dankg@tornado.Berkeley.EDU (Dan KoGai) (05/28/90)
In article <9000030@m.cs.uiuc.edu> carroll@m.cs.uiuc.edu writes: >---Begin copy--- > Don't you hate it when you leave your password in a .netrc in > a directory of stuff you ftp'ed over from the web. I sure do. > Then anyone can just get your password and delete all of your > files in both accounts. Bummer. >/* End of text from m.cs.uiuc.edu:comp.unix.questions */ >Perhaps I'm missing something, but it doesn't sound like security >violation. I assume that you have a .netrc file with your password >in it. Does FTP check for .netrc specially? If not, then this seems to >claim that you ftp'd the .netrc and it was that copy that was used, >not your 600 .netrc. It might be system dependent but ALL ftp I know refuses to use .netrc with wrong mode. And my Apollo account was not an exception. As soon that message appeared I retested ftp and it refused to use .netrc with group|other bit was set. You can check it out just by chmod-ing your .netrc and see how ftp would work. So in this respect, ftp is very well made--it even tells you your unlocked door. But that Bozo knew another door and .netrc was used just for another account and it's fair assumption my OCF account (this one), at very least is still in danger--things suggest that he at least had capability of anihilating my OCF account and .netrc made situation worse. And he started with screwing around my ocf account, found my .netrc and read it, rlogin/ftp'd to my another account, deleted it and deleted the rest of ocf. So the absense of my password in .netrc could prevent my another account from being anihilated but still this OCF account is still in danger. And this applies to other UNIX and other accounts, too. ---------------- ____ __ __ + Dan The "raped" Man ||__||__| + E-mail: dankg@ocf.berkeley.edu ____| ______ + Voice: +1 415-549-6111 | |__|__| + USnail: 1730 Laloma Berkeley, CA 94709 U.S.A |___ |__|__| + |____|____ + "What's the biggest U.S. export to Japan?" \_| | + "Bullshit. It makes the best fertilizer for their rice"
dce@smsc.sony.com (David Elliott) (05/28/90)
In article <1990May28.102235.10021@agate.berkeley.edu> dankg@ocf.Berkeley.EDU (Dan Kogai) writes: >In article <9000030@m.cs.uiuc.edu> carroll@m.cs.uiuc.edu writes: >>in it. Does FTP check for .netrc specially? If not, then this seems to >>claim that you ftp'd the .netrc and it was that copy that was used, >>not your 600 .netrc. > > It might be system dependent but ALL ftp I know refuses to use >.netrc with wrong mode. Hold on, Dan. I think that carrol@m.cs.uiuc.edu is asking "when going a get or a put, does ftp check for .netrc specially". That is, is it possible that you did a get/put of everything in a directory, and that your .netrc got copied to a new place without being protected? This is what the note you found implied to me as well -- that the "rapist" found a file called .netrc that wasn't mode 0600, and got your password from that file. -- David Elliott dce@smsc.sony.com | ...!{uunet,mips}!sonyusa!dce (408)944-4073 "If I had a hat the size of Oklahoma, I'd be a happy person."
samlb@pioneer.arc.nasa.gov (Sam Bassett RCS) (05/29/90)
Moral of the story: Don't put passwords in your .netrc, dum-dum. (Or anywhere that *anybody* can read 'em -- even you!) (Don't assume it's the sysop, either -- assume that UNIX is *NOT* secure until it is proven otherwise.) Note that I am not condoning snooping and poking by System Administrators -- that is impolite, among other things. I _AM_ taking this kid to task for wasting net bandwidth with anguished (and over-wordy) cries of outrage about something that his teachers should have pointed out to him in his first semester. UNIX was not designed to be secure. It was designed (sic) to make programming and file-handling convenient. If you want something to be secure, either learn something about encryption or *KEEP IT OFF-LINE* Sam'l Bassett, Sterling Software @ NASA Ames Research Center, Moffett Field CA 94035 Work: (415) 604-4792; Home: (415) 969-2644 samlb@well.sf.ca.us samlb@ames.arc.nasa.gov <Disclaimer> := 'Sterling doesn't _have_ opinions -- much less NASA!'
