From owner-freebsd-security Sun Dec 9 6:19:54 2001
Delivered-To: freebsd-security@freebsd.org
Received: from mx04.nexgo.de (mx04.nexgo.de [151.189.8.80])
by hub.freebsd.org (Postfix) with ESMTP id 6807737B417
for ; Sun, 9 Dec 2001 06:19:52 -0800 (PST)
Received: from localhost (dsl-213-023-060-243.arcor-ip.net [213.23.60.243])
by mx04.nexgo.de (Postfix) with ESMTP
id 588CA37B3E; Sun, 9 Dec 2001 15:19:50 +0100 (CET)
Received: by localhost (Postfix, from userid 31451)
id 4AA8443CF; Sun, 9 Dec 2001 15:19:39 +0100 (CET)
Date: Sun, 9 Dec 2001 15:19:39 +0100
From: Markus Friedl
To: Henry smith
Cc: security@freebsd.org
Subject: Re: upgrade sshd ?
Message-ID: <20011209151939.A25117@folly>
References: <20011205010118.50293.qmail@web21109.mail.yahoo.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
In-Reply-To: <20011205010118.50293.qmail@web21109.mail.yahoo.com>; from getzz11@yahoo.com on Tue, Dec 04, 2001 at 05:01:18PM -0800
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
On Tue, Dec 04, 2001 at 05:01:18PM -0800, Henry smith wrote:
> Right now, I'm using OpenSSH_3.0.1. Do I need to
> upgrade to 3.0.2 ?
No, only if you need to use UseLogin.
UseLogin is usually only needed for some legacy systems.
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Sun Dec 9 10:27:14 2001
Delivered-To: freebsd-security@freebsd.org
Received: from green.bikeshed.org (freefall.FreeBSD.org [216.136.204.21])
by hub.freebsd.org (Postfix) with ESMTP
id 5B17337B417; Sun, 9 Dec 2001 10:27:11 -0800 (PST)
Received: from localhost (green@localhost)
by green.bikeshed.org (8.11.6/8.11.6) with ESMTP id fB9IRAl13742;
Sun, 9 Dec 2001 13:27:10 -0500 (EST)
(envelope-from green@green.bikeshed.org)
Message-Id: <200112091827.fB9IRAl13742@green.bikeshed.org>
X-Mailer: exmh version 2.5 07/13/2001 with nmh-1.0.4
To: Robert Watson
Cc: "Crist J . Clark" , alexus ,
freebsd-security@FreeBSD.ORG
Subject: Re: identd inside of jail
In-Reply-To: Message from Robert Watson
of "Fri, 07 Dec 2001 11:52:57 EST."
From: "Brian F. Feldman"
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Date: Sun, 09 Dec 2001 13:27:10 -0500
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
Robert Watson wrote:
>
> This problem is fixed in 5.0-CURRENT as it performs two checks in udp and
> tcp getcred: first, it checks for privilege (and permits the jail to
> succeed), and second, it checks whether the connection in question is
> visible to the current jail. I do not currently plan to merge these
> changes to -STABLE, as they rely on changes merging the pcred and ucred
> structures, which in turn depend on a lot of other changes throughout the
> kernel in 5.0-CURRENT. As a follow-up note, the credential management
> code in 5.0-CURRENT is substantially rewritten, and the result is much
> better enforcement of process and resource visibility, both from the
> perspective of jail, and from limiting users from seeing resources created
> by other users (such as TCP connections) when dictated by policy.
For 4.X, how about a sysctl kern.security.bsd.jail_getcred_enabled or a
jail.getcred_allowed? That would make at least some people happy, I think.
--
Brian Fundakowski Feldman \ FreeBSD: The Power to Serve! /
green@FreeBSD.org `------------------------------'
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Sun Dec 9 13:24: 3 2001
Delivered-To: freebsd-security@freebsd.org
Received: from fledge.watson.org (fledge.watson.org [204.156.12.50])
by hub.freebsd.org (Postfix) with ESMTP
id B7AA937B416; Sun, 9 Dec 2001 13:24:00 -0800 (PST)
Received: from fledge.watson.org (robert@fledge.pr.watson.org [192.0.2.3])
by fledge.watson.org (8.11.6/8.11.5) with SMTP id fB9LNji91881;
Sun, 9 Dec 2001 16:23:45 -0500 (EST)
(envelope-from robert@fledge.watson.org)
Date: Sun, 9 Dec 2001 16:23:45 -0500 (EST)
From: Robert Watson
X-Sender: robert@fledge.watson.org
To: "Brian F. Feldman"
Cc: "Crist J . Clark" , alexus ,
freebsd-security@FreeBSD.ORG
Subject: Re: identd inside of jail
In-Reply-To: <200112091827.fB9IRAl13742@green.bikeshed.org>
Message-ID:
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
On Sun, 9 Dec 2001, Brian F. Feldman wrote:
> Robert Watson wrote:
> >
> > This problem is fixed in 5.0-CURRENT as it performs two checks in udp and
> > tcp getcred: first, it checks for privilege (and permits the jail to
> > succeed), and second, it checks whether the connection in question is
> > visible to the current jail. I do not currently plan to merge these
> > changes to -STABLE, as they rely on changes merging the pcred and ucred
> > structures, which in turn depend on a lot of other changes throughout the
> > kernel in 5.0-CURRENT. As a follow-up note, the credential management
> > code in 5.0-CURRENT is substantially rewritten, and the result is much
> > better enforcement of process and resource visibility, both from the
> > perspective of jail, and from limiting users from seeing resources created
> > by other users (such as TCP connections) when dictated by policy.
>
> For 4.X, how about a sysctl kern.security.bsd.jail_getcred_enabled or a
> jail.getcred_allowed? That would make at least some people happy, I
> think.
I'm a little wary of adding features that we know we'll obsolete as soon
as 5.0 comes out :-). However, if you called it:
jail.almostdeprecated.global_getcred_allowed
or something, I might survive. Part of the issue here is that we know
this isn't the right fix, it's just that the right fix is fairly involved,
and something that the details of are still in flux in the -CURRENT branch
(general handling of credentials and subject/object visibility has changed
a lot, and will change more before we're done). Right now the fix in
-CURRENT relies on the cached subject credential in the socket: this is
actually wrong, it should probably instead rely on an object label. In a
sense, I'd really prefer that we simply wait until 5.0 to ship with a
system that has this behavior correct in jail: 5.0 has much more mature
kernel security characteristics.
Robert N M Watson FreeBSD Core Team, TrustedBSD Project
robert@fledge.watson.org NAI Labs, Safeport Network Services
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Sun Dec 9 13:27:47 2001
Delivered-To: freebsd-security@freebsd.org
Received: from fledge.watson.org (fledge.watson.org [204.156.12.50])
by hub.freebsd.org (Postfix) with ESMTP
id F2C8837B405; Sun, 9 Dec 2001 13:27:44 -0800 (PST)
Received: from localhost (arr@localhost)
by fledge.watson.org (8.11.6/8.11.5) with SMTP id fB9LRU091944;
Sun, 9 Dec 2001 16:27:30 -0500 (EST)
(envelope-from arr@FreeBSD.org)
X-Authentication-Warning: fledge.watson.org: arr owned process doing -bs
Date: Sun, 9 Dec 2001 16:27:29 -0500 (EST)
From: "Andrew R. Reiter"
X-Sender: arr@fledge.watson.org
To: Robert Watson
Cc: "Brian F. Feldman" ,
"Crist J . Clark" , alexus ,
freebsd-security@FreeBSD.org
Subject: Re: identd inside of jail
In-Reply-To:
Message-ID:
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
:
: jail.almostdeprecated.global_getcred_allowed
Is it worth moving jail -> kern.security.jail. since most security
related subsystems are there? I think was also fond of this idea, iirc.
I searched to see what would really be effected by the move and it seemed
just about nothing would be.
Andrew
--
Andrew R. Reiter
arr@watson.org
arr@FreeBSD.org
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Sun Dec 9 13:29:10 2001
Delivered-To: freebsd-security@freebsd.org
Received: from fledge.watson.org (fledge.watson.org [204.156.12.50])
by hub.freebsd.org (Postfix) with ESMTP
id 4BFC037B405; Sun, 9 Dec 2001 13:29:07 -0800 (PST)
Received: from localhost (arr@localhost)
by fledge.watson.org (8.11.6/8.11.5) with SMTP id fB9LSqG91961;
Sun, 9 Dec 2001 16:28:52 -0500 (EST)
(envelope-from arr@FreeBSD.org)
X-Authentication-Warning: fledge.watson.org: arr owned process doing -bs
Date: Sun, 9 Dec 2001 16:28:52 -0500 (EST)
From: "Andrew R. Reiter"
X-Sender: arr@fledge.watson.org
To: "Andrew R. Reiter"
Cc: Robert Watson ,
"Brian F. Feldman" ,
"Crist J . Clark" , alexus ,
freebsd-security@FreeBSD.org
Subject: Re: identd inside of jail
In-Reply-To:
Message-ID:
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
On Sun, 9 Dec 2001, Andrew R. Reiter wrote:
::
:: jail.almostdeprecated.global_getcred_allowed
:
:Is it worth moving jail -> kern.security.jail. since most security
:related subsystems are there? I think was also fond of this idea, iirc.
^-- green
:I searched to see what would really be effected by the move and it seemed
:just about nothing would be.
:
:Andrew
:
:--
:Andrew R. Reiter
:arr@watson.org
:arr@FreeBSD.org
:
:
:To Unsubscribe: send mail to majordomo@FreeBSD.org
:with "unsubscribe freebsd-security" in the body of the message
:
--
Andrew R. Reiter
arr@watson.org
arr@FreeBSD.org
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Sun Dec 9 14: 6:35 2001
Delivered-To: freebsd-security@freebsd.org
Received: from fledge.watson.org (fledge.watson.org [204.156.12.50])
by hub.freebsd.org (Postfix) with ESMTP
id 0978C37B405; Sun, 9 Dec 2001 14:06:31 -0800 (PST)
Received: from fledge.watson.org (robert@fledge.pr.watson.org [192.0.2.3])
by fledge.watson.org (8.11.6/8.11.5) with SMTP id fB9M6Gi92587;
Sun, 9 Dec 2001 17:06:16 -0500 (EST)
(envelope-from robert@fledge.watson.org)
Date: Sun, 9 Dec 2001 17:06:15 -0500 (EST)
From: Robert Watson
X-Sender: robert@fledge.watson.org
To: "Andrew R. Reiter"
Cc: "Brian F. Feldman" ,
"Crist J . Clark" , alexus ,
freebsd-security@FreeBSD.org
Subject: Re: identd inside of jail
In-Reply-To:
Message-ID:
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
On Sun, 9 Dec 2001, Andrew R. Reiter wrote:
> : jail.almostdeprecated.global_getcred_allowed
>
> Is it worth moving jail -> kern.security.jail. since most security
> related subsystems are there? I think was also fond of this idea, iirc.
