Hi all, 

Sorry for this somewhat vague and long mail. 

Had some free time and got round to downloading and running "saint" which 
supposedly is similair to satan and ran tests on my home-standalone-mandrake 
7.2-kernel2.4 -single user (2 logins -root + username) linux box. Connects to 
the net on a dial-up for browsing + LIH mail ;-) simple set up really. 

The results were not really likeable and have left me confused on the 
security front. I have some fears on the back-door comments and evidence of 
penetration. (see below)

My queries  are 
how seriously should I take "Saint"? 
How can I track and eliminate backdoors
How can i disable all remote connectivity into my machine except to 
facilitate mail and web browsing? 
Will Bastille scripts help? 

Anyone else try this? feedbacks? PS: link to saint - www.wdsi.com

Thanks for your time and thoughts 
Ashwin


Extract of Saint's output: 
------------------------------------------------------
Evidence of Penetration (ashwin says - scary bit) 
localhost.localdomain: Possible mstream handler detected  
localhost.localdomain: Possible shaft handler detected 
localhost.localdomain: Possible stacheldraht handler detected 
localhost.localdomain: Possible trinoo master detected 

Possible Vulnerabilities (ashwin says - scary bit) 
localhost.localdomain: Possible backdoor: 9704/TCP 
localhost.localdomain: Possible backdoor: ingreslock 
localhost.localdomain: Possible vulnerability in Big Brother (bbd) (CVE 
2000-0639) 
localhost.localdomain: Gauntlet or WebShield cyberdaemon may be vulnerable 
(CVE 2000-0437) 
localhost.localdomain: DNS may be vulnerable localhost.localdomain: 
Possible buffer overflow in UnixWare i2odialogd (CVE 2000-0026) 
localhost.localdomain: Is your Kerberos secure? (CVE 2000-0389 2000-0390 
2000-0391) 
localhost.localdomain: possible vulnerability in Linux lpd 
localhost.localdomain: Possible vulnerability in HP Omniback (CVE 2000-0179) 
localhost.localdomain: Possible vulnerability in Openview Node Manager (CVE 
2000-0558) 
localhost.localdomain: SGI Performance Copilot may be vulnerable 
localhost.localdomain: SMTP may be a mail relay localhost.localdomain: 
Possible vulnerability in Microsoft Terminal Server ( ashwin says duhhhhh??)
Limit Internet Access ? 
localhost.localdomain: rlogin is enabled 
localhost.localdomain: pop receives password in clear 
localhost.localdomain: rexec is enabled and could help attacker
-----------------------------------------------------

----------------------------------------------
An alpha version of a web based tool to manage
your subscription with this mailing list is at
http://lists.linux-india.org/cgi-bin/mj_wwwusr

Reply via email to