Re: A question about Knark and modules

2001-06-20 Thread Ethan Benson
On Wed, Jun 20, 2001 at 12:02:47AM -0600, Hubert Chan wrote: Ethan == Ethan Benson [EMAIL PROTECTED] writes: Ethan echo 'eb::0:0:Ethan Benson:/home/eb:/bin/bash' /etc/passwd.d/eb Ethan login whe r00t! Hmm. Forgot about that. I guess that would be a bit of a security hole. :-(

Re: A question about Knark and modules

2001-06-20 Thread Peter Cordes
On Tue, Jun 19, 2001 at 12:28:46AM -0800, Ethan Benson wrote: On Tue, Jun 19, 2001 at 12:17:07PM +0800, Ben Harvey wrote: cracker==root sysadmin==root+LIDS_password if someone can sniff me typing in my lids password (encrypted in the kernel) then I am stuffed. they can always read the

Re: A question about Knark and modules

2001-06-20 Thread Christian Jaeger
At 10:34 Uhr +0200 19.6.2001, Ethan Benson wrote: On Tue, Jun 19, 2001 at 10:09:51AM +0200, Christian Jaeger wrote: But if the passwd command doesn't itself have the rights to access /etc/shadow but only the root login shell has (which only runs if called through sshd), then the cracker

Re: A question about Knark and modules

2001-06-20 Thread Hubert Chan
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Ethan == Ethan Benson [EMAIL PROTECTED] writes: Ethan echo 'eb::0:0:Ethan Benson:/home/eb:/bin/bash' /etc/passwd.d/eb Ethan login whe r00t! Hmm. Forgot about that. I guess that would be a bit of a security hole. :-( Ethan it would be a

Re: A question about Knark and modules

2001-06-20 Thread Ethan Benson
On Wed, Jun 20, 2001 at 12:02:47AM -0600, Hubert Chan wrote: Ethan == Ethan Benson [EMAIL PROTECTED] writes: Ethan echo 'eb::0:0:Ethan Benson:/home/eb:/bin/bash' /etc/passwd.d/eb Ethan login whe r00t! Hmm. Forgot about that. I guess that would be a bit of a security hole. :-(

Re: A question about Knark and modules

2001-06-20 Thread Martin Maney
On Wed, Jun 20, 2001 at 12:02:47AM -0600, Hubert Chan wrote: be SUID, you're safer without it being SUID). Is there any (sane) way of making it so that programs such as passwd, chsh, etc. don't need to be SUID? Not really. Not if you want to ensure that any of the data they can alter passes

Re: A question about Knark and modules

2001-06-20 Thread Peter Cordes
On Tue, Jun 19, 2001 at 12:28:46AM -0800, Ethan Benson wrote: On Tue, Jun 19, 2001 at 12:17:07PM +0800, Ben Harvey wrote: cracker==root sysadmin==root+LIDS_password if someone can sniff me typing in my lids password (encrypted in the kernel) then I am stuffed. they can always read the

Re: A question about Knark and modules

2001-06-20 Thread Christian Jaeger
At 10:34 Uhr +0200 19.6.2001, Ethan Benson wrote: On Tue, Jun 19, 2001 at 10:09:51AM +0200, Christian Jaeger wrote: But if the passwd command doesn't itself have the rights to access /etc/shadow but only the root login shell has (which only runs if called through sshd), then the cracker

Re: A question about Knark and modules

2001-06-19 Thread Ethan Benson
On Tue, Jun 19, 2001 at 12:17:07PM +0800, Ben Harvey wrote: cracker==root sysadmin==root+LIDS_password if someone can sniff me typing in my lids password (encrypted in the kernel) then I am stuffed. they can always read the password hash out of the kernel and run a brute force attack on it

Re: A question about Knark and modules

2001-06-19 Thread Ethan Benson
On Tue, Jun 19, 2001 at 10:09:51AM +0200, Christian Jaeger wrote: At 2:17 Uhr +0200 19.6.2001, Ethan Benson wrote: what if the attacker can poisen your DNS, or routing tables? then he can trick apt into downloading his 37337 `security update' (more like unsecurity update heh) Yes, but