> I searched to see what would really be effected by the move and it
> seemed just about nothing would be.
In -CURRENT, yes. In -STABLE, almost definitely not. :-)
Robert N M Watson FreeBSD Core Team, TrustedBSD Project
robert@fledge.watson.org NAI Labs, Safeport Network Services
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Sun Dec 9 23:52:33 2001
Delivered-To: freebsd-security@freebsd.org
Received: from mta06-svc.ntlworld.com (mta06-svc.ntlworld.com [62.253.162.46])
by hub.freebsd.org (Postfix) with ESMTP id D9FA337B416
for ; Sun, 9 Dec 2001 23:52:31 -0800 (PST)
Received: from there ([80.4.125.7]) by mta06-svc.ntlworld.com
(InterMail vM.4.01.03.23 201-229-121-123-20010418) with SMTP
id <20011210075231.JFSH3849.mta06-svc.ntlworld.com@there>
for ;
Mon, 10 Dec 2001 07:52:31 +0000
Content-Type: text/plain;
charset="iso-8859-1"
From: Mike D
To: freebsd-security@freebsd.org
Subject: ICMP from within only
Date: Mon, 10 Dec 2001 07:52:07 +0000
X-Mailer: KMail [version 1.3]
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Message-Id: <20011210075231.JFSH3849.mta06-svc.ntlworld.com@there>
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
Is it possible to define a rule that will allow through pings and
traceroutes, but only the ones initiated from within the firewall?
Thanks for any advice!
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 1:22:16 2001
Delivered-To: freebsd-security@freebsd.org
Received: from mail.af-inet.net (cx793560-b.dt1.sdca.home.com [24.13.5.229])
by hub.freebsd.org (Postfix) with ESMTP id 3CC7E37B419
for ; Mon, 10 Dec 2001 01:22:14 -0800 (PST)
Received: from localhost (jaron@localhost)
by mail.af-inet.net (8.11.4/8.11.4) with ESMTP id fBA9A5f32198;
Mon, 10 Dec 2001 01:10:06 -0800 (PST)
Date: Mon, 10 Dec 2001 01:10:05 -0800 (PST)
From: Jaron Omega
To: Mike D
Cc:
Subject: Re: ICMP from within only
In-Reply-To: <20011210075231.JFSH3849.mta06-svc.ntlworld.com@there>
Message-ID:
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
On Mon, 10 Dec 2001, Mike D wrote:
>Is it possible to define a rule that will allow through pings and
>traceroutes, but only the ones initiated from within the firewall?
>
>Thanks for any advice!
Yes via 'icmptypes' attribute.
fwcmd = /sbin/ipfw <- FreeBSD's firewall.
Allows YOU to ping, and run traceroute.
$fwcmd add allow icmp from any to via icmptypes 0,3,11
Denies others to ping you.
$fwcmd add deny icmp from any to via icmptypes 0,8
Allows pinging etc, from your personal network.
$fwcmd add allow icmp from to via icmptypes 0,8
Jaron Omega
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 1:33:49 2001
Delivered-To: freebsd-security@freebsd.org
Received: from straylight.ringlet.net (sentinel.office1.bg [217.75.134.126])
by hub.freebsd.org (Postfix) with SMTP id DC69F37B417
for ; Mon, 10 Dec 2001 01:33:40 -0800 (PST)
Received: (qmail 14003 invoked by uid 1000); 10 Dec 2001 09:32:49 -0000
Date: Mon, 10 Dec 2001 11:32:49 +0200
From: Peter Pentchev
To: Jaron Omega
Cc: Mike D , freebsd-security@FreeBSD.ORG
Subject: Re: ICMP from within only
Message-ID: <20011210113249.D757@straylight.oblivion.bg>
Mail-Followup-To: Jaron Omega ,
Mike D , freebsd-security@FreeBSD.ORG
References: <20011210075231.JFSH3849.mta06-svc.ntlworld.com@there>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
In-Reply-To: ; from jaron@af-inet.net on Mon, Dec 10, 2001 at 01:10:05AM -0800
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
On Mon, Dec 10, 2001 at 01:10:05AM -0800, Jaron Omega wrote:
> On Mon, 10 Dec 2001, Mike D wrote:
>
> >Is it possible to define a rule that will allow through pings and
> >traceroutes, but only the ones initiated from within the firewall?
> >
> >Thanks for any advice!
>
> Yes via 'icmptypes' attribute.
>
> fwcmd = /sbin/ipfw <- FreeBSD's firewall.
>
> Allows YOU to ping, and run traceroute.
> $fwcmd add allow icmp from any to via icmptypes 0,3,11
Note that this alone will not really allow you to run traceroute.
This lets in the *response* packets; however, those responses will
never be generated unless you allow the outgoing traceroute packets.
For the Van Jacobson traceroute implementation (used in most modern
Unix-like OS's, including FreeBSD), you will need something like:
$fwcmd add allow udp from to any 33400-33500 via
The MS Windows traceroute uses ICMP ECHO (ping) packets, IIRC,
so the above rule for pings should work fine.
> Denies others to ping you.
> $fwcmd add deny icmp from any to via icmptypes 0,8
>
> Allows pinging etc, from your personal network.
> $fwcmd add allow icmp from to via icmptypes 0,8
As above, you might need to allow UDP packets with a destination
port range of 33400-33500 for VJ traceroute to work.
G'luck,
Peter
--
This sentence every third, but it still comprehensible.
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 4:21:26 2001
Delivered-To: freebsd-security@freebsd.org
Received: from email03.aon.at (WARSL401PIP7.highway.telekom.at [195.3.96.115])
by hub.freebsd.org (Postfix) with SMTP id 74A3137B41C
for ; Mon, 10 Dec 2001 04:21:07 -0800 (PST)
Received: (qmail 263126 invoked from network); 10 Dec 2001 12:19:01 -0000
Received: from n054p029.adsl.highway.telekom.at (HELO gcidream.com) ([213.33.6.189]) (envelope-sender )
by qmail3.highway.telekom.at (qmail-ldap-1.03) with SMTP
for ; 10 Dec 2001 12:19:01 -0000
From: "N.Anderson@gcidream.com"
To: "8899@msn.com" <8899@msn.com>
Message-ID: <1007990642.0157830546@gcidream.com>
Subject: Low cost quality conference calls
MIME-Version: 1.0
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Date: Mon, 10 Dec 2001 04:21:07 -0800 (PST)
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
Take Control Of Your Conference Calls
Long Distance
Conferencing Only 18 Cents Per
Minute |
Connects Up To 100 Participants=21=
B>
No setup fees
No contracts or monthly fees
Call anytime, from anywhere, to anywhere
International Dial In 18 cents per minute
Simplicity in set up and administration
Operator Help available 24/7 |
G=
et the best
quality, the easiest to use, and lowest rate in the
industry. |
If you like saving =
money, fill
out the form below and one of our consultants will contact
you. |
Required Input Field*
This ad is being sent in compliance with Senate Bill 1618=
, Title 3, Section 301.
You have recently visited our web site, referral or affiliate sit=
es which indicated you were
interested in communication services. If this email is reaching =
you in error and you feel that you have not contacted
us, Click
here. We sincerely apologize, and assure you will be r=
emoved from our distribution list.
|
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 6: 1:11 2001
Delivered-To: freebsd-security@freebsd.org
Received: from salseiros.melim.com.br (salseiros.melim.com.br [200.215.110.23])
by hub.freebsd.org (Postfix) with ESMTP id 66D7A37B416
for ; Mon, 10 Dec 2001 06:01:06 -0800 (PST)
Received: from fazendinha (ressacada.melim.com.br [200.215.110.4])
by salseiros.melim.com.br (Postfix) with SMTP id DBAB1BA88
for ; Mon, 10 Dec 2001 12:01:03 -0200 (BRST)
Message-ID: <035301c18183$54d13460$2aa8a8c0@melim.com.br>
From: "Ronan Lucio"
To:
Subject: Accessing as root
Date: Mon, 10 Dec 2001 12:02:40 -0200
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
Hi All,
I need to make some scripts to change the password and another
things like that need root permissions, but:
How can I do it without opening a security hole in the server?
What is the best way to do it?
Thankīs to All,
Ronan
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 6:17:12 2001
Delivered-To: freebsd-security@freebsd.org
Received: from web11805.mail.yahoo.com (web11805.mail.yahoo.com [216.136.172.159])
by hub.freebsd.org (Postfix) with SMTP id 37ECA37B419
for ; Mon, 10 Dec 2001 06:17:06 -0800 (PST)
Message-ID: <20011210141706.27192.qmail@web11805.mail.yahoo.com>
Received: from [64.73.64.94] by web11805.mail.yahoo.com via HTTP; Mon, 10 Dec 2001 06:17:06 PST
Date: Mon, 10 Dec 2001 06:17:06 -0800 (PST)
From: X Philius
Reply-To: xphilius@yahoo.com
Subject: Re: Anyone know Free Mac OS 9.xx SSH2 client??
To: Jim Flowers ,
micheas
Cc: security@FreeBSD.ORG
In-Reply-To: <001f01c17ff3$ed1cc270$22b197ce@ezo.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
Jim,
Hmmm. With the F-Secure SSH client (the non-GPL DataFellows client) all
I did was remove the CR/LF from the exported pub key block and manually
pasted it in to the authorized_keys2 file. This worked fine for that
client, but does not work with the pub key exported from MacSSH. I did
not know about this conversion process. The pub key string from MacSSH
*looks* the same, but perhaps this is the problem. The error message on
the server does seem to suggest that there is some problem with the
format of the key.
Jason
--- Jim Flowers wrote:
> You don't say what the ssh server is but I assume it is stock fbsd.
> Can you
> generate DSA key pair on Mac and then convert the public key with
> `ssh-keygen -X -f ~/.ssh/whateverkey.pub >> authorized_keys2`.
__________________________________________________
Do You Yahoo!?
