Re: Encrypting/emailing logs and configs

2002-11-02 Thread Lupe Christoph
On Wednesday, 2002-10-30 at 13:07:31 -0500, Sean McAvoy wrote:

 I was looking at configuring a few of my VPN/Firewall systems to send me
 daily backups of vital config files, and selected log files. I was
 wondering what would be the easiest method of accomplishing this? I was
 thinking something along the lines of just tar/bzip and then gpg to
 encrypt. What other possibilities are there? And has anyone else setup
 something similar?

I'm doing something similar on a firewall I set up. It uses find/cpio
to make an incremental dump (--newer SOME-MARK-FILE) and encrypts it.
The dump is put in a directory that is part of a chroot jail. It gets
encrypted with a public key in gpg.

I pick it up from an internal machine with scp with a key without
passphrase. The account used on the firewall has scponlyc as shell.
(If you don't know scponly, it permits only certain ssh operations, and
the scponlyc variant puts itself in a chroot jail. Which in my case
contains only the scp executables. http://sublimation.org/scponly/

The dump can only be decrypted with a special secret key, and access to
it's passphrase is controlled.

This is the dump script (BTW, this is a FreeBSD machine, you have to
adjust the pathes):

#!/bin/sh

LD_LIBRARY_PATH=/usr/local/bin export LD_LIBRARY_PATH

/bin/rm -f /jail/backup/level1.cpio.gpg  \
/usr/bin/find / /var -xdev -newer /jail/backup/Level0.mark -print0 | \
  /usr/bin/cpio --create --format=newc --null --io-size=32768 --quiet | \
  /usr/local/bin/gpg --encrypt --output /jail/backup/level1.cpio.gpg --recipient 
[EMAIL PROTECTED]

And this is the fetch script (SuSE box):
#!/bin/sh

LOCALFILE=/data/backup/cabernet/level1.cpio-`date +%Y%m%d-%a`.gpg
REMOTEFILE=backup/level1.cpio.gpg
KEYFILE=/root/.ssh/cabernet-backup-id

/usr/bin/scp -B -q -i $KEYFILE backup@cabernet:$REMOTEFILE $LOCALFILE

HTH,
Lupe Christoph
-- 
| [EMAIL PROTECTED]   |   http://www.lupe-christoph.de/ |
| Big Misunderstandings #6398: The Titanic was not supposed to be|
| unsinkable. The designer had a speech impediment. He said: I have |
| thith great unthinkable conthept ...  |


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




RE: tiger reporting thousands of files with undefined groups ownership

2002-11-02 Thread Carlos Sousa
Thanks for your replies.

On Sat, 2 Nov 2002 15:30:43 +1300 Corrin Lakeland wrote:

 When was the last time you fscked the partition?

Your reply had me go fsck both my partitions, / and /home. The /
partition had no errors, but the /home partition had a few, which could
account for about 1% of the 12187 files reported by tiger. The other 99%
are still unaccounted for, though.

On Fri, 1 Nov 2002 22:19:05 -0600 (CST) Mike Barushok wrote:

 It might be that something corrupted the /etc/passwd file
 in such a way that one or more entries were either not
 'readable' or had a duplicate entry. You might want to try
 running pwck.

# pwck -r
user news: directory /var/spool/news does not exist
user uucp: directory /var/spool/uucp does not exist
user majordom: directory /usr/lib/majordomo does not exist
user postgres: directory /var/lib/postgres does not exist
user msql: directory /var/lib/msql does not exist
user list: directory /var/list does not exist
user gnats: directory /var/lib/gnats/gnats-db does not exist
user telnetd: directory /usr/lib/telnetd does not exist
user mysql: directory /var/lib/mysql does not exist
pwck: no changes

Although I'd rather not get any messages from any checking program,
these seem to be harmless and unrelated to the issue.

Visual inspection of passwd and shadow doesn't help, both look OK.

