Re: Secure 2.4.x kernel - readonly

2001-12-27 Thread Tollef Fog Heen
* Alvin Oga | On Mon, 24 Dec 2001, Anthony DeRobertis wrote: | | making the disks readonly is not trivial ... | lots of work to make it readonly.. a fun project ... | | Not really. Nothing should write anywhere except /var and /tmp | (did I miss any). Also, if you have users, then

Re: mounting /tmp noexec (was: Campus Computers)

2001-12-27 Thread Philip Blundell
In message [EMAIL PROTECTED], Ian writes: so surely, if nothing needs to be executed, it is better to mount noexec? The thing about noexec is that you can almost always circumvent it. If you have a shell script in /tmp that you want to execute, you can use sh /tmp/r00tk1t. If you have a

sending password in the command line

2001-12-27 Thread Pedro Zorzenon Neto
Hi Friends, I am developing a software to provide access control to users of a network. The gateway has ipchains rules to DENY packets from all 192.168.0.0/16 hosts to the 0.0.0.0/0 world. If the user (a regular user, not root) does: $ myprogram enable username password IP the

Re: sending password in the command line

2001-12-27 Thread David Flatz
Pedro Zorzenon Neto said: Thanks for you sugestion David, As it is a Perl script that will call the program, I'll do in the Perl code something like this: $tmp=`umask 177; tempfile`; fopen (PASS,$tmp); print PASS $password; fclose PASS; `cat $tmp | myprogram enable $user

Re: sending password in the command line

2001-12-27 Thread Pedro Zorzenon Neto
On Thu, Dec 27, 2001 at 02:11:42PM -0200, Pedro Zorzenon Neto wrote: $tmp=`umask 177; tempfile`; fopen (PASS,$tmp); print PASS $password; fclose PASS; `cat $tmp | myprogram enable $user $ip; rm -f $tmp`; sorry... open (PASS,| myprogram enable $user $ip); print PASS

Re: sending password in the command line

2001-12-27 Thread Robert van der Meulen
Quoting David Flatz ([EMAIL PROTECTED]): #!/usr/bin/perl print('enter pass: '); $tmp = ; system('myprogram enable $user $tmp $ip'); Because then you would still pass the password on the commandline. Greets, Robert -- Linux Generation encrypted mail

RE: Secure 2.4.x kernel

2001-12-27 Thread Gary MacDougall
Now, I do not know about American law, but at least in Finland the guy whose gun (assault rifles are illegal anyway unless they are rendered non-automatic) was stolen, is likely to get punished as well! It depends on how the gun was stored: it needs to be locked away in a different location

Re: sending password in the command line

2001-12-27 Thread Benjamin Smith
On Thu, Dec 27, 2001 at 05:22:03PM +0100, David Flatz wrote: Pedro Zorzenon Neto said: Thanks for you sugestion David, As it is a Perl script that will call the program, I'll do in the Perl code something like this: $tmp=`umask 177; tempfile`; fopen (PASS,$tmp); print

Re: sending password in the command line

2001-12-27 Thread David Flatz
Benjamin Smith said: #!/usr/bin/perl print('enter pass: '); $tmp = ; system('myprogram enable $user $tmp $ip'); I think the first bit of code would work but why not use pipe opens in perl? ie. open(PASS, |myprogram enable $user $ip); write PASS PASSWORD; the best would be to

Re: sending password in the command line

2001-12-27 Thread Robert van der Meulen
Hi, There's a secure-coding (or somesuch) mailinglist over at securityfocus, that might be better suited to these kinds of discussions.. Greets, Robert -- Linux Generation encrypted mail preferred. finger [EMAIL PROTECTED] for my GnuPG/PGP key.

RE: Secure 2.4.x kernel

2001-12-27 Thread Howland, Curtis
-Original Message- From: Gary MacDougall soapbox I'm gong to get flamed like hell for this, but I think the general attitude of people that consider themselves Linux Security Guru's sucks! If you've ever visited #linux on IRC or talked with people in a chat room about Linux

/etc/passwd ?