Send your FREE holiday greetings online!
http://greetings.yahoo.com
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 6:36:38 2001
Delivered-To: freebsd-security@freebsd.org
Received: from web11806.mail.yahoo.com (web11806.mail.yahoo.com [216.136.172.160])
by hub.freebsd.org (Postfix) with SMTP id 3972137B405
for ; Mon, 10 Dec 2001 06:36:29 -0800 (PST)
Message-ID: <20011210143629.51246.qmail@web11806.mail.yahoo.com>
Received: from [64.73.64.94] by web11806.mail.yahoo.com via HTTP; Mon, 10 Dec 2001 06:36:28 PST
Date: Mon, 10 Dec 2001 06:36:28 -0800 (PST)
From: X Philius
Reply-To: xphilius@yahoo.com
Subject: Re: Anyone know Free Mac OS 9.xx SSH2 client??
To: David Kutcher ,
Jim Flowers , micheas
Cc: security@FreeBSD.ORG
In-Reply-To:
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
David,
Stellar! That worked! I am so psyched! Haven't tried the tunneling
action yet, but I'm not too concerned about securing my data, just my
passwords, I'm not a spook, nor a criminal ;-) I think I'll drop them
an email and let them know they should post their product in a few more
obvious spots. I checked versiontracker and download.com and tucows and
didn't see their terminal.
Jason
--- David Kutcher wrote:
> http://w3.arizona.edu/~consult/mac-mindt.html
>
> MindTerm. MindTerm and Fetch were the only method so far that I've
> been
> able to use to connect a non-OSX mac to an SSH server (terminal and
> ftp)
>
> David
__________________________________________________
Do You Yahoo!?
Send your FREE holiday greetings online!
http://greetings.yahoo.com
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 7:59:47 2001
Delivered-To: freebsd-security@freebsd.org
Received: from axl.seasidesoftware.co.za (axl.seasidesoftware.co.za [196.31.7.201])
by hub.freebsd.org (Postfix) with ESMTP id 2F81E37B417
for ; Mon, 10 Dec 2001 07:59:42 -0800 (PST)
Received: from sheldonh (helo=axl.seasidesoftware.co.za)
by axl.seasidesoftware.co.za with local-esmtp (Exim 3.33 #1)
id 16DSro-000FhU-00; Mon, 10 Dec 2001 18:01:20 +0200
From: Sheldon Hearn
To: "Ronan Lucio"
Cc: security@freebsd.org
Subject: Re: Accessing as root
In-reply-to: Your message of "Mon, 10 Dec 2001 12:02:40 -0200."
<035301c18183$54d13460$2aa8a8c0@melim.com.br>
Date: Mon, 10 Dec 2001 18:01:20 +0200
Message-ID: <60355.1008000080@axl.seasidesoftware.co.za>
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
On Mon, 10 Dec 2001 12:02:40 -0200, "Ronan Lucio" wrote:
> I need to make some scripts to change the password and another
> things like that need root permissions, but:
>
> How can I do it without opening a security hole in the server?
> What is the best way to do it?
1) Limit exposure to just those commands that need privelege, by passing
your command as arguments to the su(1) command.
2) Be _very_ careful about the input you accept and then pass on to these
priveleged commands.
Ciao,
Sheldon.
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 8: 1:35 2001
Delivered-To: freebsd-security@freebsd.org
Received: from axl.seasidesoftware.co.za (axl.seasidesoftware.co.za [196.31.7.201])
by hub.freebsd.org (Postfix) with ESMTP id 3A70B37B417
for ; Mon, 10 Dec 2001 08:01:30 -0800 (PST)
Received: from sheldonh (helo=axl.seasidesoftware.co.za)
by axl.seasidesoftware.co.za with local-esmtp (Exim 3.33 #1)
id 16DSte-000FiM-00; Mon, 10 Dec 2001 18:03:14 +0200
From: Sheldon Hearn
To: "Ronan Lucio"
Cc: security@freebsd.org
Subject: Re: Accessing as root
In-reply-to: Your message of "Mon, 10 Dec 2001 18:01:20 +0200."
<60355.1008000080@axl.seasidesoftware.co.za>
Date: Mon, 10 Dec 2001 18:03:14 +0200
Message-ID: <60409.1008000194@axl.seasidesoftware.co.za>
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
On Mon, 10 Dec 2001 18:01:20 +0200, Sheldon Hearn wrote:
> > I need to make some scripts to change the password and another
> > things like that need root permissions, but:
> >
> > How can I do it without opening a security hole in the server?
> > What is the best way to do it?
>
> 1) Limit exposure to just those commands that need privelege, by passing
> your command as arguments to the su(1) command.
This is stupid advice, sorry.
You need to make your script setuid root (see chmod(1)). If the script
is big, or does complex input handling, consider breaking out the part
that needs privelege into its own smaller script, called by a wrapper
that does input sanity checking.
Ultimately, you want to limit the privelege to as little work as
possible.
Ciao,
Sheldon.
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 8: 7:43 2001
Delivered-To: freebsd-security@freebsd.org
Received: from straylight.ringlet.net (sentinel.office1.bg [217.75.134.126])
by hub.freebsd.org (Postfix) with SMTP id 4C2F837B416
for ; Mon, 10 Dec 2001 08:07:35 -0800 (PST)
Received: (qmail 28353 invoked by uid 1000); 10 Dec 2001 16:06:39 -0000
Date: Mon, 10 Dec 2001 18:06:39 +0200
From: Peter Pentchev
To: Sheldon Hearn
Cc: Ronan Lucio , security@freebsd.org
Subject: Re: Accessing as root
Message-ID: <20011210180639.J757@straylight.oblivion.bg>
Mail-Followup-To: Sheldon Hearn ,
Ronan Lucio , security@freebsd.org
References: <60355.1008000080@axl.seasidesoftware.co.za> <60409.1008000194@axl.seasidesoftware.co.za>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
In-Reply-To: <60409.1008000194@axl.seasidesoftware.co.za>; from sheldonh@starjuice.net on Mon, Dec 10, 2001 at 06:03:14PM +0200
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
On Mon, Dec 10, 2001 at 06:03:14PM +0200, Sheldon Hearn wrote:
>
>
> On Mon, 10 Dec 2001 18:01:20 +0200, Sheldon Hearn wrote:
>
> > > I need to make some scripts to change the password and another
> > > things like that need root permissions, but:
> > >
> > > How can I do it without opening a security hole in the server?
> > > What is the best way to do it?
> >
> > 1) Limit exposure to just those commands that need privelege, by passing
> > your command as arguments to the su(1) command.
>
> This is stupid advice, sorry.
>
> You need to make your script setuid root (see chmod(1)). If the script
> is big, or does complex input handling, consider breaking out the part
> that needs privelege into its own smaller script, called by a wrapper
> that does input sanity checking.
>
> Ultimately, you want to limit the privelege to as little work as
> possible.
And then, of course, there is the security/sudo port, which lets you
specify which uid's are allowed to execute which commands as root or
whatever other uid, with or without passwords, with or without controlling
terminals.
G'luck,
Peter
--
I am not the subject of this sentence.
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 8:19:15 2001
Delivered-To: freebsd-security@freebsd.org
Received: from mail2.uniserve.com (mail2.uniserve.com [204.244.156.10])
by hub.freebsd.org (Postfix) with ESMTP id AE8CC37B419
for ; Mon, 10 Dec 2001 08:19:08 -0800 (PST)
Received: from landons.vpp-office.uniserve.ca ([216.113.198.10] helo=pirahna.uniserve.com)
by mail2.uniserve.com with esmtp (Exim 3.13 #1)
id 16DT8a-0001V5-00; Mon, 10 Dec 2001 08:18:41 -0800
Message-Id: <5.1.0.14.0.20011210081655.02664e30@pop.uniserve.com>
X-Sender: landons@pop.uniserve.com
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Mon, 10 Dec 2001 08:18:34 -0800
To: Peter Pentchev ,
Sheldon Hearn
From: Landon Stewart
Subject: Re: Accessing as root
Cc: Ronan Lucio , security@freebsd.org
In-Reply-To: <20011210180639.J757@straylight.oblivion.bg>
References: <60409.1008000194@axl.seasidesoftware.co.za>
<60355.1008000080@axl.seasidesoftware.co.za>
<60409.1008000194@axl.seasidesoftware.co.za>
Mime-Version: 1.0
Content-Type: multipart/alternative;
boundary="=====================_258913658==_.ALT"
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
--=====================_258913658==_.ALT
Content-Type: text/plain; charset="us-ascii"; format=flowed
At 06:06 PM 12/10/2001 +0200, Peter Pentchev wrote:
>On Mon, Dec 10, 2001 at 06:03:14PM +0200, Sheldon Hearn wrote:
> >
> >
> > On Mon, 10 Dec 2001 18:01:20 +0200, Sheldon Hearn wrote:
> >
> > > > I need to make some scripts to change the password and another
> > > > things like that need root permissions, but:
> > > >
> > > > How can I do it without opening a security hole in the server?
> > > > What is the best way to do it?
> > >
> > > 1) Limit exposure to just those commands that need privelege, by passing
> > > your command as arguments to the su(1) command.
> >
> > This is stupid advice, sorry.
> >
> > You need to make your script setuid root (see chmod(1)). If the script
> > is big, or does complex input handling, consider breaking out the part
> > that needs privelege into its own smaller script, called by a wrapper
> > that does input sanity checking.
> >
> > Ultimately, you want to limit the privelege to as little work as
> > possible.
>
>And then, of course, there is the security/sudo port, which lets you
>specify which uid's are allowed to execute which commands as root or
>whatever other uid, with or without passwords, with or without controlling
>terminals.
Yes, sudo is definately the BEST bet IMHO. I would like to stress "execute
*which* commands as root". You can actually specify what commands are
allowed to be executed and optionally with what parameters.
---
Landon Stewart
Right of Use Disclaimer:
"The sender intends this message for a specific recipient and, as it may
contain information that is privileged or confidential, any use,
dissemination, forwarding, or copying by anyone without permission from the
sender is prohibited. Personal e-mail may contain views that are not
necessarily those of the company."
--=====================_258913658==_.ALT
Content-Type: text/html; charset="us-ascii"
At 06:06 PM 12/10/2001 +0200, Peter Pentchev wrote:
On Mon, Dec 10, 2001 at 06:03:14PM
+0200, Sheldon Hearn wrote:
>
>
> On Mon, 10 Dec 2001 18:01:20 +0200, Sheldon Hearn wrote:
>
> > > I need to make some scripts to change the password and
another
> > > things like that need root permissions, but:
> > >
> > > How can I do it without opening a security hole in the
server?
> > > What is the best way to do it?
> >
> > 1) Limit exposure to just those commands that need privelege,
by passing
> > your command as arguments to the su(1)
command.