Any more thoughts?

-- 
Carlos Sousa
http://vbc.dyndns.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




unsubscribe

2002-11-02 Thread Domenico Famularo



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: DHCP - rootkit

2002-11-02 Thread Phillip Hofmeister
On Fri, 01 Nov 2002 at 06:41:43PM -0400, Peter Cordes wrote:
  MD5 is still believed to be secure.  i.e. Nobody can modify a binary so
 that it has different contents but the same MD5 hash, unless they are _very_
 _very_ lucky.  The task becomes even more difficult if you check the length
 of the file as well as the hash.
if (filename == MYHACKEDFILE) {
cout  WHATEVERIEXPECTTHEMD5SUMTOBE
}
AFA file legnth go...the kernel source is available and I am sure you
could re-write that also...
-- 
Phil

PGP/GPG Key:
http://www.zionlth.org/~plhofmei/
wget -O - http://www.zionlth.org/~plhofmei/key.txt | gpg --import
--
Excuse #239: IRQ-problems with the Un-Interruptable-Power-Supply 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Fwd: iDEFENSE Security Advisory 11.01.02: Buffer Overflow Vulnerability in Abuse

2002-11-02 Thread Phillip Hofmeister
I am sure you have all seen this...but just in case.

Phil

- Forwarded message from David Endler [EMAIL PROTECTED] -

From: David Endler [EMAIL PROTECTED]
Subject: iDEFENSE Security Advisory 11.01.02: Buffer Overflow Vulnerability in Abuse
To: [EMAIL PROTECTED]
Date: Fri, 1 Nov 2002 14:36:52 -0500
X-Spam-Status: No, bogofilter
Delivery-date: Fri, 01 Nov 2002 16:37:04 -0500
X-Razor-Warning: NONE.

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

iDEFENSE Security Advisory 11.01.02: 
http://www.idefense.com/advisory/11.01.02.txt
Buffer Overflow Vulnerability in Abuse
October 31, 2002

I. BACKGROUND

Abuse is a popular side-scrolling video game. More information can be
found at http://jonathanclark.com/ and http://www.crack.com/.

II. DESCRIPTION

Exploitation of a locally exploitable parsing error in Abuse's -net
command line option could allow attackers to gain root privileges on
a targeted system. By supplying an overly long argument, the
instruction pointer is overwritten, thereby allowing an attacker to
seize control of the executable. In a default abuse installation in
Debian Linux, both abuse.console and abuse.x11R6 can be used in
exploitation; both files are set group id games, and abuse.console is
set user id root.

III. ANALYSIS

Exploitation allows a local attacker to gain super-user status and
full control over the targeted system. Affected users should
implement either of the two workarounds listed below.

IV. DETECTION

Abuse 2.00, which is packaged and distributed with the x86
architecture of Debian Linux 3.0r0, is vulnerable. Other platforms
and architectures may be vulnerable as well. To determine if a
specific Abuse implementation is vulnerable, launch it with the
following command line:

$ /usr/lib/games/abuse/abuse.console -net 'perl -e 'print Ax500''

If the application crashes with a Segmentation fault, it is
vulnerable.

V. WORKAROUND

Customers should consider implementing one of the two following
workarounds:

1. Remove Abuse by issuing the following command:

# apt-get remove abuse 

2. Remove the setuid bit from the XaoS binary by executing the
following command:

# chmod -s /usr/lib/games/abuse/abuse.*

VI. VENDOR RESPONSE

Abuse has a number of other vulnerabilities and should never be
installed on a multi-user system where security is a concern, said
Jonathan Clark.

Abuse allows alternate Lisp script files to be executed at startup
via command line parameters.  Some script functions can execute
abritrary commands or cause external files to modified.

VII. CVE INFORMATION

The Mitre Corp.'s Common Vulnerabilities and Exposures (CVE) Project
assigned the identification number CAN-2002-1250 to this issue.