Re: A question about Knark and modules

2001-06-19 Thread Hubert Chan
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Ethan == Ethan Benson [EMAIL PROTECTED] writes: Ethan passwd not being able to update /etc/shadow would be a very bad Ethan thing since users would be unable to change thier own passwords. Ethan users need to be encouraged to change thier

Re: A question about Knark and modules

2001-06-19 Thread Hubert Chan
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Ethan == Ethan Benson [EMAIL PROTECTED] writes: Ethan echo 'eb::0:0:Ethan Benson:/home/eb:/bin/bash' /etc/passwd.d/eb Ethan login whe r00t! Hmm. Forgot about that. I guess that would be a bit of a security hole. :-( Ethan it would be a

Re: A question about Knark and modules

2001-06-19 Thread Ben Harvey
On Sun, Jun 17, 2001 at 07:55:40PM -0800, Ethan Benson wrote: a bit. lids makes system adminsitration utterly impossible. unless you leave enough holes open which an attacker can use to bypass it all. well nearly... at least you can prevent new or unknown process/files from acessing stuff.

Re: A question about Knark and modules

2001-06-19 Thread Christian Jaeger
At 2:17 Uhr +0200 19.6.2001, Ethan Benson wrote: what if the attacker can poisen your DNS, or routing tables? then he can trick apt into downloading his 37337 `security update' (more like unsecurity update heh) Yes, but that's a problem anyway, isn't it? In fact it's a question I have about

Re: A question about Knark and modules

2001-06-19 Thread Ethan Benson
On Tue, Jun 19, 2001 at 12:17:07PM +0800, Ben Harvey wrote: cracker==root sysadmin==root+LIDS_password if someone can sniff me typing in my lids password (encrypted in the kernel) then I am stuffed. they can always read the password hash out of the kernel and run a brute force attack on it

Re: A question about Knark and modules

2001-06-19 Thread Ethan Benson
On Tue, Jun 19, 2001 at 10:09:51AM +0200, Christian Jaeger wrote: At 2:17 Uhr +0200 19.6.2001, Ethan Benson wrote: what if the attacker can poisen your DNS, or routing tables? then he can trick apt into downloading his 37337 `security update' (more like unsecurity update heh) Yes, but

Re: A question about Knark and modules

2001-06-19 Thread Hubert Chan
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Ethan == Ethan Benson [EMAIL PROTECTED] writes: Ethan passwd not being able to update /etc/shadow would be a very bad Ethan thing since users would be unable to change thier own passwords. Ethan users need to be encouraged to change thier passwords,

Re: A question about Knark and modules

2001-06-19 Thread Ethan Benson
On Tue, Jun 19, 2001 at 12:35:51PM -0600, Hubert Chan wrote: Ethan == Ethan Benson [EMAIL PROTECTED] writes: Ethan passwd not being able to update /etc/shadow would be a very bad Ethan thing since users would be unable to change thier own passwords. Ethan users need to be encouraged to

Re: A question about Knark and modules

2001-06-18 Thread Ethan Benson
On Mon, Jun 18, 2001 at 01:38:16AM -0300, Peter Cordes wrote: I like the package signing idea. That would be cool. That way, you could still load and unload modules. I like being able to do that. One obvious problem with the scheme is that an attacker could potentially read the keys from

Re: A question about Knark and modules

2001-06-18 Thread Ethan Benson
On Mon, Jun 18, 2001 at 08:56:03AM +0200, Philipp Schulte wrote: On Sun, Jun 17, 2001 at 10:42:17PM -0800, Ethan Benson wrote: you would need to fix filesystem immutability and block device access as well. currently lcap CAP_LINUX_IMMUTABLE is useless since there is no way to deny

Re: A question about Knark and modules

2001-06-18 Thread Philipp Schulte
On Mon, Jun 18, 2001 at 12:35:13AM -0800, Ethan Benson wrote: chattr +i and +a cannot be set or removed if CAP_LINUX_IMMUTABLE is removed from the bounding set. however that does not prevent root from messing with /dev/hda* directly, niether does CAP_SYS_RAWIO. there is no capability