>
> This is stupid advice, sorry.
>
> You need to make your script setuid root (see chmod(1)). If
the script
> is big, or does complex input handling, consider breaking out the
part
> that needs privelege into its own smaller script, called by a
wrapper
> that does input sanity checking.
>
> Ultimately, you want to limit the privelege to as little work
as
> possible.
And then, of course, there is the security/sudo port, which lets
you
specify which uid's are allowed to execute which commands as root
or
whatever other uid, with or without passwords, with or without
controlling
terminals.
Yes, sudo is definately the BEST bet IMHO. I would like to stress
"execute *which* commands as root". You can actually
specify what commands are allowed to be executed and optionally with what
parameters.
---
Landon
Stewart
Right of Use
Disclaimer:
"The sender intends this message for a specific recipient and, as it
may contain information that is privileged or confidential, any use,
dissemination, forwarding, or copying by anyone without permission from
the sender is prohibited. Personal e-mail may contain views that are not
necessarily those of the company."
--=====================_258913658==_.ALT--
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 8:37:38 2001
Delivered-To: freebsd-security@freebsd.org
Received: from mine.kame.net (kame195.kame.net [203.178.141.195])
by hub.freebsd.org (Postfix) with ESMTP id 8690837B405
for ; Mon, 10 Dec 2001 08:37:34 -0800 (PST)
Received: from localhost ([3ffe:507:1ff:2:c1a6:e2f0:1f5d:9f7c])
by mine.kame.net (8.11.1/3.7W) with ESMTP id fBAGViS25530;
Tue, 11 Dec 2001 01:31:44 +0900 (JST)
To: freebsd-security-local@insignia.com
Cc: freebsd-security@freebsd.org
Subject: Re: Racoon <> VPN Gateway
In-Reply-To: Your message of "Fri, 07 Dec 2001 09:57:06 +0000"
References:
X-Mailer: Cue version 0.6 (011026-1440/sakane)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Message-Id: <20011211013724G.sakane@kame.net>
Date: Tue, 11 Dec 2001 01:37:24 +0900
From: Shoichi Sakane
X-Dispatcher: imput version 20000228(IM140)
Lines: 23
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
> I've now got further trying to get racoon talking to a Redcreek
> Ravlin10 VPN gateway, once I realised the gif device is needed
> for tunnel mode. It actually replies to me, though the reply
> isn't what racoon seems to expect.
basically you don't need the gif device configuration when you want
to use IPsec tunnel mode.
> I'm trying to establish an ESP tunnel mode connection between
> 213.208.123.252 (racoon) and 195.74.141.60 (Ravlin).
> Racoon says:
> >2001-12-06 20:44:02: DEBUG: isakmp.c:394:isakmp_main(): malformed cookie received or the spi expired.
did you see other error message before this message ?
i think this session failed due to some reasons, so racoon could not
process this session any more.
> whereas the Ravlin says:
> >Dec 6 20:46:30 ravlin10 [051b4216] 101-12-06/20:45:05(GMT) Received ISAKMP initialization request. Peer: (213.208.123.252)
> >Dec 6 20:46:32 ravlin10 [03044222] 101-12-06/20:45:07(GMT) Invalid payload. Possible overrun attack! ()
i'm not sure the meaning of above two messages.
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 8:44:42 2001
Delivered-To: freebsd-security@freebsd.org
Received: from salseiros.melim.com.br (salseiros.melim.com.br [200.215.110.23])
by hub.freebsd.org (Postfix) with ESMTP id DEEAD37B416
for ; Mon, 10 Dec 2001 08:44:38 -0800 (PST)
Received: from fazendinha (ressacada.melim.com.br [200.215.110.4])
by salseiros.melim.com.br (Postfix) with SMTP id C6D00BA5B
for ; Mon, 10 Dec 2001 14:44:32 -0200 (BRST)
Message-ID: <03f301c1819a$2b96bbd0$2aa8a8c0@melim.com.br>
From: "Ronan Lucio"
To:
References: <60355.1008000080@axl.seasidesoftware.co.za> <60409.1008000194@axl.seasidesoftware.co.za> <20011210180639.J757@straylight.oblivion.bg>
Subject: Re: Accessing as root
Date: Mon, 10 Dec 2001 14:46:09 -0200
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
Hi,
But, if I use sudo, Iīll need to set the pw to be executed by apache
(nobody),
wouldnīt it open a security hoje?
For example:
Would the other users be able to put a code that can be executed by apache
and change any password?
[]īs
Ronan
> On Mon, Dec 10, 2001 at 06:03:14PM +0200, Sheldon Hearn wrote:
> >
> >
> > On Mon, 10 Dec 2001 18:01:20 +0200, Sheldon Hearn wrote:
> >
> > > > I need to make some scripts to change the password and another
> > > > things like that need root permissions, but:
> > > >
> > > > How can I do it without opening a security hole in the server?
> > > > What is the best way to do it?
> > >
> > > 1) Limit exposure to just those commands that need privelege, by
passing
> > > your command as arguments to the su(1) command.
> >
> > This is stupid advice, sorry.
> >
> > You need to make your script setuid root (see chmod(1)). If the script
> > is big, or does complex input handling, consider breaking out the part
> > that needs privelege into its own smaller script, called by a wrapper
> > that does input sanity checking.
> >
> > Ultimately, you want to limit the privelege to as little work as
> > possible.
>
> And then, of course, there is the security/sudo port, which lets you
> specify which uid's are allowed to execute which commands as root or
> whatever other uid, with or without passwords, with or without controlling
> terminals.
>
> G'luck,
> Peter
>
> --
> I am not the subject of this sentence.
>
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 9: 3:53 2001
Delivered-To: freebsd-security@freebsd.org
Received: from mohegan.mohawk.net (mohegan.mohawk.net [63.66.68.21])
by hub.freebsd.org (Postfix) with ESMTP id F19EC37B416
for ; Mon, 10 Dec 2001 09:03:45 -0800 (PST)
Received: from mohegan.mohawk.net (mohegan.mohawk.net [63.66.68.21])
by mohegan.mohawk.net (8.11.4/8.11.3) with ESMTP id fBAH3kV96031
for ; Mon, 10 Dec 2001 12:03:46 -0500 (EST)
Date: Mon, 10 Dec 2001 12:03:46 -0500 (EST)
From: Ralph Huntington
To:
Subject: promiscuous mode
In-Reply-To: <20011211013724G.sakane@kame.net>
Message-ID: <20011210120011.H59192-100000@mohegan.mohawk.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
I recently found these log entries:
messages.2:Dec 6 13:45:35 mohawk /kernel: fxp0: promiscuous mode enabled
messages.2:Dec 6 13:46:31 mohawk /kernel: fxp0: promiscuous mode disabled
messages.2:Dec 6 13:47:53 mohawk /kernel: fxp0: promiscuous mode enabled
messages.2:Dec 6 13:51:00 mohawk /kernel: fxp0: promiscuous mode disabled
messages.2:Dec 6 13:51:00 mohawk /kernel: fxp0: promiscuous mode enabled
messages.2:Dec 6 13:55:42 mohawk /kernel: fxp0: promiscuous mode disabled
Can someone tell me how this mode might be enabled/disabled? We have very
few shell users on this machine and I didn't think any of them would know
anything about promiscuous mode. Turns out I know little about it myself.
Any pointers to relevant docs and/or some idea of what this might be about
would be very much appreciated. Thank you in advance. - Ralph
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 9: 4:12 2001
Delivered-To: freebsd-security@freebsd.org
Received: from mail2.uniserve.com (mail2.uniserve.com [204.244.156.10])
by hub.freebsd.org (Postfix) with ESMTP id A84F237B405
for ; Mon, 10 Dec 2001 09:03:44 -0800 (PST)
Received: from landons.vpp-office.uniserve.ca ([216.113.198.10] helo=pirahna.uniserve.com)
by mail2.uniserve.com with esmtp (Exim 3.13 #1)
id 16DTq0-00049k-00; Mon, 10 Dec 2001 09:03:32 -0800
Message-Id: <5.1.0.14.0.20011210085706.026e9d68@pop.uniserve.com>
X-Sender: landons@pop.uniserve.com
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Mon, 10 Dec 2001 09:03:30 -0800
To: "Ronan Lucio" ,
From: Landon Stewart
Subject: Re: Accessing as root
In-Reply-To: <03f301c1819a$2b96bbd0$2aa8a8c0@melim.com.br>
References: <60355.1008000080@axl.seasidesoftware.co.za>
<60409.1008000194@axl.seasidesoftware.co.za>
<20011210180639.J757@straylight.oblivion.bg>
Mime-Version: 1.0
Content-Type: multipart/alternative;
boundary="=====================_261610015==_.ALT"
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
--=====================_261610015==_.ALT
Content-Type: text/plain; charset="iso-8859-1"; format=flowed
Content-Transfer-Encoding: quoted-printable
You can specify what they run and as who, Here's an example excerpt from my=
=20
sudoers file:
"...
Runas_Alias TOOLS =3D tools
#Specifys what "TOOLS" means (what username)
httpd ALL=3D(TOOLS) NOPASSWD:/home/tools/emailsearch.simple *
#Specifies that httpd (or nobody) can run this command with any=20
parameters
# as the user "TOOLS" (which =3D the passwd user tools)
httpd ALL=3DNOPASSWD:/usr/local/netsaint/sbin/netsaint -h *
# Specifies that this command (ONLY) can be run as root by httpd=20
without a
# password.
..."
This is a FreeBSD system and you could use a similar setup (use visudo to=20
edit the sudoers file), just substitute the httpd for "nobody" because=20
thats what your web server runs as.
I suggest installing /usr/ports/security/sudo and reading the documents at=
=20
http://www.courtesan.com/sudo/
Once you get the hang of it, you will use it for everything. Be carefull=20
to restrict things and not get lazy after a while. You must limit how many=
=20
and what parameters are allowed to be run if the script you are running is=
=20
at all flakey.
At 02:46 PM 12/10/2001 -0200, Ronan Lucio wrote:
>Hi,
>
>But, if I use sudo, I=B4ll need to set the pw to be executed by apache
>(nobody),
>wouldn=B4t it open a security hoje?
>
>For example:
>Would the other users be able to put a code that can be executed by apache
>and change any password?
>
>[]=B4s
>Ronan
---
Landon Stewart
System Administrator
Uniserve Online
landons@uniserve.com
Telephone: (604) 856-6281 ext 399
Toll Free: (877) UNI-Serve ext 399
Right of Use Disclaimer:
"The sender intends this message for a specific recipient and, as it may=20
contain information that is privileged or confidential, any use,=20
dissemination, forwarding, or copying by anyone without permission from the=
=20
sender is prohibited. Personal e-mail may contain views that are not=20
necessarily those of the company."