VIII. DISCLOSURE TIMELINE

10/15/2002  Issue disclosed to iDEFENSE
10/31/2002  Author notified
10/31/2002  iDEFENSE clients notified
11/01/2002  Response received from Jonathan Clark 
([EMAIL PROTECTED])
11/01/2002  Public disclosure

IX. CREDIT

Texonet (http://www.texonet.com) discovered this vulnerability.


Get paid for security research
http://www.idefense.com/contributor.html

Subscribe to iDEFENSE Advisories:
send email to [EMAIL PROTECTED], subject line: subscribe


About iDEFENSE:

iDEFENSE is a global security intelligence company that proactively
monitors sources throughout the world — from technical
vulnerabilities and hacker profiling to the global spread of viruses
and other malicious code. Our security intelligence services provide 
decision-makers, frontline security professionals and network 
administrators with timely access to actionable intelligence
and decision support on cyber-related threats. For more information,
visit http://www.idefense.com.


- -dave

David Endler, CISSP
Director, Technical Intelligence
iDEFENSE, Inc.
14151 Newbrook Drive
Suite 100
Chantilly, VA 20151
voice: 703-344-2632
fax: 703-961-1071

[EMAIL PROTECTED]
www.idefense.com

-BEGIN PGP SIGNATURE-
Version: PGP 7.1.2
Comment: http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x4B0ACC2A

iQA/AwUBPcLJckrdNYRLCswqEQKiIwCfYNMqgc3cz0u47KI072fQTtGqTN4An064
DlkW88VtmsQ+ZCyPWhAWnRms
=tjox
-END PGP SIGNATURE-


- End forwarded message -

-- 
Phil

PGP/GPG Key:
http://www.zionlth.org/~plhofmei/
wget -O - http://www.zionlth.org/~plhofmei/key.txt | gpg --import
--
Excuse #238: Routing problems on the neural net 




msg07608/pgp0.pgp
Description: PGP signature


Re: Encrypting/emailing logs and configs

2002-11-02 Thread Lupe Christoph
On Wednesday, 2002-10-30 at 13:07:31 -0500, Sean McAvoy wrote:

 I was looking at configuring a few of my VPN/Firewall systems to send me
 daily backups of vital config files, and selected log files. I was
 wondering what would be the easiest method of accomplishing this? I was
 thinking something along the lines of just tar/bzip and then gpg to
 encrypt. What other possibilities are there? And has anyone else setup
 something similar?

I'm doing something similar on a firewall I set up. It uses find/cpio
to make an incremental dump (--newer SOME-MARK-FILE) and encrypts it.
The dump is put in a directory that is part of a chroot jail. It gets
encrypted with a public key in gpg.

I pick it up from an internal machine with scp with a key without
passphrase. The account used on the firewall has scponlyc as shell.
(If you don't know scponly, it permits only certain ssh operations, and
the scponlyc variant puts itself in a chroot jail. Which in my case
contains only the scp executables. http://sublimation.org/scponly/

The dump can only be decrypted with a special secret key, and access to
it's passphrase is controlled.

This is the dump script (BTW, this is a FreeBSD machine, you have to
adjust the pathes):

#!/bin/sh

LD_LIBRARY_PATH=/usr/local/bin export LD_LIBRARY_PATH

/bin/rm -f /jail/backup/level1.cpio.gpg  \
/usr/bin/find / /var -xdev -newer /jail/backup/Level0.mark -print0 | \
  /usr/bin/cpio --create --format=newc --null --io-size=32768 --quiet | \
  /usr/local/bin/gpg --encrypt --output /jail/backup/level1.cpio.gpg 
--recipient [EMAIL PROTECTED]

And this is the fetch script (SuSE box):
#!/bin/sh

LOCALFILE=/data/backup/cabernet/level1.cpio-`date +%Y%m%d-%a`.gpg
REMOTEFILE=backup/level1.cpio.gpg
KEYFILE=/root/.ssh/cabernet-backup-id