dce@smsc.sony.com (David Elliott) (05/29/90)
In article <6365@amelia.nas.nasa.gov> samlb@pioneer.arc.nasa.gov.UUCP (Sam Bassett RCS) writes: > > Moral of the story: > > Don't put passwords in your .netrc, dum-dum. (Or anywhere that >*anybody* can read 'em -- even you!) (Don't assume it's the sysop, >either -- assume that UNIX is *NOT* secure until it is proven otherwise.) I think that the problem here, Sam, is that the .netrc file is "an attractive nuisance". Not only does the .netrc file give you a place to put a password, the documentation tells you that this feature won't be used if the file is readable by others. In essence, it is saying "it's safe to put passwords here". So, while I agree with most of your moral, I disagree with the "dum-dum". Anyone can be lulled into a false sense of security with the way passwords, permissions, and so forth are documented. -- David Elliott dce@smsc.sony.com | ...!{uunet,mips}!sonyusa!dce (408)944-4073 "If I had a hat the size of Oklahoma, I'd be a happy person."
samlb@pioneer.arc.nasa.gov (Sam Bassett RCS) (05/29/90)
I agree -- the documentation should be more straightforward about the dangers of the .netrc, and for d**n sure, whoever is teaching kids about UNIX should point out the problem -- especially at Berkeley. I retract the "dum-dum" . . . . Sam'l Bassett, Sterling Software @ NASA Ames Research Center, Moffett Field CA 94035 Work: (415) 604-4792; Home: (415) 969-2644 samlb@well.sf.ca.us samlb@ames.arc.nasa.gov <Disclaimer> := 'Sterling doesn't _have_ opinions -- much less NASA!'
lauther@janus.Berkeley.EDU (Ulrich Lauther) (05/29/90)
In article <6368@amelia.nas.nasa.gov> samlb@pioneer.arc.nasa.gov.UUCP (Sam Bassett RCS) writes: > > I agree -- the documentation should be more straightforward about >the dangers of the .netrc, and for d**n sure, whoever is teaching kids I just wonder why not the same technique is used with .netrc as with /etc/passwd: have the file readable, but sensitive parts encrypted? -ulrich ----------------------------------------------------------------- Ulrich Lauther Internet: lauther@janus.berkeley.edu Siemens / UCB ph: +1 415 642 3338 fax: 642 2739
jik@athena.mit.edu (Jonathan I. Kamens) (05/29/90)
In article <36584@ucbvax.BERKELEY.EDU>, lauther@janus.Berkeley.EDU (Ulrich Lauther) writes: |> I just wonder why not the same technique is used with .netrc as with |> /etc/passwd: have the file readable, but sensitive parts encrypted? Because this makes the .netrc file useless for its intended purpose. The .netrc file is meant to save you the effort of typing your password when you ftp to another host, or to allow you to use ftp in a shell script without you there to watch it. At some point, ftp has to be able to send your password in cleartext over the network to the other host (that, in itself, is of course a security hole, but what the hell, it isn't *too* painful to assume that your network is secure :-). An encrypted password simply isn't good enough. If the password in the .netrc file is encrypted with a one-way encryption function, then there is no way to get the cleartext password from the encrypted password string, so it's useless. If it's encrypted with a two-way function for which you provide the key when you do the encryption, then it's still useless for unattended operation, since you have to be there to type the encryption key to get it back. If it's encrypted with a two-way function with the key somewhere on-line, you haven't gained anything, because anybody who can read your protected .netrc can probably also read whereever the key is stored (i.e. you've just introduced another layer of indirection without introducing any added security). In comparison to the .netrc file, the reason that encrypting the sensitive data in the /etc/passwd file works is that the OS never needs to know your cleartext password, except when it prompts you for it (and promptly does a crypt() on it and then throws the cleartext away). Jonathan Kamens USnail: MIT Project Athena 11 Ashford Terrace jik@Athena.MIT.EDU Allston, MA 02134 Office: 617-253-8495 Home: 617-782-0710
montnaro@spyder.crd.ge.com (Skip Montanaro) (05/29/90)
In article <1990May29.022854.22733@smsc.sony.com> dce@smsc.sony.com (David Elliott) writes:
I think that the problem here, Sam, is that the .netrc file is "an
attractive nuisance". Not only does the .netrc file give you a place
to put a password, the documentation tells you that this feature won't
be used if the file is readable by others. In essence, it is saying
"it's safe to put passwords here".