2001-12-27 Thread Daniel Rychlik
I was wandering if I edited my /etc/passwd file and replaced all the /bin/sh to /bin/false , will that break anything? What Im seeing is accounts like lp, games, uucp, proxy, postgres, and a slew of others that I dont use. Thanks in advance Debian Guruz! Daniel

Re: /etc/passwd ?

2001-12-27 Thread Petre Daniel
most of them are relics of software that you probably dont need,but be carefully what account you erase. better comment them out.you can put a /etc/NOSHELL instead of /bin/sh or even /bin/false and they won't be able to login into the machine no more.. At 06:24 PM 12/27/01 -0600, Daniel

Re: /etc/passwd ?

2001-12-27 Thread Arthur
just run info false [...] This version of `false' is implemented as a C program, and is thus more secure and faster than a shell script implementation, and may safely be used as a dummy shell for the purpose of disabling accounts. so, a chsh -s /bin/false games for disabling a

Re: Secure 2.4.x kernel - readonly

2001-12-27 Thread Tollef Fog Heen
* Alvin Oga | On Mon, 24 Dec 2001, Anthony DeRobertis wrote: | | making the disks readonly is not trivial ... | lots of work to make it readonly.. a fun project ... | | Not really. Nothing should write anywhere except /var and /tmp | (did I miss any). Also, if you have users, then

Re: mounting /tmp noexec (was: Campus Computers)

2001-12-27 Thread Philip Blundell
In message [EMAIL PROTECTED], Ian writes: so surely, if nothing needs to be executed, it is better to mount noexec? The thing about noexec is that you can almost always circumvent it. If you have a shell script in /tmp that you want to execute, you can use sh /tmp/r00tk1t. If you have a

Re: sending password in the command line

2001-12-27 Thread David Flatz
Pedro Zorzenon Neto said: $ PASS=password myprogram enable username IP then myprogram will read the PASS from the environment. is there anyway a regular user could capture passwords? yes it is ps auxe try getting the password via stdin like mysql -p David Flatz

Re: sending password in the command line

2001-12-27 Thread Pedro Zorzenon Neto
On Thu, Dec 27, 2001 at 04:46:45PM +0100, David Flatz wrote: Pedro Zorzenon Neto said: $ PASS=password myprogram enable username IP then myprogram will read the PASS from the environment. is there anyway a regular user could capture passwords? yes it is ps auxe try

Re: sending password in the command line

2001-12-27 Thread David Flatz
Pedro Zorzenon Neto said: Thanks for you sugestion David, As it is a Perl script that will call the program, I'll do in the Perl code something like this: $tmp=`umask 177; tempfile`; fopen (PASS,$tmp); print PASS $password; fclose PASS; `cat $tmp | myprogram enable $user

Re: sending password in the command line

2001-12-27 Thread Pedro Zorzenon Neto
On Thu, Dec 27, 2001 at 02:11:42PM -0200, Pedro Zorzenon Neto wrote: $tmp=`umask 177; tempfile`; fopen (PASS,$tmp); print PASS $password; fclose PASS; `cat $tmp | myprogram enable $user $ip; rm -f $tmp`; sorry... open (PASS,| myprogram enable $user $ip); print PASS

Re: sending password in the command line

2001-12-27 Thread Johannes Weiss
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, If you send your password through a network the sniffer could also sniff the TCP-stream, try ngrep -d net-device port the port your prog uses Weissi -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see

Re: sending password in the command line

2001-12-27 Thread Robert van der Meulen
Quoting David Flatz ([EMAIL PROTECTED]): #!/usr/bin/perl print('enter pass: '); $tmp = ; system('myprogram enable $user $tmp $ip'); Because then you would still pass the password on the commandline. Greets, Robert -- Linux Generation encrypted mail

RE: Secure 2.4.x kernel

2001-12-27 Thread Gary MacDougall
Now, I do not know about American law, but at least in Finland the guy whose gun (assault rifles are illegal anyway unless they are rendered non-automatic) was stolen, is likely to get punished as well! It depends on how the gun was stored: it needs to be locked away in a different location

Re: sending password in the command line

2001-12-27 Thread Benjamin Smith
On Thu, Dec 27, 2001 at 05:22:03PM +0100, David Flatz wrote: Pedro Zorzenon Neto said: Thanks for you sugestion David, As it is a Perl script that will call the program, I'll do in the Perl code something like this: $tmp=`umask 177; tempfile`; fopen (PASS,$tmp); print

Re: sending password in the command line

2001-12-27 Thread David Flatz
Benjamin Smith said: #!/usr/bin/perl print('enter pass: '); $tmp = ; system('myprogram enable $user $tmp $ip'); I think the first bit of code would work but why not use pipe opens in perl? ie. open(PASS, |myprogram enable $user $ip); write PASS PASSWORD; the best would be to add

Re: sending password in the command line

2001-12-27 Thread xbud
This will not work I believe ps aux will show the environment variable's value instead of the variable. Which in your case would be the password, rendering your idea bad! =/ I would chroot the users' environments (jail them) so that they can only see their own processes... of course this

Re: sending password in the command line

2001-12-27 Thread Merlin
On Thursday 27 December 2001 16:46, Benjamin Smith wrote: Because that doesn't solve the original problem of the password being visible on the command line. The environment and the stdin were two suggested ways of passing the password. Why is all that for ? Isn't you who's writing the

Re: sending password in the command line

2001-12-27 Thread Benjamin Smith
On Thu, Dec 27, 2001 at 05:16:16PM +, Merlin wrote: On Thursday 27 December 2001 16:46, Benjamin Smith wrote: Because that doesn't solve the original problem of the password being visible on the command line. The environment and the stdin were two suggested ways of passing the

Re: sending password in the command line

2001-12-27 Thread Robert van der Meulen
Hi, There's a secure-coding (or somesuch) mailinglist over at securityfocus, that might be better suited to these kinds of discussions.. Greets, Robert -- Linux Generation encrypted mail preferred. finger [EMAIL PROTECTED] for my GnuPG/PGP key.

Re: sending password in the command line

2001-12-27 Thread Pedro Zorzenon Neto
On Thu, Dec 27, 2001 at 05:16:16PM +, Merlin wrote: On Thursday 27 December 2001 16:46, Benjamin Smith wrote: Because that doesn't solve the original problem of the password being visible on the command line. The environment and the stdin were two suggested ways of passing the

RE: Secure 2.4.x kernel

2001-12-27 Thread Howland, Curtis
-Original Message- From: Gary MacDougall soapbox I'm gong to get flamed like hell for this, but I think the general attitude of people that consider themselves Linux Security Guru's sucks! If you've ever visited #linux on IRC or talked with people in a chat room about Linux (in

/etc/passwd ?

2001-12-27 Thread Daniel Rychlik
I was wandering if I edited my /etc/passwd file and replaced all the /bin/sh to /bin/false , will that break anything? What Im seeing is accounts like lp, games, uucp, proxy, postgres, and a slew of others that I dont use. Thanks in advance Debian Guruz! Daniel

Re: /etc/passwd ?

2001-12-27 Thread Petre Daniel
most of them are relics of software that you probably dont need,but be carefully what account you erase. better comment them out.you can put a /etc/NOSHELL instead of /bin/sh or even /bin/false and they won't be able to login into the machine no more.. At 06:24 PM 12/27/01 -0600, Daniel

Re: /etc/passwd ?

2001-12-27 Thread Arthur
just run info false [...] This version of `false' is implemented as a C program, and is thus more secure and faster than a shell script implementation, and may safely be used as a dummy shell for the purpose of disabling accounts. so, a chsh -s /bin/false games for disabling a

Re: mounting /tmp noexec (was: Campus Computers)

2001-12-27 Thread Joey Hess
Ian wrote: why is this? Surely it is better security to do so? [EMAIL PROTECTED]:~ls -l ./ls -rw---1 joey joey43916 Dec 26 22:46 ./ls [EMAIL PROTECTED]:~/lib/ld-2.2.4.so ./ls CVS aalib.nohack.diff doc lsscreenshot.png GNUstep binhtml