--=====================_261610015==_.ALT
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
You can specify what they run and as who, Here's an example excerpt from
my sudoers file:
"...
Runas_Alias TOOLS =3D tools
#Specifys
what "TOOLS" means (what username)
httpd ALL=3D(TOOLS) NOPASSWD:/home/tools/emailsearch.simple
*
#Specifies
that httpd (or nobody) can run this command with any parameters
# as the
user "TOOLS" (which =3D the passwd user tools)
httpd ALL=3DNOPASSWD:/usr/local/netsaint/sbin/netsaint -h
*
#
Specifies that this command (ONLY) can be run as root by httpd without
a
#
password.
..."
This is a FreeBSD system and you could use a similar setup (use visudo to
edit the sudoers file), just substitute the httpd for "nobody"
because thats what your web server runs as.
I suggest installing /usr/ports/security/sudo and reading the documents
at
http://www.courtesan.com/sudo/
Once you get the hang of it, you will use it for everything. Be
carefull to restrict things and not get lazy after a while. You
must limit how many and what parameters are allowed to be run if the
script you are running is at all flakey.
At 02:46 PM 12/10/2001 -0200, Ronan Lucio wrote:
Hi,
But, if I use sudo, I=B4ll need to set the pw to be executed by=20
apache
(nobody),
wouldn=B4t it open a security hoje?
For example:
Would the other users be able to put a code that can be executed by
apache
and change any password?
[]=B4s
Ronan
---
Landon
Stewart
System Administrator
Uniserve Online
landons@uniserve.com
Telephone: (604) 856-6281 ext 399
Toll Free: (877) UNI-Serve ext 399
Right of Use
Disclaimer:
"The sender intends this message for a specific recipient and, as it
may contain information that is privileged or confidential, any use,
dissemination, forwarding, or copying by anyone without permission from
the sender is prohibited. Personal e-mail may contain views that are not
necessarily those of the company."
--=====================_261610015==_.ALT--
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 9: 7:36 2001
Delivered-To: freebsd-security@freebsd.org
Received: from joek.dnsq.org (d106043.upc-d.chello.nl [213.46.106.43])
by hub.freebsd.org (Postfix) with ESMTP id 652C037B416
for ; Mon, 10 Dec 2001 09:07:32 -0800 (PST)
Received: from sanderpc (sander.dinten.lan [192.168.1.3])
by joek.dnsq.org (8.11.6/8.11.6) with ESMTP id fBAH7Uu96737;
Mon, 10 Dec 2001 18:07:30 +0100 (CET)
(envelope-from sander@joek.dnsq.org)
From: "Sander van Dinten"
To: "'Ralph Huntington'" ,
Subject: RE: promiscuous mode
Date: Mon, 10 Dec 2001 18:07:30 +0100
Message-ID: <000701c1819d$26f0fa20$0301a8c0@sanderpc>
MIME-Version: 1.0
Content-Type: text/plain;
charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.2616
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <20011210120011.H59192-100000@mohegan.mohawk.net>
Importance: Normal
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
Are you using some kind of an network sniffer?
Promiscuous will say that your network card picks up all network
packages (which means it will not only pick up the packages for your
IP-address).
-----Original Message-----
From: owner-freebsd-security@FreeBSD.ORG
[mailto:owner-freebsd-security@FreeBSD.ORG] On Behalf Of Ralph
Huntington
Sent: Monday, December 10, 2001 6:04 PM
To: freebsd-security@FreeBSD.ORG
Subject: promiscuous mode
I recently found these log entries:
messages.2:Dec 6 13:45:35 mohawk /kernel: fxp0: promiscuous mode
enabled
messages.2:Dec 6 13:46:31 mohawk /kernel: fxp0: promiscuous mode
disabled
messages.2:Dec 6 13:47:53 mohawk /kernel: fxp0: promiscuous mode
enabled
messages.2:Dec 6 13:51:00 mohawk /kernel: fxp0: promiscuous mode
disabled
messages.2:Dec 6 13:51:00 mohawk /kernel: fxp0: promiscuous mode
enabled
messages.2:Dec 6 13:55:42 mohawk /kernel: fxp0: promiscuous mode
disabled
Can someone tell me how this mode might be enabled/disabled? We have
very
few shell users on this machine and I didn't think any of them would
know
anything about promiscuous mode. Turns out I know little about it
myself.
Any pointers to relevant docs and/or some idea of what this might be
about
would be very much appreciated. Thank you in advance. - Ralph
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 9:18: 7 2001
Delivered-To: freebsd-security@freebsd.org
Received: from mohegan.mohawk.net (mohegan.mohawk.net [63.66.68.21])
by hub.freebsd.org (Postfix) with ESMTP id 33FBA37B405
for ; Mon, 10 Dec 2001 09:18:04 -0800 (PST)
Received: from mohegan.mohawk.net (mohegan.mohawk.net [63.66.68.21])
by mohegan.mohawk.net (8.11.4/8.11.3) with ESMTP id fBAHHvV96542;
Mon, 10 Dec 2001 12:17:57 -0500 (EST)
Date: Mon, 10 Dec 2001 12:17:57 -0500 (EST)
From: Ralph Huntington
To: Sander van Dinten
Cc:
Subject: RE: promiscuous mode
In-Reply-To: <000701c1819d$26f0fa20$0301a8c0@sanderpc>
Message-ID: <20011210121632.D59192-100000@mohegan.mohawk.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
No, there is no network sniffer running on that box (or any other on the
local network-- at least that I know of, and I should know). How can I
determine if someone has slipped on in?
On Mon, 10 Dec 2001, Sander van Dinten wrote:
> Are you using some kind of an network sniffer?
>
> Promiscuous will say that your network card picks up all network
> packages (which means it will not only pick up the packages for your
> IP-address).
>
> -----Original Message-----
> From: owner-freebsd-security@FreeBSD.ORG
> [mailto:owner-freebsd-security@FreeBSD.ORG] On Behalf Of Ralph
> Huntington
> Sent: Monday, December 10, 2001 6:04 PM
> To: freebsd-security@FreeBSD.ORG
> Subject: promiscuous mode
>
> I recently found these log entries:
>
> messages.2:Dec 6 13:45:35 mohawk /kernel: fxp0: promiscuous mode
> enabled
> messages.2:Dec 6 13:46:31 mohawk /kernel: fxp0: promiscuous mode
> disabled
> messages.2:Dec 6 13:47:53 mohawk /kernel: fxp0: promiscuous mode
> enabled
> messages.2:Dec 6 13:51:00 mohawk /kernel: fxp0: promiscuous mode
> disabled
> messages.2:Dec 6 13:51:00 mohawk /kernel: fxp0: promiscuous mode
> enabled
> messages.2:Dec 6 13:55:42 mohawk /kernel: fxp0: promiscuous mode
> disabled
>
> Can someone tell me how this mode might be enabled/disabled? We have
> very
> few shell users on this machine and I didn't think any of them would
> know
> anything about promiscuous mode. Turns out I know little about it
> myself.
>
> Any pointers to relevant docs and/or some idea of what this might be
> about
> would be very much appreciated. Thank you in advance. - Ralph
>
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
>
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 9:21:44 2001
Delivered-To: freebsd-security@freebsd.org
Received: from titan.communitech.net (titan.communitech.net [209.15.2.49])
by hub.freebsd.org (Postfix) with SMTP id 2CAED37B41C
for ; Mon, 10 Dec 2001 09:21:38 -0800 (PST)
Received: from localhost ([209.15.2.49]) by titan.communitech.net ; Mon, 10 Dec 2001 17:21:31 -0000
Date: Mon, 10 Dec 2001 11:21:31 -0600 (CST)
From: Troy Corbin
To: Ralph Huntington
Cc: Sander van Dinten ,
freebsd-security@FreeBSD.ORG
Subject: RE: promiscuous mode
In-Reply-To: <20011210121632.D59192-100000@mohegan.mohawk.net>
Message-ID:
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
maybe one of your shell users ran tcpdump?
-t
On Mon, 10 Dec 2001, Ralph Huntington wrote:
> No, there is no network sniffer running on that box (or any other on the
> local network-- at least that I know of, and I should know). How can I
> determine if someone has slipped on in?
>
> On Mon, 10 Dec 2001, Sander van Dinten wrote:
>
> > Are you using some kind of an network sniffer?
> >
> > Promiscuous will say that your network card picks up all network
> > packages (which means it will not only pick up the packages for your
> > IP-address).
> >
> > -----Original Message-----
> > From: owner-freebsd-security@FreeBSD.ORG
> > [mailto:owner-freebsd-security@FreeBSD.ORG] On Behalf Of Ralph
> > Huntington
> > Sent: Monday, December 10, 2001 6:04 PM
> > To: freebsd-security@FreeBSD.ORG
> > Subject: promiscuous mode
> >
> > I recently found these log entries:
> >
> > messages.2:Dec 6 13:45:35 mohawk /kernel: fxp0: promiscuous mode
> > enabled
> > messages.2:Dec 6 13:46:31 mohawk /kernel: fxp0: promiscuous mode
> > disabled
> > messages.2:Dec 6 13:47:53 mohawk /kernel: fxp0: promiscuous mode
> > enabled
> > messages.2:Dec 6 13:51:00 mohawk /kernel: fxp0: promiscuous mode
> > disabled
> > messages.2:Dec 6 13:51:00 mohawk /kernel: fxp0: promiscuous mode
> > enabled
> > messages.2:Dec 6 13:55:42 mohawk /kernel: fxp0: promiscuous mode
> > disabled
> >
> > Can someone tell me how this mode might be enabled/disabled? We have
> > very
> > few shell users on this machine and I didn't think any of them would
> > know
> > anything about promiscuous mode. Turns out I know little about it
> > myself.