Re: A question about Knark and modules

2001-06-18 Thread Ethan Benson
On Mon, Jun 18, 2001 at 12:43:41PM +0200, Philipp Schulte wrote: On Mon, Jun 18, 2001 at 12:35:13AM -0800, Ethan Benson wrote: chattr +i and +a cannot be set or removed if CAP_LINUX_IMMUTABLE is removed from the bounding set. however that does not prevent root from messing with

Re: A question about Knark and modules

2001-06-18 Thread Philipp Schulte
On Mon, Jun 18, 2001 at 03:52:46AM -0800, Ethan Benson wrote: On Mon, Jun 18, 2001 at 12:43:41PM +0200, Philipp Schulte wrote: Ok, so just do make sure: http://www.lids.org/lids-howto/node53.html is claiming that CAP_SYS_RAWIO allows access to raw block devices. they are mistaken.

Re: A question about Knark and modules

2001-06-18 Thread Christian Jaeger
At 5:55 Uhr +0200 18.6.2001, Ethan Benson wrote: On Mon, Jun 18, 2001 at 03:03:06AM +0200, Christian Jaeger wrote: ... install some special binaries to which you grant many permissions. the thing is once you make exceptions for the system adminsistrator to use to maintain the you open the

Re: A question about Knark and modules

2001-06-18 Thread Ethan Benson
On Mon, Jun 18, 2001 at 06:41:59PM +0200, Christian Jaeger wrote: Well, if the 'apt-get update apt-get upgrade' wrapper doesn't take any input and resets the environment (is there anything else it should take care of?) then even if called by the cracker it wouldn't do anything else than

Re: A question about Knark and modules

2001-06-18 Thread Ben Harvey
On Sun, Jun 17, 2001 at 07:55:40PM -0800, Ethan Benson wrote: a bit. lids makes system adminsitration utterly impossible. unless you leave enough holes open which an attacker can use to bypass it all. well nearly... at least you can prevent new or unknown process/files from acessing

Re: A question about Knark and modules

2001-06-18 Thread Ethan Benson
On Mon, Jun 18, 2001 at 01:27:37AM +, Jim Breton wrote: On Sun, Jun 17, 2001 at 02:44:48AM -0800, Ethan Benson wrote: compiling without module support would be mostly the same as just lcap CAP_SYS_MODULE Fwiw, I have heard (though not tested myself) that even if you compile

Re: A question about Knark and modules

2001-06-18 Thread Peter Cordes
I like the package signing idea. That would be cool. That way, you could still load and unload modules. I like being able to do that. One obvious problem with the scheme is that an attacker could potentially read the keys from /boot/vmlinuz-2.4.5, or whatever, and sign their own module. This

Re: A question about Knark and modules

2001-06-18 Thread Ethan Benson
On Mon, Jun 18, 2001 at 01:38:16AM -0300, Peter Cordes wrote: I like the package signing idea. That would be cool. That way, you could still load and unload modules. I like being able to do that. One obvious problem with the scheme is that an attacker could potentially read the keys from

Re: A question about Knark and modules

2001-06-18 Thread Philipp Schulte
On Sun, Jun 17, 2001 at 10:42:17PM -0800, Ethan Benson wrote: you would need to fix filesystem immutability and block device access as well. currently lcap CAP_LINUX_IMMUTABLE is useless since there is no way to deny root the ability to write directly to /dev/hda* and remove the immutable

Re: A question about Knark and modules

2001-06-18 Thread Peter Cordes
On Sun, Jun 17, 2001 at 10:42:17PM -0800, Ethan Benson wrote: On Mon, Jun 18, 2001 at 01:38:16AM -0300, Peter Cordes wrote: I like the package signing idea. That would be cool. That way, you could still load and unload modules. I like being able to do that. One obvious problem with the

