 08:42:20 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id IAA25705 for security-outgoing; Thu, 10 Oct 1996 08:42:20 -0700 (PDT) Received: from www.bemarnet.es ([194.179.67.1]) by freefall.freebsd.org (8.7.5/8.7.3) with SMTP id IAA25696 for ; Thu, 10 Oct 1996 08:42:15 -0700 (PDT) Received: from ariadna (www.santatecla.com [194.179.67.201]) by www.bemarnet.es (8.6.11/8.6.9) with SMTP id RAA03846 for ; Thu, 10 Oct 1996 17:40:57 GMT Message-Id: <2.2.32.19961010154508.0070ce84@host.bemarnet.es> X-Sender: antonio@host.bemarnet.es X-Mailer: Windows Eudora Pro Version 2.2 (32) Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Date: Thu, 10 Oct 1996 16:45:08 +0100 To: freebsd-security@FreeBSD.ORG From: Antonio Navarro Navarro Subject: Restricted access via FTP Sender: owner-security@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk Hello All ! I have created a user account named 'username' with 'shell=/nonexistent' (telnet access is not allowed), 'group=nogroup' and home directory = /home/www/username. The NCSA web server is running under user www (group www) and the home directory for the web pages is /home/www. When the user 'username' makes an FTP to the server, is allowed to update the files under the directory '/home/www/username' (this files can be viewed using a web navigator with the url http://www.bemarnet.es/username) but he also is allowed to do a 'cd \' or 'cd ..' and then look all the files in the server. How can I deny access to all the directory structure under /home/www/username ? Thanks a lot ! +-----------------------------------------------------------------------+ | Antonio Navarro Navarro E-mail: webmaster@bemarnet.es | +-----------------------------------------------------------------------+ | BemarNet Management Phone : +34-6-165.66.44 | | Makes business easier... ,,, Fax : +34-6-165.65.14 | | http://www.bemarnet.es (o o) | +------------------------------o00-(_)-00o------------------------------+ | Have a nice day - Have a nice day - Have a nice day - Have a nice day | +-----------------------------------------------------------------------+ From owner-freebsd-security Thu Oct 10 10:01:21 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id KAA02220 for security-outgoing; Thu, 10 Oct 1996 10:01:21 -0700 (PDT) Received: from mexico.brainstorm.eu.org (root@mexico.brainstorm.eu.org [193.56.58.253]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id KAA02207 for ; Thu, 10 Oct 1996 10:01:16 -0700 (PDT) Received: from brasil.brainstorm.eu.org (brasil.brainstorm.eu.org [193.56.58.33]) by mexico.brainstorm.eu.org (8.7.5/8.7.3) with ESMTP id TAA09163 for ; Thu, 10 Oct 1996 19:00:33 +0100 Received: (from uucp@localhost) by brasil.brainstorm.eu.org (8.6.12/8.6.12) with UUCP id TAA10959 for freebsd-security@FreeBSD.ORG; Thu, 10 Oct 1996 19:00:24 +0200 Received: (from roberto@localhost) by keltia.freenix.fr (8.8.0/keltia-uucp-2.9) id SAA25923; Thu, 10 Oct 1996 18:55:41 +0200 (MET DST) Message-Id: <199610101655.SAA25923@keltia.freenix.fr> Date: Thu, 10 Oct 1996 18:55:41 +0200 From: roberto@keltia.freenix.fr (Ollivier Robert) To: freebsd-security@FreeBSD.ORG Subject: Re: Restricted access via FTP In-Reply-To: <2.2.32.19961010154508.0070ce84@host.bemarnet.es>; from Antonio Navarro Navarro on Oct 10, 1996 16:45:08 +0100 References: <2.2.32.19961010154508.0070ce84@host.bemarnet.es> X-Mailer: Mutt 0.47.09 Mime-Version: 1.0 X-Operating-System: FreeBSD 2.2-CURRENT ctm#2522 Sender: owner-security@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk According to Antonio Navarro Navarro: > How can I deny access to all the directory structure under /home/www/username ? Use the "guestgroup" feature of wu-ftpd (see /usr/ports/net/wu-ftpd). It makes ftpd perform a chroot in the user's directory. -- Ollivier ROBERT -=- The daemon is FREE! -=- roberto@keltia.freenix.fr FreeBSD keltia.freenix.fr 2.2-CURRENT #23: Sun Sep 29 14:56:23 MET DST 1996 From owner-freebsd-security Thu Oct 10 11:05:06 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id LAA06801 for security-outgoing; Thu, 10 Oct 1996 11:05:06 -0700 (PDT) Received: from www.hsc.wvu.edu (www.hsc.wvu.edu [157.182.105.122]) by freefall.freebsd.org (8.7.5/8.7.3) with SMTP id LAA06781 for ; Thu, 10 Oct 1996 11:05:00 -0700 (PDT) Received: (from rjivan@localhost) by www.hsc.wvu.edu (8.6.12/8.6.12) id OAA05229; Thu, 10 Oct 1996 14:07:21 -0400 Date: Thu, 10 Oct 1996 14:07:21 -0400 (EDT) From: Rajiv Jivan To: Antonio Navarro Navarro cc: freebsd-security@freebsd.org Subject: Re: Restricted access via FTP In-Reply-To: <2.2.32.19961010154508.0070ce84@host.bemarnet.es> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Use wu-ftpd as your ftpd daemon On Thu, 10 Oct 1996, Antonio Navarro Navarro wrote: > Hello All ! > > I have created a user account named 'username' with 'shell=/nonexistent' > (telnet access is not allowed), 'group=nogroup' and home directory = > /home/www/username. The NCSA web server is running under user www (group > www) and the home directory for the web pages is /home/www. > > When the user 'username' makes an FTP to the server, is allowed to update > the files under the directory '/home/www/username' (this files can be viewed > using a web navigator with the url http://www.bemarnet.es/username) but he > also is allowed to do a 'cd \' or 'cd ..' and then look all the files in the > server. > > How can I deny access to all the directory structure under /home/www/username ? > > Thanks a lot ! > > +-----------------------------------------------------------------------+ > | Antonio Navarro Navarro E-mail: webmaster@bemarnet.es | > +-----------------------------------------------------------------------+ > | BemarNet Management Phone : +34-6-165.66.44 | > | Makes business easier... ,,, Fax : +34-6-165.65.14 | > | http://www.bemarnet.es (o o) | > +------------------------------o00-(_)-00o------------------------------+ > | Have a nice day - Have a nice day - Have a nice day - Have a nice day | > +-----------------------------------------------------------------------+ > From owner-freebsd-security Thu Oct 10 12:19:32 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id MAA09938 for security-outgoing; Thu, 10 Oct 1996 12:19:32 -0700 (PDT) Received: from mail.crl.com (mail.crl.com [165.113.1.22]) by freefall.freebsd.org (8.7.5/8.7.3) with SMTP id MAA09929 for ; Thu, 10 Oct 1996 12:19:29 -0700 (PDT) Received: from al.imforei.apana.org.au by mail.crl.com with SMTP id AA28130 (5.65c/IDA-1.5 for ); Thu, 10 Oct 1996 12:20:21 -0700 Received: (from pjchilds@localhost) by al.imforei.apana.org.au (8.8.0/8.7.3) id EAA01749; Fri, 11 Oct 1996 04:46:31 +0930 (CST) Date: Fri, 11 Oct 1996 04:46:31 +0930 (CST) From: Peter Childs Message-Id: <199610101916.EAA01749@al.imforei.apana.org.au> To: hostmaster@bemarnet.es (Antonio Navarro Navarro), freebsd-security@freebsd.org Subject: Re: Restricted access via FTP X-Newsreader: TIN [version 1.2 PL2] Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk In article <2.2.32.19961010154508.0070ce84@host.bemarnet.es> you wrote: : Hello All ! Gday! [cut] : the files under the directory '/home/www/username' (this files can be viewed : using a web navigator with the url http://www.bemarnet.es/username) but he : also is allowed to do a 'cd \' or 'cd ..' and then look all the files in the : server. There