Fwd: Re: Fwd: What is the best free HIDS for Debian

2022-05-13 Thread estellnb
Michael Lazin had published a private email between me an Sylvain 
Sécherre. It means he is an NSA guy, since he had access to a wiretapped 
conversation.


https://lists.debian.org/debian-security/2022/05/msg00018.html

 Originalnachricht 
Betreff: Re: Fwd: What is the best free HIDS for Debian
Datum: 12.05.2022 12:53
Von: Sylvain Sécherre 
An: Elmar Stellnberger 



Dear Elmar,

Don't worry about this, feel free to cite me if you want, even if it was
a private mail.

However, I'd prefer posting on usenet because it's a sharing attitude!
So, if you don't mind, let's continue this topic on
linux.debian.security.

Best regards,

Sylvain
-

Le 11/05/2022 à 18:45, Elmar Stellnberger a écrit :


Dear Sylvain

When you first wrote to me asking for help I saw that the email was
only addressed to me and I wanted to keep our conversation
confidential. However then I got the email I am forwarding you now
from below cited by Miachel Lazin (read here:
https://lists.debian.org/debian-security/2022/05/msg00018.html)
publicly on the list so that I got to believe that you had
intentionally made the conversation public. Now I have checked the
email in my Inbox again and the headers say that I am the only
addresse, if there was no BCC by you. If your writings were public, so
why did I keep my own ones confidential then? When I noticed I re-sent
my emails with the same sending date of before but now also to
debian-security@lists.debian.org.
The more I think about it, the more I am prone to believe that
Michael Lazin could be an NSA guy who has published a mail, which both
of us wanted to keep confidential. If this has happened, please excuse
my re-sending of our private emails publicly to the debian-security
list! If I err in what I have started to believe now, please do also
clarify that for me.

to put it in short: An email adressed privately to me has appeared on
the debian-security list, and if you haven´t used BCC to yield this,
then it means that M.L. was the one who has wiretapped and published
an email meant to be confidential. If he did and I have made emails
public because of this which you didn´t want to have public, then my
sincere excuse for what has happened here!

Best Regards,
Elmar

 Forwarded Message 
Subject: Re: What is the best free HIDS for Debian
Date: Sun, 8 May 2022 16:51:46 +0200
From: Sylvain Sécherre 
To: Elmar Stellnberger 

Dear Elmar,

Thank you for your help. I really appreciate very much.

I thought a lot about your answer and I feel a bit tricky... I
understand what you're writing but I don't know how to do this.

Do you think I can simply get rid of these rootkit? I've tried to move
the file "crontab" in a safe place and then reinstall the package
cron. The new "crontab" file seems to be the same as the previous
since the md5 are equal, but debcheckroot still throws an error for
it...

Regards

Sylvain







Le 06/05/2022 à 16:13, Elmar Stellnberger a écrit :
Dear Sylvain

The next thing I would do is create a timeline. Mount the partition
with noatime so that access times are preserved as they are on new
file operations and then let find output access, modification and
creation time of all files. Look on when these three executables have
been modified/created and then search back on what has happened at the
earliest time right before the rootkit has been installed. Once I
analysed a system of mine like this and found out that some suspicious
files had been uploaded in the ~/.skype directory. If I remember back
I think I had used vim for it but it should also be possible to use
sth. like sort.

Regards
E.

Am 06.05.22 um 15:52 schrieb Elmar Stellnberger:
Dear Sylvain

Am 04.05.22 um 13:17 schrieb Sylvain:
I've just tried debcheckroot too. It throws error. I'll try to fix
them.

Am 06.05.22 um 15:05 schrieb Sylvain Sécherre:

Here's the fileserror.lis:
..._.GM /usr/bin/crontab cron_3.0pl1-137_amd64 root root 755
..._..M /usr/bin/pkexec policykit-1_0.105-31+deb11u1_amd64 root

root 755

..._.GM /usr/bin/ssh-agent openssh-client_1:8.4p1-5_amd64 root root

755

...


I hope you won´t mind that I am citing the output of debcheckroot
you have given me.
These three files point to an infection with a rootkit. Don´t care
about modified configuration files like in /etc too much (but you may
still have a look at them). Executable files on the other hand must
never be modified. If these three files are different it means that
someone has altered your system. If you look at the man pages of these
executables then you also know that a maker of a rootkit would have
interest to modify exactly these files.


The file filesunverified.lis is very long, while pkgcorrupt.lis is

empty.

If you have updated your system some time ago and there are newer
versions on the update server now then debcheckroot can certainly not
find these packages any more. You could try to 

Re: What is the best free HIDS for Debian

2022-05-08 Thread estellnb

Am 08.05.2022 20:43, schrieb estel...@elstel.org:

P.S.: A memory only rootkit would still need a hook to reinstall on a
fresh boot.


  Yes I know it is an issue. Debcheckroot does f.i. not check you 
initrd. To fix this issue I would need to program an own piece of 
software like debcheckinitrd. Anyone who wants to support me can do 
this: https://www.elstel.org/Contact.html. I am a free developer and I 
do not get paid for my open source related work.




Re: What is the best free HIDS for Debian

2022-05-08 Thread estellnb

Am 08.05.2022 20:48, schrieb Michael Lazin:

SELinux was made by the NSA but it open source, anyone can review the
source code, this is part of what makes open source software reliable,
it gets seen by many eyes, and even if you don’t review every line
of code yourself you have a web of trust that someone has reviewed it,
and it is strengthened by key signing which is more common in the
Debian community.  Thank you.

Michael Lazin



  If you talk about SELinux then let me talk about the times when 
Apparmor was not a default component to be installed, when I was 
creating and sharing Apparmor profiles to keep this technology 
supported. Sure, I have also read into SELinux. It can offer a better 
level of security, but it is more difficult to create profiles for it.
  The thing about rkhunter as I learned to know it was that it can only 
detect known rootkits. So who is adding NSA rootkits then? I am sure the 
NSA knows to prevent this. It would be nice to know about the circle of 
people who add rootkit descriptions/ detection code. Any way, if they 
have written the software, they will always know about the quirks and 
intricacies to avoid detection when it comes for them  to deploy their 
own rootkits.




Re: What is the best free HIDS for Debian

2022-05-08 Thread estellnb
Am 08.05.22 um 20:21 schrieb Michael Lazin:> I think if you have a root 
kit it is very unlikely to get rid of it

without backing up and reimaging but you may be able to achieve it if
you try first rkhunter and second apparmor which is similar to selinux
which was developed by the nsa and made accessible as a Red Hat
package.  Both solutions have the ability to limit what root can do and
is your only real option for saving a rooted system.  It is important
that if you try this that you dump your memory rkunter picks up a 
memory

anomaly.  Fileless malware is popular among sophisticated threat actors
and rkhunter is equipped to find malware that resides in memory.
Apparmor is included in Debian.

Thanks,
Michael Lazin
  Yes, it would be really interesting if rkhunter has also found the 
rootkit. If it was developed by the NSA, I am sure it would not find a 
rootkit used by the NSA. To my knowledge Apparmor was first developed as 
part of openSUSE. I can remember having filed them a report with the 
quest to keep Apparmor as it is more easy to use than SELinux.


Elmar

P.S.: A memory only rootkit would still need a hook to reinstall on a 
fresh boot.




Fwd: Re: arbitrary code execution on unformatted usb stick

2020-05-02 Thread estellnb

I am forwarding you this email in the hope that it will be useful:
(They simply could not have known what reason I was installing mininet 
for and that I would try to install it at all if they would not have 
observed what I was doing even if they would have supposed that I wanna 
continue on a̅tea. Besides this kind of live-blocking every step that 
would be useful to achieve my goal is noteable on a computer that I 
believed to be totally clean in the time before. That was how things 
started to uncover.)


 Originalnachricht 
Betreff: Re: arbitrary code execution on unformatted usb stick
Datum: 02.05.2020 18:22
Von: estel...@elstel.org
An: vi...@vheuser.com

Dear Vince

  I in deed mean that they have an internet connection channel for this 
offline computer. The computer does not have Wifi nor a LAN cable. What 
they were doing can not be explained by other means. I wonder how they 
transfer the data between the internet and that computer that should be 
separated physically from the internet. What I have observed can not be 
explained by malware unleashed at the time I have last plugged an USB 
stick.


Elmar

Am 02.05.2020 18:16, schrieb vi...@vheuser.com:

Yes, I know the article and the long history building up that
capacity.  You may recall I backed you up on the DANE support
discussion.  What you are developing is a reliable secure software
system.

The problem of compromised hardware is a different problem. Intel
builds back door circuits for NSA into their chips So I don't think
you'll build a laptop from them that NSA can't compromise.

Unless you are engaging in international espionage or blowing the
whistle on them like Eric Snowden, I don't think they will compromise
their systems on low value targets.  In that case, it doesn't make
much difference that they can get in, does it?

On the other hand, a working DANE system can be used to keep our
conversation between us against most others except NSA and that alone
is worth something.  Isn't it?  Debian Security list members can't do
must about compromised hardware except be aware of it






Re: Scripts that run insecurely-downloaded code

2020-05-02 Thread estellnb

I've seen this before with Firefox.  Basically Firefox has disabled
weaker certificates from
working, where Chrome and IE still accept ones with 128bit encryption,
they do show an error (at
least in Chrome) if you dig into the SSL debug screen.  Firefox just
refuses to view it.


  Ah, I have read somewhere on the internet that AES-256 would be less 
secure than AES-128 because the AES algorithm has been designed for 
128bit.




Fwd: Re: AW:webhosting mit DANE

2020-05-02 Thread estellnb
  I have decided to not only forward but now also translate the 
following email for you. A conversation with someone I know from here 
made me believe that you would understand things better if you knew the 
content of that email:


 Weitergeleitete Nachricht 
Betreff: Re: AW:webhosting mit DANE
Datum: Thu, 16 Apr 2020 21:22:20 +0200
Von: estel...@elstel.org
An: Lars-Helge Wilbrandt 

Am 14.04.2020 22:26, schrieb Lars-Helge Wilbrandt:
What I would be interested in is if that only concerns you or if other 
people

are simply too stupid to notice that?

Best Regards

Lars-Helge Wilbrandt



Dear Mr. Lars-Helge Wilbrandt

Now, that is a long story. The first time they have cracked my 
computer was in May 2008: "Oh what do we have here? Wordbook 
German-Portuguese. Haha, we gonna delete it now!". Two people with very 
German pronunciation have been talking to me via the PC speaker. They 
have also controlled my mouse pointer. By now I am sure that they have 
cracked my computer because of my love. My homepage www.elstel.org did 
not exist at that time and thus also no environmental or 
security-technical engagement like now. That could have been a reason 
for cracking my computer but that time it was not. Unfortunately I did 
not understand everything they have told me. Something must have 
hindered me to understand them.
I had to suffer from recurrent cracks in the years to come. I had no 
idea how they could crack into my computer and I kept installing my 
system new over and over again which has cost me a lot of time. Once I 
had inferenced from the installation timeline that they must have come 
in via Skype but not installing Skype did not improve anything.
A new milestone has come with my visit to South America in 2011 (You 
can still find traces from then in the internet). I had a fresh 
installation of RedHat with SELinux on my PB mini-notebook. I have 
solely visited the website of my bank for a wire transfer and the 
notebook got thereby cracked. The first and only time I went online with 
that notebook. I could prove that there was a rootkit on that computer 
by installing the exactly same packages again from DVD and by comparing 
file by file. It was good luck that I had not updated the system before 
so that I had all packages available offline. When I had come home I 
developed debcheckroot v1.0. With debcheckroot I could spot another 
rootkit at home. However proving that there was a rootkit did not help 
against becoming infected with a rootkit. A few minutes after installing 
from scratch my system was infected again. Today/ just a few days ago I 
am also still terrorized: They always switch my keyboard layout from 
German to US, they make mouse and keyboard hang, so that I can hardly or 
not at all use them any more. On my notebook keyboard the always switch 
on NumLock so that it outputs numbers instead of letters.
If you gonna ask me what has made the difference, then that there 
was no way for me to give up. Someone else would have stopped to program 
security tools or ended his environment-political engagement to be left 
in peace. However I could and can not give up my love. It is simply not 
possible. It is like a question of suriving or not surviving (Yes it is 
true; they have tried to kill me in South America.).
As I did not have any simple possibility to give up I have gradually 
gained some insight by all of what has happened - to know what would 
need to change so that we could again gain a safer internet. I have 
already experienced a lot: manipulated firmware of my sdcard readers 
which did refuse to read a specific sdcard image which I needed to 
install a clean system. Some other sdcard readers of the same model, 
make and shipment had been locked in a box and they could read the very 
same sdcard well. Is it really that simple: Buy a padlock? You have to 
have a good mood if you meet some people who would tell you that secret 
services can open any lock by special applicances. However I have reason 
to believe that these are lies and that there has been another reason 
why they got into another padlock. I do not want to tell more about it 
since this will be important for the survival of my computing.
They are coming into my room and manipulate my computers. The first 
time I knew it, it had happened in 2011 as I was running my PB notebook 
only offline any more to analyze the rootkit on there. When I came home 
one day I have encountered the partition table of the notebook to be 
deleted. On resume from s2ram they have shown me an octopus. Today they 
have become more violent: They are making my computers fully unusable.
Some years ago I have sent blue ray images with provably cracked 
systems to some respective organizations so that someone independent 
could verify what has happened. Up to now I have received no response. I 
would think they have finally been shut up or why would I not be of 
value for a response? The only ones 

Re: Scripts that run insecurely-downloaded code

2020-05-02 Thread estellnb

Am 02.05.2020 00:51, schrieb Marcus Dean Adams:

It's better than nothing. Even if somebody were using self signed
certificates that aren't publicly trusted, the information would still
be encrypted in transit. Whether the other end is trustworthy is
another issue and up to the user and package maintainers to decide,
but it would, at the very least, make it more difficult for a third
party to manipulate the information between the intended endpoints.


  Yes, I agree. With https you can only make man-in-the-middle when the 
connection is established with http you can hijack the connection any 
time. Besides this https is for sure the way to go when you are using (a 
possibly unencrypted) Wifi. It prevents people around you from 
interfering with your internet connection. For the normal user you can 
not hijack a wired LAN connection unless you would hack into ISP or root 
servers. In a country which can wiretap its citizens connections but 
does not afford to bribe certification authorities the system as we have 
it now is also a protection. I just thought of the average use case 
where a build server in Europe or the US is cabled via LAN.




Re: Scripts that run insecurely-downloaded code

2020-05-02 Thread estellnb



Am 02.05.2020 02:53, schrieb Paul Wise:

On Fri, May 1, 2020 at 8:18 PM Rebecca N. Palmer wrote:


This is already policy (and enforced by blocking network access) for
official Debian package builds: dependencies must be installed by the
package manager, not the build script.


Correction: the debian.org buildds do not at this time block any
network access. The main issue is that schroot does not support it and
it has been orphaned and unmaintained for years. You might be thinking
of pbuilder, which does do this by default.


 I still remember the times when xchroot was a candidate and schroot did 
not yet exist. I still used to maintain it with features like 
Xorg-chroot and chroot as user 
(https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721447, 
https://www.elstel.org/xchroot/). The problem about it that time was 
that it was not yet GPLv3.




Re: Scripts that run insecurely-downloaded code

2020-05-02 Thread estellnb




Am 02.05.2020 10:14, schrieb Davide Prina:

On 01/05/20 22:00, Rebecca N. Palmer wrote:

On 01/05/2020 20:31, Elmar Stellnberger wrote:
https isn´t any more secure than http as long as you do not have a 
verifiably trustworthy server certificate that you can check for. As 
we know the certification authority system is totally broken.


Imperfect yes, but still better than nothing.


There is another problem: implementation. Not all the software that
implement HTTPS verify the validity of the certificate and the
validity of all the certification chain.

For example where I work has been invalidated a certificate, but for
mistake the new valid one was not loaded on a https site.



What do you mean by loaded on a https site? That the web server of the 
site uses the certificate? Wasn´t there a CA for the new site?



With Debian

and Firefox I cannot access that site (I get "the certificate is not
valid" or something similar), but other people, that use another OS,
can access it with internet explorer and chrome, but not with Firefox.

Ciao
Davide




Fwd: Re: whonix.org DNSSEC/DANE

2020-03-13 Thread estellnb

Dear readers of the debain-security mailing list

  I have recently described on how to set up a secure emailing terminal 
at https://www.elstel.org/DANE/. Since then I have got dozens of replies 
from people who said that they did not receive my emails before, not 
even in the spam folder. There are only two people whom I could still 
not reach. One of them is Patrick Schleizer. He normally always responds 
to me but I know he is reading debian-security and that is why I have 
decided to write you today. The email was on how easy it is to enable 
DANE for a custom domain: enable DNSSEC and provide a TLSA record. The 
other contact is Claudio Guarnieri. He also works in a security related 
context. He appears not to have received my emails though I sent out the 
same email a dozen of times.


Yours Sincerely,
Elmar Stellnberger

 Originalnachricht 
Betreff: Re: whonix.org DNSSEC/DANE
Datum: 08.03.2020 07:55
Von: estel...@elstel.org
An: Patrick Schleizer 


Am 29.12.2019 10:43, schrieb Elmar Stellnberger:

Hallo Patrick

  Also wenn deine Domain DNSSEC unterstützt, dann ist DANE Support
watscheneinfach zu haben:
https://ssl-tools.net/tlsa-generator

Ich verwende immer DANE-EE & Use full certificate. Das ist auf der
Kommandozeile am einfachsten zu überprüfen. Mein TLSA Eintrag sieht
dann folgendermaßen aus:

$ drill m.root-servers.net +trusted-key=/usr/share/dns/root.key
+topdown +sigchase TLSA _443._tcp.elstel.org | egrep -v "^$|^;"
_443._tcp.elstel.org.   19819   IN  TLSA3 0 1
a8edf0cacaf776acacdfe53564c51556ad325f03a369e4c8f4622b4dc5b06865

siehe auch:
https://www.iana.org/assignments/dane-parameters/dane-parameters.xhtml

so geht es auch:
dig @$dns +trusted-key=/usr/share/dns/root.key +topdown +sigchase TLSA
_443._tcp.$1

Gutes neues Jahr und schöne verbleibende Festtage wünscht Dir
Elmar


Am 02.09.19 um 15:55 schrieb Patrick Schleizer:

Elmar Stellnberger:
P.S.: Wie sieht es mit der Unterstützung von DANE auf whonix.org 
aus?

Ich habe gesehen, daß Domain-Provider wie inwx.de inzwischen schon
DNSSEC/DANE unterstützen.



DNSSEC sieht gut aus.

https://dnssec-debugger.verisignlabs.com/whonix.org

DANE: noch nicht

Generell:

https://www.whonix.org/wiki/Privacy_Policy_Technical_Details

Naja, ist halt ein Hetzner Server. Nichts gegen Hetzner, aber viel
Sicherheit kann man heutzutage von keinem Serveranbieter erwarten.



 Originalnachricht 
Betreff: Re: analysis of a complete rootkit
Datum: 08.03.2020 07:54
Von: estel...@elstel.org
An: Nex 

Dear Claudio Guarnieri

I just wanted to ask you whether you know about the current mass 
surveillance plaintiff against the BND? The EFF has said it could even 
become a legal precedent for US law. As you care about the analysis of 
rootkits I thought you could be interested. Please respond shortly to my 
email so that I will know whether you have received it. I have sent you 
this email now a dozen of times without getting a reply. Please look at 
https://www.elstel.org/DANE/ and https://www.elstle.org/atea/ and on the 
message I will post on debian-security in some time on how to get a 
secure emailing client. You are one of two contacts who does not 
respond. All others (dozens) have responded me since I have secure DANE 
emailing.


Best Regards,
Elmar