Re: A question about Knark and modules

2001-06-18 Thread Ethan Benson
On Mon, Jun 18, 2001 at 08:56:03AM +0200, Philipp Schulte wrote: On Sun, Jun 17, 2001 at 10:42:17PM -0800, Ethan Benson wrote: you would need to fix filesystem immutability and block device access as well. currently lcap CAP_LINUX_IMMUTABLE is useless since there is no way to deny root

Re: A question about Knark and modules

2001-06-18 Thread Ethan Benson
On Mon, Jun 18, 2001 at 04:02:08AM -0300, Peter Cordes wrote: You need to keep it somewhere if you ever want to build more modules that that kernel will load. I don't know why I assumed it would be stored in the kernel image. it could be a separate file, encrpyted (like gpg private keys)

Re: A question about Knark and modules

2001-06-18 Thread Philipp Schulte
On Mon, Jun 18, 2001 at 12:35:13AM -0800, Ethan Benson wrote: chattr +i and +a cannot be set or removed if CAP_LINUX_IMMUTABLE is removed from the bounding set. however that does not prevent root from messing with /dev/hda* directly, niether does CAP_SYS_RAWIO. there is no capability

Re: A question about Knark and modules

2001-06-18 Thread Ethan Benson
On Mon, Jun 18, 2001 at 12:43:41PM +0200, Philipp Schulte wrote: On Mon, Jun 18, 2001 at 12:35:13AM -0800, Ethan Benson wrote: chattr +i and +a cannot be set or removed if CAP_LINUX_IMMUTABLE is removed from the bounding set. however that does not prevent root from messing with

Re: A question about Knark and modules

2001-06-18 Thread Philipp Schulte
On Mon, Jun 18, 2001 at 03:52:46AM -0800, Ethan Benson wrote: On Mon, Jun 18, 2001 at 12:43:41PM +0200, Philipp Schulte wrote: Ok, so just do make sure: http://www.lids.org/lids-howto/node53.html is claiming that CAP_SYS_RAWIO allows access to raw block devices. they are mistaken. Well,

Re: A question about Knark and modules

2001-06-18 Thread Christian Jaeger
At 5:55 Uhr +0200 18.6.2001, Ethan Benson wrote: On Mon, Jun 18, 2001 at 03:03:06AM +0200, Christian Jaeger wrote: ... install some special binaries to which you grant many permissions. the thing is once you make exceptions for the system adminsistrator to use to maintain the you open the

Re: A question about Knark and modules

2001-06-18 Thread Ethan Benson
On Mon, Jun 18, 2001 at 06:41:59PM +0200, Christian Jaeger wrote: Well, if the 'apt-get update apt-get upgrade' wrapper doesn't take any input and resets the environment (is there anything else it should take care of?) then even if called by the cracker it wouldn't do anything else than

Re: A question about Knark and modules

2001-06-17 Thread Juha Jäykkä
lcap CAP_SYS_MODULE CAP_SYS_RAWIO which will disable module loading entirely as well as access to /dev/mem (which can be just as dangerous as a kernel module and would bypass your signed module thing nicely). Which means: so long, X. I have a workstation and using X in, naturally,

Re: A question about Knark and modules

2001-06-17 Thread Sjarn Valkhoff
lcap CAP_SYS_MODULE CAP_SYS_RAWIO Thanks for the input. Two points: 1. I coming at this problem as a laptop user so pcmcia modules must remain and be loadable and unloadable at will - as far as I know, there is no direct way to compile pcmcia modules directly into the kernel like the other

Re: A question about Knark and modules

2001-06-17 Thread Ethan Benson
On Sun, Jun 17, 2001 at 01:54:14PM +0200, Sjarn Valkhoff wrote: lcap CAP_SYS_MODULE CAP_SYS_RAWIO Thanks for the input. Two points: 1. I coming at this problem as a laptop user so pcmcia modules must remain and be loadable and unloadable at will - as far as I know, there is no direct

Re: A question about Knark and modules

2001-06-17 Thread Christian Jaeger
Hello Do you know about LIDS (www.lids.org)? It also gives the ability to play with CAP's, but seems much more sophisticated. I've just subscribed to this list. Has LIDS been discussed here before? I'm interested in using it, but am not sure how to use it best. In fact I currently think it's

