[comp.sys.att] Security on the 3B1

cks@ziebmef.uucp (Chris Siebenmann) (06/20/88)

In article <9300074@bradley> tychan@bradley.UUCP writes:
>Steve Kosloske writes:
>>  I just got my 7300 shipped to me, and am trying to get it set up to run
>>  as a multi user system. I've got a lot of the files that I dopn't want 
>>  people to mess with locked out, but I'm having problems with 'su'
>>  
>>  Is it possible to put a password on 'su' so everyone can't become the super
>>  user, or should I just chmod the program to 4700?

 You should always give root a password (along with various other
unsecured accounts, notably install, uucpadm, and nuucp/uucp).
However, there's a lot more to do than just that. First, go through
the system looking for world-writeable directories; most of them
don't want to be, needless to say. Second, ditch the ua just about
completely; I made a new group 'ua', and made all the ua stuff mode
750, group ua. You'll have to ditch 'cu' to make /usr/spool/uucp mode
775, btw (no great loss; replace it with pcomm, which was designed to
run setgid).

 While you're at it, you'll probably want to fix miscellaneous
stupidities, like the ownership of /usr/lib/uucp/* and
/usr/spool/uucp/*, and the uucp permissions (note that uucpadm and
uucp actually have the same uid; this is easy to change, well worth
it, and only breaks one thing I'm aware of ('uustat -c' wants you to
be either uucp or root, grr)). Depending on what you're using the
floppy drive for, you may also want to restrict access to it, since
the system is perfectly happy to format a mounted floppy.  You'll also
want to stick a 'umask 022' into /etc/rc somewhere (I picked right
after the first setting of TZ). 
 
 As you can see, I'm running my system multi-user, and it does work.
It takes a fair amount of work to set up and beat all the stupidities
out, but it's worth it. You end up with a system you're much more
confident of (I've always been amazed at just how unsecure an
off-the-floppy 3B1 really is ... I mean, /etc as mode 777? gak). 

-- 
	But he said leave me alone I'm a family man
	And my bark is much worse than my bite
Chris Siebenmann		uunet!utgpu!{ontmoh!moore,ncrcan}!ziebmef!cks
cks@ziebmef.UUCP	     or	.....!utgpu!{,ontmoh!,ncrcan!brambo!}cks

kak@hico2.UUCP (Kris A. Kugel) (03/05/90)

For the most part, I believe most of the 3b1/7300 owners
out there have fixed the most blatent security holes on
their systems (logins without passwords, and *VERY* serious
permissions holes)

I recently restored my 3B1 from scratch, and typed (by hand)
a security audit shell program from the book, "UNIX SYSTEMS SECURITY".

Given the time and effort it took to type and debug the damn
thing in, it seems to me that I could save some other poor souls
the effort by making some kinda information available.

Now, I can:
1. post the results of the security audit to the world
   (possibly creating awareness of the holes to those
    we would rather stay ignorant, and before the holes can be fixed)
2. post the security auditing program (probably violating copyright)
3. mail the results to anybody who requests them
  (assumes some kinda tracking of who gets it is better than nothing,
   not all that much safer, and a pain in the butt for me)

Seems to me we already had something like this discussion, but I forgot
the concensus opinion (if there was one).
I'm kinda leaning towards #1 myself.  Any opinions?

                               Kris A. Kugel
                              (201) 842-2707
       {uunet,att,rutgers}!westmark            <--daily
{ssbn,zorch,zinn,ditka,daver,attdso}           <--semi-daily
	                    {wldrdg}!hico2!kak <--maybe
	                  {stc-auts}           <--seems dead for 9600

levin@magnus.Hotline.Com (Michael M Levin) (03/06/90)

In article <200@hico2.UUCP> kak@hico2.UUCP (Kris A. Kugel) writes:
>For the most part, I believe most of the 3b1/7300 owners
>out there have fixed the most blatent security holes on
>>.......
>Given the time and effort it took to type and debug the damn
>thing in, it seems to me that I could save some other poor souls
>the effort by making some kinda information available.

	I think that since you went to all the trouble, it would be a
	shame for it to go to waste.  

>Now, I can:
>
>****2. post the security auditing program (probably violating copyright)****
>


	I like #2 myself.  I think that you should check it out, and find
	out if there is indeed any problem.  Another thought is, just send
	it (via email) to those sites who request it.  Is there a specific
	copyright prohibiting electronic images?  If so, you may have already
	violated it.  If not, then there wouldn't be a problem (provided,
	of course, you give credit where it's due).

	If you find that there isn't ANY way to implement option 2, without
	endangering yourself, then I suppose that your first or third choices
	will have to do.


		I VOTE FOR # 2 !!!!



					Mike Levin

-- 
 _            _           
| | ___  ___ |_| ___   Michael Levin     SilentRadio Headquarters- Los Angeles
| |/ ._\| | || ||   \  20732 Lassen Street,    Chatsworth  CA  91311    U.S.A.
|_|\___/ \_/ |_||_|_|  E-Mail: levin@Hotline.Com  {att|csun|srhqla}!magnus!mml

kak@hico2.UUCP (Kris A. Kugel) (03/09/90)

In article <200@hico2.UUCP>, kak@hico2.UUCP (Kris A. Kugel) writes:
> Now, I can:
> 1. post the results of the security audit to the world
>    (possibly creating awareness of the holes to those
>     we would rather stay ignorant, and before the holes can be fixed)

	So far, I've only gotten one objection to this suggestion.
	If anybody is nervous about this, I'd like to point out
	that this program isn't reporting the subtle holes,
	rather it finds more blatant holes on the one hand,
	and gives suggestions for possible holes on the other.
	(like reporting all suid and sgid files)

> 2. post the security auditing program (probably violating copyright)

	If somebody comes up with a contact point for the authors,
	I'll post it if they say ok.  This was a popular suggestion,
	but I've decided I'll give the authors the same consideration
	that I'd want.  I won't have time to track them down immediately.

> 3. mail the results to anybody who requests them
>   (assumes some kinda tracking of who gets it is better than nothing,
>    not all that much safer, and a pain in the butt for me)

	I won't have time for this.
> 

Sorry for the delays in responding, I will send approprite mail, etc.
when I get back from out-of-town after this weekend.

                                Kris A. Kugel
                               (201) 842-2707
        {uunet,att,rutgers}!westmark            <--daily
 {ssbn,zorch,zinn,ditka,daver,attdso}           <--semi-daily
 	                    {wldrdg}!hico2!kak <--maybe
 	                  {stc-auts}           <--seems dead for 9600

P.S. to s5000!gh - the last mail I sent to your machine
(on a different subject) got bounced.
	-Kris