> >
> > Any pointers to relevant docs and/or some idea of what this might be
> > about
> > would be very much appreciated. Thank you in advance. - Ralph
> >
> >
> >
> > To Unsubscribe: send mail to majordomo@FreeBSD.org
> > with "unsubscribe freebsd-security" in the body of the message
> >
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
>
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 9:22:43 2001
Delivered-To: freebsd-security@freebsd.org
Received: from joek.dnsq.org (d106043.upc-d.chello.nl [213.46.106.43])
by hub.freebsd.org (Postfix) with ESMTP id 0AB4D37B41C
for ; Mon, 10 Dec 2001 09:22:16 -0800 (PST)
Received: from sanderpc (sander.dinten.lan [192.168.1.3])
by joek.dnsq.org (8.11.6/8.11.6) with ESMTP id fBAHMFu97642;
Mon, 10 Dec 2001 18:22:16 +0100 (CET)
(envelope-from sander@joek.dnsq.org)
From: "Sander van Dinten"
To: "'Ralph Huntington'"
Cc:
Subject: RE: promiscuous mode
Date: Mon, 10 Dec 2001 18:22:15 +0100
Message-ID: <000801c1819f$36a9b7c0$0301a8c0@sanderpc>
MIME-Version: 1.0
Content-Type: text/plain;
charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.2616
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <20011210121632.D59192-100000@mohegan.mohawk.net>
Importance: Normal
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
By issueing the command "last |more" and see if you see odd logins
-----Original Message-----
From: Ralph Huntington [mailto:rjh@mohawk.net]
Sent: Monday, December 10, 2001 6:18 PM
To: Sander van Dinten
Cc: freebsd-security@FreeBSD.ORG
Subject: RE: promiscuous mode
No, there is no network sniffer running on that box (or any other on the
local network-- at least that I know of, and I should know). How can I
determine if someone has slipped on in?
On Mon, 10 Dec 2001, Sander van Dinten wrote:
> Are you using some kind of an network sniffer?
>
> Promiscuous will say that your network card picks up all network
> packages (which means it will not only pick up the packages for your
> IP-address).
>
> -----Original Message-----
> From: owner-freebsd-security@FreeBSD.ORG
> [mailto:owner-freebsd-security@FreeBSD.ORG] On Behalf Of Ralph
> Huntington
> Sent: Monday, December 10, 2001 6:04 PM
> To: freebsd-security@FreeBSD.ORG
> Subject: promiscuous mode
>
> I recently found these log entries:
>
> messages.2:Dec 6 13:45:35 mohawk /kernel: fxp0: promiscuous mode
> enabled
> messages.2:Dec 6 13:46:31 mohawk /kernel: fxp0: promiscuous mode
> disabled
> messages.2:Dec 6 13:47:53 mohawk /kernel: fxp0: promiscuous mode
> enabled
> messages.2:Dec 6 13:51:00 mohawk /kernel: fxp0: promiscuous mode
> disabled
> messages.2:Dec 6 13:51:00 mohawk /kernel: fxp0: promiscuous mode
> enabled
> messages.2:Dec 6 13:55:42 mohawk /kernel: fxp0: promiscuous mode
> disabled
>
> Can someone tell me how this mode might be enabled/disabled? We have
> very
> few shell users on this machine and I didn't think any of them would
> know
> anything about promiscuous mode. Turns out I know little about it
> myself.
>
> Any pointers to relevant docs and/or some idea of what this might be
> about
> would be very much appreciated. Thank you in advance. - Ralph
>
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
>
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 9:24:51 2001
Delivered-To: freebsd-security@freebsd.org
Received: from mohegan.mohawk.net (mohegan.mohawk.net [63.66.68.21])
by hub.freebsd.org (Postfix) with ESMTP id 878CB37B405
for ; Mon, 10 Dec 2001 09:24:44 -0800 (PST)
Received: from mohegan.mohawk.net (mohegan.mohawk.net [63.66.68.21])
by mohegan.mohawk.net (8.11.4/8.11.3) with ESMTP id fBAHOhV96892;
Mon, 10 Dec 2001 12:24:43 -0500 (EST)
Date: Mon, 10 Dec 2001 12:24:43 -0500 (EST)
From: Ralph Huntington
To: Troy Corbin
Cc: Sander van Dinten ,
Subject: RE: promiscuous mode
In-Reply-To:
Message-ID: <20011210122359.H59192-100000@mohegan.mohawk.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
That was it: tcpdump
Kind thanks to all who replied.
On Mon, 10 Dec 2001, Troy Corbin wrote:
> maybe one of your shell users ran tcpdump?
>
> -t
>
> On Mon, 10 Dec 2001, Ralph Huntington wrote:
>
> > No, there is no network sniffer running on that box (or any other on the
> > local network-- at least that I know of, and I should know). How can I
> > determine if someone has slipped on in?
> >
> > On Mon, 10 Dec 2001, Sander van Dinten wrote:
> >
> > > Are you using some kind of an network sniffer?
> > >
> > > Promiscuous will say that your network card picks up all network
> > > packages (which means it will not only pick up the packages for your
> > > IP-address).
> > >
> > > -----Original Message-----
> > > From: owner-freebsd-security@FreeBSD.ORG
> > > [mailto:owner-freebsd-security@FreeBSD.ORG] On Behalf Of Ralph
> > > Huntington
> > > Sent: Monday, December 10, 2001 6:04 PM
> > > To: freebsd-security@FreeBSD.ORG
> > > Subject: promiscuous mode
> > >
> > > I recently found these log entries:
> > >
> > > messages.2:Dec 6 13:45:35 mohawk /kernel: fxp0: promiscuous mode
> > > enabled
> > > messages.2:Dec 6 13:46:31 mohawk /kernel: fxp0: promiscuous mode
> > > disabled
> > > messages.2:Dec 6 13:47:53 mohawk /kernel: fxp0: promiscuous mode
> > > enabled
> > > messages.2:Dec 6 13:51:00 mohawk /kernel: fxp0: promiscuous mode
> > > disabled
> > > messages.2:Dec 6 13:51:00 mohawk /kernel: fxp0: promiscuous mode
> > > enabled
> > > messages.2:Dec 6 13:55:42 mohawk /kernel: fxp0: promiscuous mode
> > > disabled
> > >
> > > Can someone tell me how this mode might be enabled/disabled? We have
> > > very
> > > few shell users on this machine and I didn't think any of them would
> > > know
> > > anything about promiscuous mode. Turns out I know little about it
> > > myself.
> > >
> > > Any pointers to relevant docs and/or some idea of what this might be
> > > about
> > > would be very much appreciated. Thank you in advance. - Ralph
> > >
> > >
> > >
> > > To Unsubscribe: send mail to majordomo@FreeBSD.org
> > > with "unsubscribe freebsd-security" in the body of the message
> > >
> >
> >
> > To Unsubscribe: send mail to majordomo@FreeBSD.org
> > with "unsubscribe freebsd-security" in the body of the message
> >
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
>
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 10:24:58 2001
Delivered-To: freebsd-security@freebsd.org
Received: from smtp1.sentex.ca (smtp1.sentex.ca [199.212.134.4])
by hub.freebsd.org (Postfix) with ESMTP id 0CD0937B417
for ; Mon, 10 Dec 2001 10:24:55 -0800 (PST)
Received: from simoeon.sentex.net (pyroxene.sentex.ca [199.212.134.18])
by smtp1.sentex.ca (8.11.6/8.11.6) with ESMTP id fBAIOs564736
for ; Mon, 10 Dec 2001 13:24:54 -0500 (EST)
(envelope-from mike@sentex.net)
Message-Id: <5.1.0.14.0.20011210131730.04998cf0@marble.sentex.ca>
X-Sender: mdtpop@marble.sentex.ca
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Mon, 10 Dec 2001 13:18:29 -0500
To: security@freebsd.org
From: Mike Tancsa
Subject: AIO vulnerability (from bugtraq)
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
For those not on bugtraq,
---Mike
------------------------------------------------------------------------------
Soniq Security Advisory
David Rufino Dec 9, 2001
Race Condition in FreeBSD AIO implementation
http://elysium.soniq.net/dr/tao/tao.html
------------------------------------------------------------------------------
RISK FACTOR: LOW
SYNOPSIS
AIO is a POSIX standard for asynchronous I/O. Under certain conditions,
scheduled AIO operations persist after an execve, allowing arbitrary
overwrites in the memory of the new process. Combined with the permission
to execute suid binaries, this can yield elevated priviledges.
Currently VFS_AIO is not enabled in the default FreeBSD kernel config,
however comments in ``LINT'' suggest security issues have been known about
privately for some time:
# Use real implementations of the aio_* system calls. There are numerous
# stability issues in the current aio code that make it unsuitable for
# inclusion on shell boxes.
The type of file descriptor used for the AIO operation is important. For
instance operations on pipes will not complete fully after an execve,
whereas operations on sockets will. It is not known whether AIO operations
on hard disk files persist in the desired manner.
VULNERABLE SYSTEMS
FreeBSD 4-STABLE upto at least 28/10/01
RESOLUTION
Currently there are no known patches to remove all security issues. However
a patch is available to limit the use of AIO syscalls to root at
http://elysium.soniq.net/dr/tao/patch-01
EXPLOIT
Given that FreeBSD AIO is not in active use at the moment, I have made
available a proof of concept exploit, at http://elysium.soniq.net/dr/tao/tao.c
CREDITS
Discovery and exploitation was conducted by David Rufino.
CONTACT INFORMATION
dr+securityfocussucks@soniq.net
http://elysium.soniq.net/dr/index.html
-------------------------------------------------
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 10:29:46 2001
Delivered-To: freebsd-security@freebsd.org
Received: from tandem.milestonerdl.com (tandem.milestonerdl.com [204.107.138.1])
by hub.freebsd.org (Postfix) with ESMTP id 5079637B41C
for ; Mon, 10 Dec 2001 10:29:43 -0800 (PST)
Received: from tandem (tandem [204.107.138.1])
by tandem.milestonerdl.com (8.12.0/8.12.0) with ESMTP id fBAIXP6o090099
for ; Mon, 10 Dec 2001 12:33:25 -0600 (CST)
Date: Mon, 10 Dec 2001 12:33:25 -0600 (CST)
From: Marc Rassbach
To: freebsd-security@FreeBSD.ORG
Subject: Rsync, ssh and using root.
Message-ID:
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
I know that using remote root login is considered bad behavior, but
my job in implementation, not judgement of security. This is what the
client wants...put a hole in the default FreeBSD security.
The client in the old days had a 3.5 box (2 of them) and used a
combination of rsync, rsync in daemon mode, and ssh to allow root to move
data between both machines.
What was done under 3.5 (remote keys, etc la) no longer work on 4.4.
On 4.X, it seems to fail after authencation, and I have spent 20+ hours
reading man pages, and the mail list and can't find a good work around.
(I have resisted looking at the source becuase I do not feel it is a bug,
nor do I wish to patch code to make this work)
What I am looking for is a way to have root-level privilages for
reading/writing files between servers as the lo-tech solution they want
for the 'server backup' is moving files once a day.