are some patches to wu-ftpd to allow multihomed hosts, and some others to do "chroot" for users ftp directories. I suggest either finding these, or just modifiying wu-ftpd yourself so that it "chroot"'s into users home directories when they log in with ftp. You'll need to remember that if they do chroot then they require accessable copies of "ls" and stuff like that. Perhaps you should make it so that it "chroot"'s to /home and then have a /home/bin with static binaries users might require for ftp (like ls) Regards, Peter -- Peter Childs --- http://www.imforei.apana.org.au/~pjchilds Finger pjchilds@al.imforei.apana.org.au for public PGP key Drag me, drop me, treat me like an object! From owner-freebsd-security Sat Oct 12 10:52:35 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id KAA14490 for security-outgoing; Sat, 12 Oct 1996 10:52:35 -0700 (PDT) Received: from fyeung5.netific.com (netific.vip.best.com [205.149.182.145]) by freefall.freebsd.org (8.7.5/8.7.3) with SMTP id KAA14485 for ; Sat, 12 Oct 1996 10:52:32 -0700 (PDT) Received: from fyeung8.netific.com (fyeung8.netific.com [204.238.125.8]) by fyeung5.netific.com (8.6.12/8.6.9) with SMTP id KAA07146 for ; Sat, 12 Oct 1996 10:54:53 -0700 Received: by fyeung8.netific.com (5.x/SMI-SVR4) id AA18441; Sat, 12 Oct 1996 10:59:33 -0700 Date: Sat, 12 Oct 1996 10:59:33 -0700 From: fyeung@fyeung8.netific.com (Francis Yeung) Message-Id: <9610121759.AA18441@fyeung8.netific.com> To: security@freebsd.org Subject: IPSec on FreeBSD X-Sun-Charset: US-ASCII Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Greetings, Has anyone ported the NetBSD's IPSec code to FreeBSD ? Thx. Fran From owner-freebsd-security Sat Oct 12 12:15:52 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id MAA21633 for security-outgoing; Sat, 12 Oct 1996 12:15:52 -0700 (PDT) Received: from phoenix.volant.org (root@phoenix.volant.org [205.179.79.193]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id MAA21626 for ; Sat, 12 Oct 1996 12:15:49 -0700 (PDT) From: patl@asimov.volant.org Received: from asimov.volant.org (asimov.phoenix.volant.org [205.179.79.65]) by phoenix.volant.org (8.7.5/8.7.3) with SMTP id MAA25566 for ; Sat, 12 Oct 1996 12:13:59 -0700 (PDT) Received: by asimov.volant.org (5.x/SMI-SVR4) id AA02624; Sat, 12 Oct 1996 12:17:13 -0700 Date: Sat, 12 Oct 1996 12:17:13 -0700 Message-Id: <9610121917.AA02624@asimov.volant.org> To: freebsd-security@freebsd.org Subject: exec* ("/dev/fd/mumble", ...) Reply-To: patl@Phoenix.volant.org Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Content-Md5: yT+HmgS6UmNQse/Y463dDA== Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk What happens if you pass "/dev/fd/" to execve(2) or any of the exec* functions that are front-ends to it? In particular, does it properly execute the binary on the open file; and if so, does the executed program inherit an open fd on itself, or does it get closed by execve? If it does work, and it closes the file, it would allow chrooted execution of a binary without requiring the binary to be in the chroot file space. If someone knowlegable in this portion of the kernel can assure me that it should work, I'll add an option to chroot(8) and/or chrootuid(8) to specify that the command should be opened before the chroot(2) and passed as a /dev/fd reference. (Unless, of course, someone can explain why this would be a Bad Idea.) -Pat My opinions are my own. For a small royalty, they can be yours as well... Pat Lashley, Senior Software Engineer, Henry Davis Consulting patl@Phoenix.Volant.ORG || http://Phoenix.Volant.ORG/ || lashley@netcom.com PGP Key Fingerprint: 2C 2A A9 8E 86 F1 AE 17 55 9D 49 31 5B 96 E7 92