/usr/bin/scp -B -q -i $KEYFILE [EMAIL PROTECTED]:$REMOTEFILE $LOCALFILE

HTH,
Lupe Christoph
-- 
| [EMAIL PROTECTED]   |   http://www.lupe-christoph.de/ |
| Big Misunderstandings #6398: The Titanic was not supposed to be|
| unsinkable. The designer had a speech impediment. He said: I have |
| thith great unthinkable conthept ...  |



RE: tiger reporting thousands of files with undefined groups ownership

2002-11-02 Thread Carlos Sousa
Thanks for your replies.

On Sat, 2 Nov 2002 15:30:43 +1300 Corrin Lakeland wrote:

 When was the last time you fscked the partition?

Your reply had me go fsck both my partitions, / and /home. The /
partition had no errors, but the /home partition had a few, which could
account for about 1% of the 12187 files reported by tiger. The other 99%
are still unaccounted for, though.

On Fri, 1 Nov 2002 22:19:05 -0600 (CST) Mike Barushok wrote:

 It might be that something corrupted the /etc/passwd file
 in such a way that one or more entries were either not
 'readable' or had a duplicate entry. You might want to try
 running pwck.

# pwck -r
user news: directory /var/spool/news does not exist
user uucp: directory /var/spool/uucp does not exist
user majordom: directory /usr/lib/majordomo does not exist
user postgres: directory /var/lib/postgres does not exist
user msql: directory /var/lib/msql does not exist
user list: directory /var/list does not exist
user gnats: directory /var/lib/gnats/gnats-db does not exist
user telnetd: directory /usr/lib/telnetd does not exist
user mysql: directory /var/lib/mysql does not exist
pwck: no changes

Although I'd rather not get any messages from any checking program,
these seem to be harmless and unrelated to the issue.

Visual inspection of passwd and shadow doesn't help, both look OK.

Any more thoughts?

-- 
Carlos Sousa
http://vbc.dyndns.org/



unsubscribe

2002-11-02 Thread Domenico Famularo




Re: DHCP - rootkit

2002-11-02 Thread Phillip Hofmeister
On Fri, 01 Nov 2002 at 06:41:43PM -0400, Peter Cordes wrote:
  MD5 is still believed to be secure.  i.e. Nobody can modify a binary so
 that it has different contents but the same MD5 hash, unless they are _very_
 _very_ lucky.  The task becomes even more difficult if you check the length
 of the file as well as the hash.
if (filename == MYHACKEDFILE) {
cout  WHATEVERIEXPECTTHEMD5SUMTOBE
}
AFA file legnth go...the kernel source is available and I am sure you
could re-write that also...
-- 
Phil

PGP/GPG Key:
http://www.zionlth.org/~plhofmei/
wget -O - http://www.zionlth.org/~plhofmei/key.txt | gpg --import
--
Excuse #239: IRQ-problems with the Un-Interruptable-Power-Supply 



Fwd: iDEFENSE Security Advisory 11.01.02: Buffer Overflow Vulnerability in Abuse

2002-11-02 Thread Phillip Hofmeister
I am sure you have all seen this...but just in case.

Phil

- Forwarded message from David Endler [EMAIL PROTECTED] -

From: David Endler [EMAIL PROTECTED]
Subject: iDEFENSE Security Advisory 11.01.02: Buffer Overflow Vulnerability in 
Abuse
To: bugtraq@securityfocus.com
Date: Fri, 1 Nov 2002 14:36:52 -0500
X-Spam-Status: No, bogofilter
Delivery-date: Fri, 01 Nov 2002 16:37:04 -0500
X-Razor-Warning: NONE.

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

iDEFENSE Security Advisory 11.01.02: 
http://www.idefense.com/advisory/11.01.02.txt
Buffer Overflow Vulnerability in Abuse
October 31, 2002

I. BACKGROUND

Abuse is a popular side-scrolling video game. More information can be
found at http://jonathanclark.com/ and http://www.crack.com/.