Shouldn't the ftp daemon on the receiving end set the file permissions
pessimistically? On Suns at least, the mode on the receiving end is 666.
(Ultrix appears to set the mode to 644, which for the current discussion is
no better than 666.) If the modes are going to be mangled, I'd rather they
were mangled to 600. The case of ~/.netrc is just one problem. As another
example, mail files often contain sensitive information (like passwords :-).
Having them created mode 666 can be just as damaging.
--
Skip (montanaro@crdgw1.ge.com)
ram@attcan.UUCP (Richard Meesters) (05/30/90)
In article <1990May29.124526.13935@athena.mit.edu>, jik@athena.mit.edu (Jonathan I. Kamens) writes: > In article <36584@ucbvax.BERKELEY.EDU>, lauther@janus.Berkeley.EDU > (Ulrich Lauther) writes: > |> I just wonder why not the same technique is used with .netrc as with > |> /etc/passwd: have the file readable, but sensitive parts encrypted? > > Because this makes the .netrc file useless for its intended purpose. > > The .netrc file is meant to save you the effort of typing your > password when you ftp to another host, or to allow you to use ftp in a > shell script without you there to watch it. > > At some point, ftp has to be able to send your password in cleartext > over the network to the other host (that, in itself, is of course a > security hole, but what the hell, it isn't *too* painful to assume that > your network is secure :-). An encrypted password simply isn't good enough. The point is, however valid. If you are going to use a .netrc, why cant it be more like the passwd system. This merely means that the ftp program must provide the facilities for encryption/decription of the password, rather than leaving it up to the user to do so himself. Using a .netrc, or any type of script to save the effort of typing in a password when going between systems is not only lazy but stupid. The idea of a password is, after all to provide a measure of security to your data, and the system. Automating the process negates any good effect this might have. One other point. I'm not too sure, but since Dan was burned twice, is it true then that he must have had the same password combination used for several different machines (or at least two). Couldn't the damage have been minimalized by having different .netrc/passwords for each machine? Regards, ------------------------------------------------------------------------------ Richard A Meesters | Technical Support Specialist | Insert std.logo here AT&T Canada | | "Waste is a terrible thing ATTMAIL: ....attmail!rmeesters | to mind...clean up your act" UUCP: ...att!attcan!ram | ------------------------------------------------------------------------------
karish@mindcrf.UUCP (05/30/90)
In article <MONTNARO.90May29111606@spyder.crd.ge.com> montanaro@crdgw1.ge.com (Skip Montanaro) writes: >Shouldn't the ftp daemon on the receiving end set the file permissions >pessimistically? On Suns at least, the mode on the receiving end is 666. >(Ultrix appears to set the mode to 644, which for the current discussion is >no better than 666.) If the modes are going to be mangled, I'd rather they >were mangled to 600. The case of ~/.netrc is just one problem. As another >example, mail files often contain sensitive information (like passwords :-). >Having them created mode 666 can be just as damaging. The receiving-end ftp daemon should set file access modes using the system's default umask. If a file contains sensitive data, it should be restored into a directory with secure access modes and kept there until the file's access modes can be corrected. This is all under the control of the user. If you want a more user-friendly utility for this purpose, use 'rcp', which preserves modes. -- Chuck Karish karish@mindcraft.com Mindcraft, Inc. (415) 323-9000
defaria@hpclapd.HP.COM (Andy DeFaria) (05/30/90)
>/ hpclapd:comp.unix.questions / jik@athena.mit.edu (Jonathan I. Kamens) / 5:45 am May 29, 1990 / > At some point, ftp has to be able to send your password in cleartext >over the network to the other host (that, in itself, is of course a >security hole, but what the hell, it isn't *too* painful to assume that >your network is secure :-). An encrypted password simply isn't good enough. I'm no security guru on Unix but it seems to me that the way around this problem would be to remove this silly restriction and allow ftp (and others?) to send encrypted passwords to the other host.
jik@athena.mit.edu (Jonathan I. Kamens) (06/01/90)
In article <11513@vpk1.UUCP>, ram@attcan.UUCP (Richard Meesters) writes: |> The point is, however valid. If you are going to use a .netrc, why cant it be |> more like the passwd system. This merely means that the ftp program must |> provide the facilities for encryption/decription of the password, rather than |> leaving it up to the user to do so himself. First of all, the ftp protocol doesn't say, "Two machines talking to each other using the protocol must both be Unix machines that use a standard crypt() function for password verification." What it says is that there is a protocol command to send a password from the client to the server, and that server may use the password for verification in whatever way it chooses. Therefore, the ftp program can't "provide the facilities for encryption/decription [sic] of the password", because it has no idea what type of encryption the server at the other end is going to be expecting. Second, if the client is supposed to do password encryption, then what's to stop me from logging into your machine, grabbing your encrypted password string from the /etc/passwd file, then ftp'ing back to the same machine with a hacked ftp client which sends that encrypted string as the password? The ftp server says, "Gee, look, you've sent me the correct encrypted password!" and goes right ahead believing that I'm you. The security of the ftp password (well, at least, in the case of ftp servers on Unix machines) works the same way as the security for a normal Unix log-in password -- you give it a plaintext password, it encrypts it, and if the encrypted string matches the string in the passwd file, it assumes that you are who you say you are, since you've provided a string that encrypts correctly. Providing an already encrypted string proves nothing. If I've misunderstood what you're suggesting, then please forgive me, and please explain more clearly what you're suggesting. If not, I think you've got to think through a bit more clearly exactly how ftp authentication, and Unix password authentication in general, works. Jonathan Kamens USnail: MIT Project Athena 11 Ashford Terrace jik@Athena.MIT.EDU Allston, MA 02134 Office: 617-253-8495 Home: 617-782-0710 (Isn't it about time somebody wrote a Kerberized ftp client/server? :-)
ram@attcan.UUCP (Richard Meesters) (06/01/90)
In article <1990Jun1.063800.17539@athena.mit.edu>, jik@athena.mit.edu (Jonathan I. Kamens) writes: > In article <11513@vpk1.UUCP>, ram@attcan.UUCP (Richard Meesters) writes: rm |> The point is, however valid. If you are going to use a .netrc, why rm cant it be rm |> more like the passwd system. This merely means that the ftp program must rm |> provide the facilities for encryption/decription of the password, rm rather than rm |> leaving it up to the user to do so himself. > > First of all, the ftp protocol doesn't say, "Two machines talking to > each other using the protocol must both be Unix machines that use a > standard crypt() function for password verification." What it says is > that there is a protocol command to send a password from the client to > the server, and that server may use the password for verification in > whatever way it chooses. I'm not suggesting that we necessarily use the crypt() function call ala UNIX to provide the data encryption. What I'm suggesting is that perhaps the ftp code should include some form of encryption/decryption algorithm to protect the password information. IMHO, any plain-text password stored on a system is a security risk, no matter how well it is protected. > > Second, if the client is supposed to do password encryption, then > what's to stop me from logging into your machine, grabbing your > encrypted password string from the /etc/passwd file, then ftp'ing back > to the same machine with a hacked ftp client which sends that encrypted > string as the password? The ftp server says, "Gee, look, you've sent me > the correct encrypted password!" and goes right ahead believing that I'm you. Again, see above. It doesn't have to be the same encryption algorithm that is used for /etc/passwd (or use the same key?). So the password in /etc/passwd does not necessarily have any bearing on the passwd in .netrc. The danger of a plain-text passwd in a file is that someone only has to SEE it, rather than necessarily decrypt it to be able to use it. > > If I've misunderstood what you're suggesting, then please forgive me, > and