On Thu, 10 Oct 2002, Steve Kudlak wrote:

> It has been a long time since I dealt with those arcane security
> matters. At least they are obscure and arcane to most people. Many
> consider me to be babbling when I go on about these things.  If I start
> saying "rainbow books" (the NSA's security books are in different
> colors) many people assume that I am crazy.:) 
> 
> Most of the stuff I did involved C-2 security and all the logging and
> authentication stuff. An assumption seems to have been made that
> "logging in" via ftp was the same as logging in via tty or machine. This
> is not so. The ftp code "establishes a user" the login code gets the
> user a shell and all that. For awhile in some OSes with C-2 security if
> one was going to mount a dictionary attack on some user or ever root,
> ftp would have been away to go. It would allow one a large amount of
> attacks with logging. One would definitely get more than 3 attempts to
> "login".  It was a way around C-2 security and was in my opinion a
> pretty serious compromise. Logging ftp "logins"  and ftp use were
> proposed fixes. I just had to find the problems not fix them. 
> 
> Hmmm...maybe I will post this to BSD hackers and if someone says it is
> off topic I will shut up. Perhaps I should as this info is kind of old.
> But the important to watch for these little back door tricks. Note I
> have not as of late read the FreeBSD ftp code.  Perhaps I should. 

This would be on topic for [EMAIL PROTECTED], but you
should go review current language, documents, and specifications, or
you'll cover a lot of previously covered ground.  The first thing you are
probably interested in is the Common Criteria description, which I believe
is available from ISO.

Robert N M Watson             FreeBSD Core Team, TrustedBSD Projects
[EMAIL PROTECTED]      Network Associates Laboratories



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to