Guidance as to how to do this with rsync (break securty) or some other
method that does not break security is welcome.
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 11: 2:27 2001
Delivered-To: freebsd-security@freebsd.org
Received: from squall.waterspout.com (squall.waterspout.com [208.13.56.12])
by hub.freebsd.org (Postfix) with ESMTP id DC9C437B41F
for ; Mon, 10 Dec 2001 11:02:17 -0800 (PST)
Received: by squall.waterspout.com (Postfix, from userid 1050)
id 17FCF9B19; Mon, 10 Dec 2001 14:00:19 -0500 (EST)
Date: Mon, 10 Dec 2001 14:00:19 -0500
From: Will Andrews
To: Marc Rassbach
Cc: freebsd-security@FreeBSD.ORG
Subject: Re: Rsync, ssh and using root.
Message-ID: <20011210140018.A23826@squall.waterspout.com>
Reply-To: Will Andrews
Mail-Followup-To: Marc Rassbach ,
freebsd-security@FreeBSD.ORG
References:
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To:
User-Agent: Mutt/1.3.22.1i
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
On Mon, Dec 10, 2001 at 12:33:25PM -0600, Marc Rassbach wrote:
> I know that using remote root login is considered bad behavior, but
> my job in implementation, not judgement of security. This is what the
> client wants...put a hole in the default FreeBSD security.
>
> The client in the old days had a 3.5 box (2 of them) and used a
> combination of rsync, rsync in daemon mode, and ssh to allow root to move
> data between both machines.
>
> What was done under 3.5 (remote keys, etc la) no longer work on 4.4.
> On 4.X, it seems to fail after authencation, and I have spent 20+ hours
> reading man pages, and the mail list and can't find a good work around.
> (I have resisted looking at the source becuase I do not feel it is a bug,
> nor do I wish to patch code to make this work)
>
> What I am looking for is a way to have root-level privilages for
> reading/writing files between servers as the lo-tech solution they want
> for the 'server backup' is moving files once a day.
>
> Guidance as to how to do this with rsync (break securty) or some other
> method that does not break security is welcome.
You did not mention what specifically happens with the machines
running 4.x, so I can't suggest a solution.
There have been some changes regarding how ssh works, particularly
in protocols, since 3.x.
--
wca
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 11: 8:23 2001
Delivered-To: freebsd-security@freebsd.org
Received: from elvis.mu.org (elvis.mu.org [216.33.66.196])
by hub.freebsd.org (Postfix) with ESMTP
id F262C37B44B; Mon, 10 Dec 2001 11:08:03 -0800 (PST)
Received: by elvis.mu.org (Postfix, from userid 1192)
id A414681D01; Mon, 10 Dec 2001 13:08:03 -0600 (CST)
Date: Mon, 10 Dec 2001 13:08:03 -0600
From: Alfred Perlstein
To: Mike Tancsa
Cc: security@freebsd.org, alc@freebsd.org
Subject: Re: AIO vulnerability (from bugtraq)
Message-ID: <20011210130803.B92148@elvis.mu.org>
References: <5.1.0.14.0.20011210131730.04998cf0@marble.sentex.ca>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
In-Reply-To: <5.1.0.14.0.20011210131730.04998cf0@marble.sentex.ca>; from mike@sentex.net on Mon, Dec 10, 2001 at 01:18:29PM -0500
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
* Mike Tancsa [011210 12:25] wrote:
>
> For those not on bugtraq,
Yah, this needs to be fixed, do note that AIO is not enabled by
default in FreeBSD and the warning is pretty clear.
Alan, can you take a look at this? I'd really like to get AIO
enabled by default one of these days. :)
>
> ---Mike
>
> ------------------------------------------------------------------------------
> Soniq Security Advisory
> David Rufino Dec 9, 2001
>
> Race Condition in FreeBSD AIO implementation
> http://elysium.soniq.net/dr/tao/tao.html
> ------------------------------------------------------------------------------
>
> RISK FACTOR: LOW
>
> SYNOPSIS
>
> AIO is a POSIX standard for asynchronous I/O. Under certain conditions,
> scheduled AIO operations persist after an execve, allowing arbitrary
> overwrites in the memory of the new process. Combined with the permission
> to execute suid binaries, this can yield elevated priviledges.
> Currently VFS_AIO is not enabled in the default FreeBSD kernel config,
> however comments in ``LINT'' suggest security issues have been known about
> privately for some time:
>
> # Use real implementations of the aio_* system calls. There are numerous
> # stability issues in the current aio code that make it unsuitable for
> # inclusion on shell boxes.
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 11:22:19 2001
Delivered-To: freebsd-security@freebsd.org
Received: from zork.punq.net (punq.net [207.154.84.94])
by hub.freebsd.org (Postfix) with SMTP id E298A37B41B
for ; Mon, 10 Dec 2001 11:22:15 -0800 (PST)
Received: (qmail 83055 invoked by uid 1000); 10 Dec 2001 19:22:14 -0000
Date: Mon, 10 Dec 2001 11:22:14 -0800
From: Marcus Reid
To: Marc Rassbach
Cc: freebsd-security@FreeBSD.ORG
Subject: Re: Rsync, ssh and using root.
Message-ID: <20011210112214.B82934@blazingdot.com>
References:
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
In-Reply-To: ; from marc@milestonerdl.com on Mon, Dec 10, 2001 at 12:33:25PM -0600
Coffee-Level: high
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
On Mon, Dec 10, 2001 at 12:33:25PM -0600, Marc Rassbach wrote:
>
> I know that using remote root login is considered bad behavior, but
> my job in implementation, not judgement of security. This is what the
> client wants...put a hole in the default FreeBSD security.
Darn those clients..
> The client in the old days had a 3.5 box (2 of them) and used a
> combination of rsync, rsync in daemon mode, and ssh to allow root to move
> data between both machines.
>
> What was done under 3.5 (remote keys, etc la) no longer work on 4.4.
> On 4.X, it seems to fail after authencation, and I have spent 20+ hours
> reading man pages, and the mail list and can't find a good work around.
> (I have resisted looking at the source becuase I do not feel it is a bug,
> nor do I wish to patch code to make this work)
>
> What I am looking for is a way to have root-level privilages for
> reading/writing files between servers as the lo-tech solution they want
> for the 'server backup' is moving files once a day.
You could do better without much additional effort. Give the operator
user a home directory, make a dsa keypair for it, and use 'dump' across
the network as operator (with ssh.) You can always add 'restore' to the
pipeline if you need the files to be loose on the machine that's making
the backups. No use going all the way to root if operator can get its
hands on all of the data.
Marcus
>
> Guidance as to how to do this with rsync (break securty) or some other
> method that does not break security is welcome.
--
Marcus L. Reid
Public Key ID DA2C3C46
"They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety." - Benjamin Franklin, 1759
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 11:23:39 2001
Delivered-To: freebsd-security@freebsd.org
Received: from parmenion.hosting.swbell.net (parmenion.hosting.swbell.net [216.100.98.30])
by hub.freebsd.org (Postfix) with ESMTP
id 617D537B419; Mon, 10 Dec 2001 11:23:34 -0800 (PST)
Received: from imimic.com (adsl-216-63-78-18.dsl.hstntx.swbell.net [216.63.78.18])
by parmenion.hosting.swbell.net
id OAA27556; Mon, 10 Dec 2001 14:23:20 -0500 (EST)
[ConcentricHost SMTP Relay 1.14]
Message-ID: <3C150BA7.9D5EC72E@imimic.com>
Date: Mon, 10 Dec 2001 13:23:19 -0600
From: "Alan L. Cox"
Organization: iMimic Networking, Inc.
X-Mailer: Mozilla 4.75 [en] (X11; U; FreeBSD 5.0-CURRENT i386)
X-Accept-Language: en
MIME-Version: 1.0
To: Alfred Perlstein
Cc: Mike Tancsa , security@freebsd.org,
alc@freebsd.org
Subject: Re: AIO vulnerability (from bugtraq)
References: <5.1.0.14.0.20011210131730.04998cf0@marble.sentex.ca> <20011210130803.B92148@elvis.mu.org>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
Will do. You might also send it to tegge.
Alfred Perlstein wrote:
>
> * Mike Tancsa [011210 12:25] wrote:
> >
> > For those not on bugtraq,
>
> Yah, this needs to be fixed, do note that AIO is not enabled by
> default in FreeBSD and the warning is pretty clear.
>
> Alan, can you take a look at this? I'd really like to get AIO
> enabled by default one of these days. :)
>
> >
> > ---Mike
> >
> > ------------------------------------------------------------------------------
> > Soniq Security Advisory
> > David Rufino Dec 9, 2001
> >
> > Race Condition in FreeBSD AIO implementation
> > http://elysium.soniq.net/dr/tao/tao.html
> > ------------------------------------------------------------------------------
> >
> > RISK FACTOR: LOW
> >
> > SYNOPSIS
> >
> > AIO is a POSIX standard for asynchronous I/O. Under certain conditions,
> > scheduled AIO operations persist after an execve, allowing arbitrary
> > overwrites in the memory of the new process. Combined with the permission
> > to execute suid binaries, this can yield elevated priviledges.
> > Currently VFS_AIO is not enabled in the default FreeBSD kernel config,
> > however comments in ``LINT'' suggest security issues have been known about
> > privately for some time:
> >
> > # Use real implementations of the aio_* system calls. There are numerous
> > # stability issues in the current aio code that make it unsuitable for
> > # inclusion on shell boxes.
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 13:26:21 2001
Delivered-To: freebsd-security@freebsd.org
Received: from ldc.ro (ldc-gw.rdsnet.ro [213.157.163.8])
by hub.freebsd.org (Postfix) with SMTP id 07ECC37B416
for ; Mon, 10 Dec 2001 13:26:15 -0800 (PST)
Received: (qmail 9848 invoked by uid 666); 10 Dec 2001 21:26:12 -0000
Date: Mon, 10 Dec 2001 23:26:12 +0200
From: Alex Popa
To: Marc Rassbach
Cc: freebsd-security@FreeBSD.ORG
Subject: Re: Rsync, ssh and using root.
Message-ID: <20011210232612.A56872@ldc.ro>
References:
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
In-Reply-To: ; from marc@milestonerdl.com on Mon, Dec 10, 2001 at 12:33:25PM -0600
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
On Mon, Dec 10, 2001 at 12:33:25PM -0600, Marc Rassbach wrote:
>
> I know that using remote root login is considered bad behavior, but
> my job in implementation, not judgement of security. This is what the
> client wants...put a hole in the default FreeBSD security.