please explain more clearly what you're suggesting. If not, I think > you've got to think through a bit more clearly exactly how ftp > authentication, and Unix password authentication in general, works. > Like I said in my previous posting, I'm by no means an expert on the topic, but rather just kicking around ideas. I appreciate your input. Regards, ------------------------------------------------------------------------------ Richard A Meesters | Technical Support Specialist | Insert std.logo here AT&T Canada | | "Waste is a terrible thing ATTMAIL: ....attmail!rmeesters | to mind...clean up your act" UUCP: ...att!attcan!ram | ------------------------------------------------------------------------------
dankg@tornado.Berkeley.EDU (Dan KoGai) (06/04/90)
In article <36584@ucbvax.BERKELEY.EDU> lauther@janus.Berkeley.EDU.UUCP (Ulrich Lauther) writes: >In article <6368@amelia.nas.nasa.gov> samlb@pioneer.arc.nasa.gov.UUCP (Sam Bassett RCS) writes: >> >> I agree -- the documentation should be more straightforward about >>the dangers of the .netrc, and for d**n sure, whoever is teaching kids > >I just wonder why not the same technique is used with .netrc as with >/etc/passwd: have the file readable, but sensitive parts encrypted? I don't think so: I don't think /etc/passwd was a good idea: It's encrypted. So what? That means you can take time to feed random string to encryptor, which is available, then find the matching string. Maybe you can feed it from dict file--people's name makes big candidate for considerably many people choose their password from thier (boy|girl)friends' or spouses' names. What I don't understand is that my password is not a kind of string found on dict but it's still feasible to use "power" rather than "tech" to break secirity in UNIX. I admit my .netrc was not a good idea. But still I think it's possible for that moron to kill at least OCF account: Some others suggested that some of UNIX has a serious problem in user switching. One of my friends witnessed that he was accidentally su'd to somebody else. At very least finger info and passwd file must be saparated. If possible, it might be a good idea to hard-code secirity part of UNIX, that is, implement seciryty by hardware than software. On current system encrypted or not, precious password info is visible. How about ATM card way (I don't think it's valid idea--How about dialin?)--No one but card knows your password. there remains the problem in case of loss of cards or "keys" but it's at very least far more secure than current UNIX implementation of password. ---------------- ____ __ __ + Dan The "Raped" Man ||__||__| + E-mail: dankg@ocf.berkeley.edu ____| ______ + Voice: +1 415-549-6111 | |__|__| + USnail: 1730 Laloma Berkeley, CA 94709 U.S.A |___ |__|__| + |____|____ + "What's the biggest U.S. export to Japan?" \_| | + "Bullshit. It makes the best fertilizer for their rice"
boyd@necisa.ho.necisa.oz (Boyd Roberts) (06/05/90)
In article <1990Jun4.102422.12896@agate.berkeley.edu> dankg@tornado.Berkeley.EDU (Dan KoGai) writes: > > I don't think so: I don't think /etc/passwd was a good idea: It's >encrypted. So what? That means you can take time to feed random string to >encryptor, which is available, then find the matching string. > Dan, my man you seem to have jumped to the conclusion that UNIX isn't secure because someone broke into your account and blew away your files. How this was done would appear to be attributable to stupidity, and not to underlying flaws in UNIX password security. At this point I'd like to make the distinction between UNIX password security and the various `security' of IP based networking utilities. With those, there is _no_ security. I think RTM and various others have proved this beyond a shadow of a doubt. UNIX password security is secure, provided you have chosen a reasonable password. Sure, you can snarf /etc/passwd and try a dictionary attack. But, you have to get access to the machine first. Without access to the machine it's near impossible to break. Shadow password files nullify this method of attack, although I don't like this password file dichotomy. The bottom line is that password security works. Most systems aren't broken into. The ones that are broken are usually compromised by some sloppy (ie. networking) utility or a flawed UNIX port. So Dan, a piece of advice: $@$*$H$7$^$((J $@$*(J $@$D$1$F(J! Boyd Roberts boyd@necisa.ho.necisa.oz.au ``When the going gets wierd, the weird turn pro...''