Re: A question about Knark and modules

2001-06-17 Thread Ethan Benson
On Mon, Jun 18, 2001 at 03:03:06AM +0200, Christian Jaeger wrote: Hello Do you know about LIDS (www.lids.org)? It also gives the ability to play with CAP's, but seems much more sophisticated. I've just subscribed to this list. Has LIDS been discussed here before? a bit. lids makes

Re: A question about Knark and modules

2001-06-17 Thread Peter Cordes
I like the package signing idea. That would be cool. That way, you could still load and unload modules. I like being able to do that. One obvious problem with the scheme is that an attacker could potentially read the keys from /boot/vmlinuz-2.4.5, or whatever, and sign their own module. This

Re: A question about Knark and modules

2001-06-17 Thread Juha Jäykkä
lcap CAP_SYS_MODULE CAP_SYS_RAWIO which will disable module loading entirely as well as access to /dev/mem (which can be just as dangerous as a kernel module and would bypass your signed module thing nicely). Which means: so long, X. I have a workstation and using X in, naturally, necessary

Re: A question about Knark and modules

2001-06-17 Thread Ethan Benson
On Sun, Jun 17, 2001 at 01:21:45PM +0300, Juha Jäykkä wrote: lcap CAP_SYS_MODULE CAP_SYS_RAWIO which will disable module loading entirely as well as access to /dev/mem (which can be just as dangerous as a kernel module and would bypass your signed module thing nicely). Which means:

Re: A question about Knark and modules

2001-06-17 Thread Sjarn Valkhoff
lcap CAP_SYS_MODULE CAP_SYS_RAWIO Thanks for the input. Two points: 1. I coming at this problem as a laptop user so pcmcia modules must remain and be loadable and unloadable at will - as far as I know, there is no direct way to compile pcmcia modules directly into the kernel like the other

Re: A question about Knark and modules

2001-06-17 Thread Ethan Benson
On Sun, Jun 17, 2001 at 01:54:14PM +0200, Sjarn Valkhoff wrote: lcap CAP_SYS_MODULE CAP_SYS_RAWIO Thanks for the input. Two points: 1. I coming at this problem as a laptop user so pcmcia modules must remain and be loadable and unloadable at will - as far as I know, there is no direct

Re: A question about Knark and modules

2001-06-17 Thread Christian Jaeger
Hello Do you know about LIDS (www.lids.org)? It also gives the ability to play with CAP's, but seems much more sophisticated. I've just subscribed to this list. Has LIDS been discussed here before? I'm interested in using it, but am not sure how to use it best. In fact I currently think

Re: A question about Knark and modules

2001-06-17 Thread Jim Breton
On Sun, Jun 17, 2001 at 02:44:48AM -0800, Ethan Benson wrote: compiling without module support would be mostly the same as just lcap CAP_SYS_MODULE Fwiw, I have heard (though not tested myself) that even if you compile your kernel _without_ loadable module support, you will still be able

Re: A question about Knark and modules

2001-06-17 Thread Ethan Benson
On Mon, Jun 18, 2001 at 03:03:06AM +0200, Christian Jaeger wrote: Hello Do you know about LIDS (www.lids.org)? It also gives the ability to play with CAP's, but seems much more sophisticated. I've just subscribed to this list. Has LIDS been discussed here before? a bit. lids makes

A question about Knark and modules

2001-06-16 Thread Sjarn Valkhoff
How feasable would it be to digitally sign kernel modules? Using a trusted local private key, a module could be signed at compile time. The kernel could be patched to disallow any unsigned modules from loading. I have no idea if this is technically possible, but Knark seems to be a persistent

Re: A question about Knark and modules

2001-06-16 Thread Ethan Benson
On Sat, Jun 16, 2001 at 07:43:38PM +0200, Sjarn Valkhoff wrote: How feasable would it be to digitally sign kernel modules? Using a trusted local private key, a module could be signed at compile time. The kernel could be patched to disallow any unsigned modules from loading. I have no idea if