>
> The client in the old days had a 3.5 box (2 of them) and used a
> combination of rsync, rsync in daemon mode, and ssh to allow root to move
> data between both machines.
>
> What was done under 3.5 (remote keys, etc la) no longer work on 4.4.
> On 4.X, it seems to fail after authencation, and I have spent 20+ hours
> reading man pages, and the mail list and can't find a good work around.
> (I have resisted looking at the source becuase I do not feel it is a bug,
> nor do I wish to patch code to make this work)
>
> What I am looking for is a way to have root-level privilages for
> reading/writing files between servers as the lo-tech solution they want
> for the 'server backup' is moving files once a day.
>
> Guidance as to how to do this with rsync (break securty) or some other
> method that does not break security is welcome.
>
>
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
Well, the most important change I can think of, which might be what is
keeping you from using your old ssh keys, is that (please correct me if
I am wrong) the default protocol for SSH in FreeBSD 4.4 is version 2.
Thus you will need a pair of DSA keys for passwordless scp, or the line
"Protocol 1,2" in one of /etc/ssh/sshd_config or /etc/ssh/ssh_config. (I
would prefer sshd_config, or better, generating dsa keys and putting the
public one in .ssh/authorized_keys2 on the remote machine)
HTH
Alex
------------+------------------------------------------
Alex Popa, | "Artificial Intelligence is
razor@ldc.ro| no match for Natural Stupidity"
------------+------------------------------------------
"It took the computing power of three C-64s to fly to the Moon.
It takes a 486 to run Windows 95. Something is wrong here."
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 15:15: 3 2001
Delivered-To: freebsd-security@freebsd.org
Received: from mta06-svc.ntlworld.com (mta06-svc.ntlworld.com [62.253.162.46])
by hub.freebsd.org (Postfix) with ESMTP id 9C4DC37B449
for ; Mon, 10 Dec 2001 15:14:43 -0800 (PST)
Received: from there ([80.4.125.7]) by mta06-svc.ntlworld.com
(InterMail vM.4.01.03.23 201-229-121-123-20010418) with SMTP
id <20011210231442.DTMS3849.mta06-svc.ntlworld.com@there>
for ;
Mon, 10 Dec 2001 23:14:42 +0000
Content-Type: text/plain;
charset="iso-8859-1"
From: Mike D
To: freebsd-security@FreeBSD.ORG
Subject: Re: ICMP from within only
Date: Mon, 10 Dec 2001 23:14:08 +0000
X-Mailer: KMail [version 1.3]
References:
In-Reply-To:
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Message-Id: <20011210231442.DTMS3849.mta06-svc.ntlworld.com@there>
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
> Allows YOU to ping, and run traceroute.
> $fwcmd add allow icmp from any to via icmptypes
> 0,3,11
>
> Denies others to ping you.
> $fwcmd add deny icmp from any to via icmptypes 0,8
>
> Allows pinging etc, from your personal network.
> $fwcmd add allow icmp from to via
> icmptypes 0,8
the problem is that I have a dynamically assigned IP address, what could you
suggest for this? Shall I just do the rule for 123.123.*? (123.123 being the
first 2 numbers of the DHCP range)
Thanks again in advance!
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 15:18: 0 2001
Delivered-To: freebsd-security@freebsd.org
Received: from radix.cryptio.net (radix.cryptio.net [199.181.107.213])
by hub.freebsd.org (Postfix) with ESMTP id 7000437B41B
for ; Mon, 10 Dec 2001 15:17:56 -0800 (PST)
Received: (from emechler@localhost)
by radix.cryptio.net (8.11.6/8.11.6) id fBANHtY76414;
Mon, 10 Dec 2001 15:17:55 -0800 (PST)
(envelope-from emechler)
Date: Mon, 10 Dec 2001 15:17:55 -0800
From: Erick Mechler
To: Mike D
Cc: freebsd-security@FreeBSD.ORG
Subject: Re: ICMP from within only
Message-ID: <20011210151755.P45316@techometer.net>
References: <20011210231442.DTMS3849.mta06-svc.ntlworld.com@there>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
In-Reply-To: <20011210231442.DTMS3849.mta06-svc.ntlworld.com@there>; from Mike D on Mon, Dec 10, 2001 at 11:14:08PM +0000
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
:: the problem is that I have a dynamically assigned IP address, what could you
:: suggest for this? Shall I just do the rule for 123.123.*? (123.123 being the
:: first 2 numbers of the DHCP range)
Check out the 'me' option in ipfw(8).
Cheers - Erick
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 15:41:46 2001
Delivered-To: freebsd-security@freebsd.org
Received: from smtp1.amigo.net (smtp1.amigo.net [209.94.64.30])
by hub.freebsd.org (Postfix) with ESMTP id C2DBD37B405
for ; Mon, 10 Dec 2001 15:41:35 -0800 (PST)
Received: from there (billing.amigo.net [209.94.67.250])
by smtp1.amigo.net (8.11.4/8.11.4) with SMTP id fBANmG182366;
Mon, 10 Dec 2001 16:48:16 -0700 (MST)
(envelope-from randys@amigo.net)
Message-Id: <200112102348.fBANmG182366@smtp1.amigo.net>
Content-Type: text/plain;
charset="iso-8859-1"
From: Randy Smith
Organization: Amigo.Net
To: Marc Rassbach
Subject: Re: Rsync, ssh and using root.
Date: Mon, 10 Dec 2001 16:41:30 -0700
X-Mailer: KMail [version 1.3.1]
References:
In-Reply-To:
Cc: freebsd-security@freebsd.org
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
On Monday 10 December 2001 11:33, you wrote:
>
> What I am looking for is a way to have root-level privilages for
> reading/writing files between servers as the lo-tech solution they want
> for the 'server backup' is moving files once a day.
Another option, though not nearly as much fun to set up, is to use
NFS+IPSec+rsync. It goes something like this:
- Setup a read-only mount from the main machine (Box A) using NFS. You will,
of course, restrict access to this to the IP address of the other machine
(Box B).
- Setup IPSec between the boxes to prevent IP spoofing and to provide the
encryption. (I use static keys to avoid the stability problems with racoon.
(They may not exist anymore but racoon had issues when I was looking into
this the first time.))
- On Box B, mount the NFS directory and then rsync from that to where ever it
needs to be. (bash# rsync --delete /path/to/boxa/nfs /path/to/local/location)
This avoids the problems with SSH and root access but may lead to other
problems that I am not aware of. One good thing about this is that restoring
to the other machine is reasonably easy. Remount boxa:/nfs/dir as read-write
and then reverse the paths in the rsync command above.
Others may be able to point out any problems/improvments that exist with this
plan.
Good luck.
--
Randy Smith
Amigo.Net Systems Administrator
1-719-589-6100 x 4185
http://www.amigo.net/
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 17:10: 9 2001
Delivered-To: freebsd-security@freebsd.org
Received: from fledge.watson.org (fledge.watson.org [204.156.12.50])
by hub.freebsd.org (Postfix) with ESMTP
id 466DC37B405; Mon, 10 Dec 2001 17:09:59 -0800 (PST)
Received: from localhost (arr@localhost)
by fledge.watson.org (8.11.6/8.11.5) with SMTP id fBB19YN13120;
Mon, 10 Dec 2001 20:09:34 -0500 (EST)
(envelope-from arr@FreeBSD.org)
X-Authentication-Warning: fledge.watson.org: arr owned process doing -bs
Date: Mon, 10 Dec 2001 20:09:33 -0500 (EST)
From: "Andrew R. Reiter"
X-Sender: arr@fledge.watson.org
To: Alfred Perlstein
Cc: Mike Tancsa , security@FreeBSD.org,
alc@FreeBSD.org, security-officer@FreeBSD.org
Subject: Re: AIO vulnerability (from bugtraq)
In-Reply-To: <20011210130803.B92148@elvis.mu.org>
Message-ID:
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
Since kkenn is gone for a period of time, should anyone on
security-officer respond publically? Or has this already been done and
I'm behind email..
On Mon, 10 Dec 2001, Alfred Perlstein wrote:
:* Mike Tancsa [011210 12:25] wrote:
:>
:> For those not on bugtraq,
:
:Yah, this needs to be fixed, do note that AIO is not enabled by
:default in FreeBSD and the warning is pretty clear.
:
:Alan, can you take a look at this? I'd really like to get AIO
:enabled by default one of these days. :)
:
:>
:> ---Mike
:>
:> ------------------------------------------------------------------------------
:> Soniq Security Advisory
:> David Rufino Dec 9, 2001
:>
:> Race Condition in FreeBSD AIO implementation
:> http://elysium.soniq.net/dr/tao/tao.html
:> ------------------------------------------------------------------------------
:>
:> RISK FACTOR: LOW
:>
:> SYNOPSIS
:>
:> AIO is a POSIX standard for asynchronous I/O. Under certain conditions,
:> scheduled AIO operations persist after an execve, allowing arbitrary
:> overwrites in the memory of the new process. Combined with the permission
:> to execute suid binaries, this can yield elevated priviledges.
:> Currently VFS_AIO is not enabled in the default FreeBSD kernel config,
:> however comments in ``LINT'' suggest security issues have been known about
:> privately for some time:
:>
:> # Use real implementations of the aio_* system calls. There are numerous
:> # stability issues in the current aio code that make it unsuitable for
:> # inclusion on shell boxes.
:
:To Unsubscribe: send mail to majordomo@FreeBSD.org
:with "unsubscribe freebsd-security" in the body of the message
:
--
Andrew R. Reiter
arr@watson.org
arr@FreeBSD.org
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 10 18:22:53 2001
Delivered-To: freebsd-security@freebsd.org
Received: from elvis.mu.org (elvis.mu.org [216.33.66.196])
by hub.freebsd.org (Postfix) with ESMTP
id 5193837B416; Mon, 10 Dec 2001 18:22:50 -0800 (PST)
Received: by elvis.mu.org (Postfix, from userid 1192)
id 0590581D01; Mon, 10 Dec 2001 20:22:50 -0600 (CST)
Date: Mon, 10 Dec 2001 20:22:49 -0600
From: Angry Skull
To: "Andrew R. Reiter"
Cc: Mike Tancsa , security@FreeBSD.org,
alc@FreeBSD.org, security-officer@FreeBSD.org
Subject: Re: AIO vulnerability (from bugtraq)
Message-ID: <20011210202249.Q92148@elvis.mu.org>
References: <20011210130803.B92148@elvis.mu.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
In-Reply-To: ; from arr@FreeBSD.org on Mon, Dec 10, 2001 at 08:09:33PM -0500
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe: