While doing some "research" on FBI's "Magic Lantern",
I came across this article on NewOrder
(http://neworder.box.sk) which has brought a VERY
interesting point to notice:

"<emphasis>Trust Issues with RH and Debian Package
Managers</emphasis>", the most striking quote being :

"..Linux distributions need to band together and find
a trusted individual who will be responsible for
signing all packages and verifying that they do not
contain backdoors. That is the only way to solve this
issue..."

Please read the whole article which I have inlined for
archival purposes:

<quote article>

Trust Issues with RH and Debian Package Managers
------------------------------------------------

Summary
-------

"Magic Lantern" supposedly allows an FBI agent to
access a computer without requiring any physical
access to it. The exact method is not yet known, but
rumors talk about some hacking work done while the
program "installs" itself on the target machine. The
following is a proposed method on how this might work,
and is brought to the public's view in order to make
it clear how easy it is currently to create such a
program.


Details
-------

To test the feasibility of such a scheme you need to
set up a stock Debian 2.2r3 box, and a stock Red Hat
7.2 box. Both should be based on the installation CDs
produced at least a few months ago, so they will both
be vulnerable to the wu-ftpd exploit and would need to
be upgraded for production use.

The goal is simple: To play the part of the FBI, and
trick our machines into accepting a trojaned version
of the new wu-ftpd package.

First, we set up a transparent proxy on our gateway
box, which is used to split our cable modem connection
amongst our connecting machines. We used a program
called "squirm" to rewrite URLs ending in .deb or .rpm
so that they would be redirected to the local web
server, from which the trojaned .deb and .rpm files
would be served.

Second, we produced trojaned .deb and .rpm files. The
.deb file was trivial to modify, as only a checksum
stood between a valid hacked version and us. The .rpm
was a bit more difficult, because RedHat signs their
packages with a PGP key. However, once we rebuilt the
package and did not sign it with PGP, we had a fixed
package.

Third, we went to the Debian box and typed 'apt-get
update ; apt-get upgrade'. After a few routine
prompts, none of which triggered security alerts, the
box was rooted by our "custom" package.

Fourth, we went to the Redhat box and did an 'rpm -U'
pointed at the updates.redhat.com server. We got the
trojaned RPM back, with no warnings or prompt to warn
that it hasn't been signed. In addition, we had an ftp
server with a new backdoor up in a matter of minutes.

To summarize, the FBI can easily set up a transparent
proxy between you and the Internet, and trick your OS
into installing malware. You are damned if you do and
you are damned if you don't, because you need to
download the wuftpd-of-the-week sometime.

As a matter of comparison, our Windows 2000 box has no
such vulnerability. The first time we went to Windows
Update, we checked the box that said, "Always trust
content from Microsoft Corporation." Therefore, only
Microsoft's real certificate will be accepted by our
machine. Even if the FBI forces Verisign to issue an
impostor certificate, it will be detected and
thwarted.

Linux distributions need to band together and find a
trusted individual who will be responsible for signing
all packages and verifying that they do not contain
backdoors. That is the only way to solve this issue.

This is a serious issue for Linux users and we believe
it should have been addressed years ago. That said,
now is not too late and definitely not too early. We
look forward to seeing this feature in all future
releases of the major Linux distributions. 

 
</quote article>


Though I doubt the authenticity of the article (no
offense), yet, the above shall not be far from the
truth.

You might say that "Hey! If the user was naive enough
to download things from an untrusted host, he should
.."

But that's NOT the case. (Wonder where "squirm" can be
...)

Why ? 

Because I myself can demonstate DNS hijacking
targeting a network, wherein I can fool every OS on
the network into believing that it's connected to the
right "http://www.redhat.com/.."; which has the correct
IP say "64.9.45.5", but using the DNS Hijacking
utility redirect the network to "202.09.8.24" !
I am not joking. You can get the gist of it at Robert
Graham's site..

Moreover, of how many .tar.gz's that we download from
the net do we really check the MD5 Digest?
Many sites even do not list the MD5 Digest, leave
alone sign the packages using PGP.

Writing Keyloggers for the Windows OS was always easy
once you got the hang of Hooks, but now keyloggers are
being written for Linux too.
Check out the "Linux KeyLogger" which is a *userspace*
keylogger and hooks onto the keyboard hardware
interrupt directly !

Don't worry ! "Magic Lantern" should be targeted at
specific users(who may interest the FBI..) and *not*
all of us, but do think of what something similar
might do!

The time is now ripe to go easy on writing everyone's
own version of his favourite document processor, and
focus more on standards, regression testing, quality
and DOCUMENTATION!

The days, when people had to find out what to do with
a program, by reading the source code are over.
With so many languages popping up evey alternate day
and so many coders falling in love with one or the
other "cool language"...

Let's take some time to think....

Regards

Subhobroto Sinha

__________________________________
Do you Yahoo!?
The New Yahoo! Shopping - with improved product search
http://shopping.yahoo.com

--
To unsubscribe, send mail to [EMAIL PROTECTED] with the body
"unsubscribe ilug-cal" and an empty subject line.
FAQ: http://www.ilug-cal.org/node.php?id=3

Reply via email to