II. DESCRIPTION

Exploitation of a locally exploitable parsing error in Abuse's -net
command line option could allow attackers to gain root privileges on
a targeted system. By supplying an overly long argument, the
instruction pointer is overwritten, thereby allowing an attacker to
seize control of the executable. In a default abuse installation in
Debian Linux, both abuse.console and abuse.x11R6 can be used in
exploitation; both files are set group id games, and abuse.console is
set user id root.

III. ANALYSIS

Exploitation allows a local attacker to gain super-user status and
full control over the targeted system. Affected users should
implement either of the two workarounds listed below.

IV. DETECTION

Abuse 2.00, which is packaged and distributed with the x86
architecture of Debian Linux 3.0r0, is vulnerable. Other platforms
and architectures may be vulnerable as well. To determine if a
specific Abuse implementation is vulnerable, launch it with the
following command line:

$ /usr/lib/games/abuse/abuse.console -net 'perl -e 'print Ax500''

If the application crashes with a Segmentation fault, it is
vulnerable.

V. WORKAROUND

Customers should consider implementing one of the two following
workarounds:

1. Remove Abuse by issuing the following command:

# apt-get remove abuse 

2. Remove the setuid bit from the XaoS binary by executing the
following command:

# chmod -s /usr/lib/games/abuse/abuse.*

VI. VENDOR RESPONSE

Abuse has a number of other vulnerabilities and should never be
installed on a multi-user system where security is a concern, said
Jonathan Clark.

Abuse allows alternate Lisp script files to be executed at startup
via command line parameters.  Some script functions can execute
abritrary commands or cause external files to modified.

VII. CVE INFORMATION

The Mitre Corp.'s Common Vulnerabilities and Exposures (CVE) Project
assigned the identification number CAN-2002-1250 to this issue.

VIII. DISCLOSURE TIMELINE

10/15/2002  Issue disclosed to iDEFENSE
10/31/2002  Author notified
10/31/2002  iDEFENSE clients notified
11/01/2002  Response received from Jonathan Clark 
([EMAIL PROTECTED])
11/01/2002  Public disclosure

IX. CREDIT

Texonet (http://www.texonet.com) discovered this vulnerability.


Get paid for security research
http://www.idefense.com/contributor.html

Subscribe to iDEFENSE Advisories:
send email to [EMAIL PROTECTED], subject line: subscribe


About iDEFENSE:

iDEFENSE is a global security intelligence company that proactively
monitors sources throughout the world ? from technical
vulnerabilities and hacker profiling to the global spread of viruses
and other malicious code. Our security intelligence services provide 
decision-makers, frontline security professionals and network 
administrators with timely access to actionable intelligence
and decision support on cyber-related threats. For more information,
visit http://www.idefense.com.


- -dave

David Endler, CISSP
Director, Technical Intelligence
iDEFENSE, Inc.
14151 Newbrook Drive
Suite 100
Chantilly, VA 20151
voice: 703-344-2632
fax: 703-961-1071

[EMAIL PROTECTED]
www.idefense.com

-BEGIN PGP SIGNATURE-
Version: PGP 7.1.2
Comment: http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x4B0ACC2A

iQA/AwUBPcLJckrdNYRLCswqEQKiIwCfYNMqgc3cz0u47KI072fQTtGqTN4An064
DlkW88VtmsQ+ZCyPWhAWnRms
=tjox
-END PGP SIGNATURE-


- End forwarded message -

-- 
Phil

PGP/GPG Key:
http://www.zionlth.org/~plhofmei/
wget -O - http://www.zionlth.org/~plhofmei/key.txt | gpg --import
--
Excuse #238: Routing problems on the neural net 



pgptXRmLwjS4Z.pgp
Description: PGP signature