Re: Question - Latest security alery of samba

2003-03-16 Thread Alexander Bokovoy
On Sun, Mar 16, 2003 at 04:27:04PM +0200, Nir Livni wrote:
 Hi all,
 Just wanted to know if the latest security alert is all about quotas.c.
 An upgrade (for me) is a bit problematic at the moment.
 If I patch this specific source code myself and recompile smbd - is it
 (basically) enough ?
No, it is not all about quotas.c. Please read carefully announcement. You
will also find there some suggestions how to make break harder in mean
time, when you are working on upgrade. 

The upgrade is really required.

-- 
/ Alexander Bokovoy
Samba Team  http://www.samba.org/
ALT Linux Team  http://www.altlinux.org/
Midgard Project Ry  http://www.midgard-project.org/
 


RE: Question - Latest security alery of samba

2003-03-16 Thread Nir Livni
I've read the announcement carefully.
The announcement does not point a specific threat in the samba code.
It mentions that This version of Samba adds explicit overrun and overflow
checks on
fragment re-assembly of SMB/CIFS packets to ensure that only valid
re-assembly is performed by smbd.

It also mentions that samba is highly vulnerable to attacks from an external
network,
And that 
1. host based protection
2. interface protection
3. Using a firewall
4. Using a IPC$ share deny
May reduce vulnerability to such attacks.

There is no access to my samba servers from the internet, but I would like
to know more about this security issue - specially, which source codes are
involved. (SMB client code is currently no issue for me)
Any list of affected source files would be appreciated.

Thanks,
Nir

-Original Message-
From: Alexander Bokovoy [mailto:[EMAIL PROTECTED] 
Sent: Sunday, March 16, 2003 4:31 PM
To: Nir Livni; [EMAIL PROTECTED]
Subject: Re: Question - Latest security alery of samba


On Sun, Mar 16, 2003 at 04:27:04PM +0200, Nir Livni wrote:
 Hi all,
 Just wanted to know if the latest security alert is all about 
 quotas.c. An upgrade (for me) is a bit problematic at the moment. If I 
 patch this specific source code myself and recompile smbd - is it
 (basically) enough ?
No, it is not all about quotas.c. Please read carefully announcement. You
will also find there some suggestions how to make break harder in mean time,
when you are working on upgrade. 

The upgrade is really required.

-- 
/ Alexander Bokovoy
Samba Team  http://www.samba.org/
ALT Linux Team  http://www.altlinux.org/
Midgard Project Ry  http://www.midgard-project.org/
 


RE: Question - Latest security alery of samba

2003-03-16 Thread Richard Sharpe
On Sun, 16 Mar 2003, Nir Livni wrote:

 I've read the announcement carefully.
 The announcement does not point a specific threat in the samba code.
 It mentions that This version of Samba adds explicit overrun and overflow
 checks on
 fragment re-assembly of SMB/CIFS packets to ensure that only valid
 re-assembly is performed by smbd.
 
 It also mentions that samba is highly vulnerable to attacks from an external
 network,
 And that 
 1. host based protection
 2. interface protection
 3. Using a firewall
 4. Using a IPC$ share deny
 May reduce vulnerability to such attacks.
 
 There is no access to my samba servers from the internet, but I would like
 to know more about this security issue - specially, which source codes are
 involved. (SMB client code is currently no issue for me)
 Any list of affected source files would be appreciated.

How can we be sure that you are not a script-kiddie?

Regards
-
Richard Sharpe, rsharpe[at]ns.aus.com, rsharpe[at]samba.org, 
sharpe[at]ethereal.com, http://www.richardsharpe.com



RE: Question - Latest security alery of samba

2003-03-16 Thread Nir Livni
:-)
I guess my only proof could be Jeremy.
Jeremy knows me a bit.
I gave him a little help with one of the latest fixes in 2.2.8 (delete on
close).

Appreciate your help,
Nir Livni

-Original Message-
From: Richard Sharpe [mailto:[EMAIL PROTECTED] 
Sent: Sunday, March 16, 2003 8:06 PM
To: Nir Livni
Cc: [EMAIL PROTECTED]
Subject: RE: Question - Latest security alery of samba


On Sun, 16 Mar 2003, Nir Livni wrote:

 I've read the announcement carefully.
 The announcement does not point a specific threat in the samba code. 
 It mentions that This version of Samba adds explicit overrun and 
 overflow checks on fragment re-assembly of SMB/CIFS packets to ensure 
 that only valid re-assembly is performed by smbd.
 
 It also mentions that samba is highly vulnerable to attacks from an 
 external network, And that
 1. host based protection
 2. interface protection
 3. Using a firewall
 4. Using a IPC$ share deny
 May reduce vulnerability to such attacks.
 
 There is no access to my samba servers from the internet, but I would 
 like to know more about this security issue - specially, which source 
 codes are involved. (SMB client code is currently no issue for me) Any 
 list of affected source files would be appreciated.

How can we be sure that you are not a script-kiddie?

Regards
-
Richard Sharpe, rsharpe[at]ns.aus.com, rsharpe[at]samba.org, 
sharpe[at]ethereal.com, http://www.richardsharpe.com


Re: Question - Latest security alery of samba

2003-03-16 Thread jra
On Sun, Mar 16, 2003 at 05:54:17PM +0200, Nir Livni wrote:

 Any list of affected source files would be appreciated.

I have replied to Nir privately off-list.

Jeremy.