Garrett D'Amore wrote:
> Joep Vesseur wrote:
>> Interesting case... At first I thought it was April 1st already, but 
>> I guess
>> we'll see more tools like this appearing as familiarity cases (NFS-shell
>> anyone?)
>>
>> I realize that any user can install this software by downloading and
>> compiling, but I'm left with two questions when it's present out of 
>> the box:
>>
>>  - what privileges are needed by this software? Can any regular user 
>> run this
>>    and, perhaps accidentally, create havoc on the networks he's 
>> connected to?
>>    I guess it would be nice if only users with "Network Security" or 
>> another
>>    suitable profile were able to use this program.
>>
>>  - The FOSS document states that there are no network services 
>> provided by
>>    this software and no authentication performed. The man-page however
>>    mentions a daemon mode that offers a Cisco-like CLI that people 
>> can use
>>    to monitor and launch attacks from. Who can start this daemon and 
>> how is
>>    access to the daemon controlled?
>>
>> Joep
>>   
> I'm actually of the opinion that this is not something we ought to be 
> bundling with our systems.  I understand there might be some intent to 
> allow administrators to do penetration testing, but I really believe 
> we shouldn't be encouraging end-users to do this.  Basically, tools 
> like this just facilitate life for the "script kiddies".
Is there absolute or substantial distinction between administrators and 
end-users in this case? NOTE that any privileged user can download and 
compile this piece of software if one wish to, even at the time yersinia 
hasn't yet been shipped out of the box. However, an unprivileged user 
could never have a chance to impose anything harmful to the hosts or 
networks by yersinia. I don't follow the saying that shipping this tool 
equals to encouraging anyone - including end-users - to attack the 
network. Just an example, almost all system adminstrators know that by 
doing "rm -rf /", one would damage the root filesystem and result in all 
the data in the disk or datastore ruined at all. But we should not say, 
umm, "rm is too dangerous a tool, thus we shouldn't get it shipped thus 
encourging end-users damage any data". I admit this is one rather 
extreme example, but the logic is that the only thing should be taken 
care of  is the proper privileges and authorizations. It's all up to the 
user with the correspoding level of privileges - who should really take 
care about what the real impact is. The more privileges, the more 
responsibilities.

Additionally, both Redhat and Canonical have shipped yersinia into their 
Linux distros respectively, for long. I don't think they shipped this 
because they encourage end-users to attack the network. Is 
OpenSolaris/Solaris a special case that cannot offer this kind of 
flexibility to end-users?

> From an architectural point of view, does it make sense that we 
> include tools that have the primary purpose of being used to identify 
> and exploit weaknesses in the network infrastructure?  I really don't 
> think so.
Not to rain on the parade ... But if you recall there had been a time 
telnet worm was raging amongst SWAN, a vulnerability scanner tool - 
nmap, was integrated soon because it's identified to be useful for 
discover and exploit the affected systems in the network. However ,on 
the other mixed blessing end, nmap is also nortorious intrution tool 
since last 90s, that many hacker's sites provide it as a spoofing or 
attacking tool in hackers' daily toolkit. But we rarely notice the 
complaint that someone is scanning or hacking network since nmap is 
being bundled with Solaris, although it's believed that nmap itself 
could do more harm than yersinia, to stress the attacks to quite amount 
of systems in parallel.

But yersinia just fill the gap that nmap cannot do - explore system 
vulnerablity against layer 2 spoofing attacks, that help administrators 
aware of  the potential security problems much better.

Hence from purely the ARC's POV, I do think it can make sense to include 
this tool as well.

>
> If just one corporate catastrophe is avoided by not having this kind 
> of software "too readily available", then I'll be glad we haven't 
> shipped it.
>
> I think this case pushes the "familiarity envelope" just a bit too 
> far.  My fingers are hovering over the derail button...  but I'll give 
> the submitter/owner a chance to help me understand the architectural 
> vision here -- how does offering this in prepackaged form do more good 
> than harm?
I hope the clarifications above would be helpful for you to understand 
the vision and scope here. :-)


Thanks,
-Siwei
>
>    - Garrett
>

Reply via email to