jik@athena.mit.edu (Jonathan I. Kamens) (06/05/90)
In article <11529@vpk1.UUCP>, ram@attcan.UUCP (Richard Meesters) writes: |> I'm not suggesting that we necessarily use the crypt() function call ala UNIX |> to provide the data encryption. What I'm suggesting is that perhaps the ftp |> code should include some form of encryption/decryption algorithm to protect |> the password information. IMHO, any plain-text password stored on a system |> is a security risk, no matter how well it is protected. It still won't work. And, no offense intended, I still don't think you've thought this through enough. Before posting a suggestion like this, try to through at least one concrete set-up which would make it work properly. Let me explain to you why I don't think you will be able to. You're proposing one of two things (I'm not sure which). Either you're saying that the password in the .netrc file should be encrypted in a way that ftp or ftpd can decrypt, or you're saying that ftp should encrypt the password before sending it over the network, and then ftpd should decrypt it on the other end. In the former case, you must keep in mind that the ftp protocol is publicly available, as is an implementation of ftp and ftpd. If your password in your .netrc is encrypted in a way that either ftp or ftpd knows how to decrypt, then if I can read your .netrc, I can decrypt your password by using the publicly available algorithm, or even easier by using publicly available ftp/ftpd source code. Therefore, you've gained no security over the already existent security of not allowing other users to read the .netrc file. In the latter case, once again, if I can read the encrypted password in your .netrc file, then I can use the algorithm or the publicly available ftpd code to decrypt it. Furthermore, if I'm snooping on the network and I see a password fly across the net encrypted in ftp's encryption algorithm, then I know the algorithm to use to decrypt it. Therefore, once again, you haven't gained any security by implementing encryption. Let's stop calling it encryption/decryption and call it the "verification function. Now let's say that I make the verification function site-specific, i.e. each site can define its on method of verifying that the password info it gets proves that you are who you say you are. You can make this site-specific stuff either client-dependent or client-independent. If the former, then you've got to have a separate version of ftp for each site. This is impractical at best. If the latter, you haven't gained anything, because once again you have to send a password over the network. In fact, the client-independent solution is exactly what the ftp protocol has now -- you send a password, and the server is allowed to do anything it wants with it for verification. Even if you implement client-dependent two-part (one in the client, one in the server) verification functions, once someone has managed to read the client and your .netrc file, they can pretend to be you. Once again, the only security you've got is their inability to read those files, which is pretty much no more security than there is now. Clearly, the strain running through all of this is the .netrc file -- delete that, and problems go away (well, most of them -- you still have network snooping). If you make the assumptions that no one else can get your password (i.e. either you never store it in a .netrc file or people really can't read your .netrc file {hehehehehehe :-}), and that no one is snooping on the network, then ftp is as secure as the normal Unix password scheme. *Think about* how Unix password security works, and then try to come up with a concrete example of what you're proposing. Of course, if you don't assume that the network is secure, then you need some network-secure authentication scheme, such as Kerberos. |> Again, see above. It doesn't have to be the same encryption algorithm that |> is used for /etc/passwd (or use the same key?). So the password in |> /etc/passwd does not necessarily have any bearing on the passwd in .netrc. |> The danger of a plain-text passwd in a file is that someone only has to SEE |> it, rather than necessarily decrypt it to be able to use it. It doesn't matter. If I can read your .netrc, then I can decrypt the password, since ftp knows how to decrypt it, and ftp sources are publicly available (and the ftp binary is publicly executable on the system). Therefore, even encrypted, the security of the password depends on the security of the .netrc file -- you're no better off than before. The reason Unix password security works is that the crypt() function is a *trapdoor* function. /bin/login doesn't say, "Let's decrypt the password in /etc/passwd and see if it matches what the user says his password is," because that's *impossible* (or, at least, it's believed to be; I'm not sure if crypt() has been proven to be a trapdoor function). What /bin/login says is, "Let's take what the user says his password is, encrypt it the same way the password was encrypted when it was set, and see if what we get matches what's in the /etc/passwd file." Then, if it matches, /bin/login gives the user appropriate privileges *since /bin/login is a privileged program*. Ftpd works the same way. What you're proposing is a two-way encryption function. That doesn't buy you anything, as long as files are not secure from unauthorized reading, since what's in the file *is* the password. In effect, what you're proposing is a filter through which every password must be passed before using it. Anybody who can read your password out of the .netrc can pass it through that filter as well as you can. Jonathan Kamens USnail: MIT Project Athena 11 Ashford Terrace jik@Athena.MIT.EDU Allston, MA 02134 Office: 617-253-8495 Home: 617-782-0710
dankg@volcano.Berkeley.EDU (Dan KoGai) (06/05/90)
In article <1752@necisa.ho.necisa.oz> boyd@necisa.ho.necisa.oz (Boyd Roberts) writes: >Dan, my man you seem to have jumped to the conclusion that UNIX isn't >secure because someone broke into your account and blew away your files. >How this was done would appear to be attributable to stupidity, and >not to underlying flaws in UNIX password security. Unix is at very least insecure enough to make me sleep in nightmare. I got several mails and some of them are raped even harder. And this applies to computer in general--My Mac is infected by virus 4 times (but last 2 was not serious at all, thanx to Disinfectant). >At this point I'd like to make the distinction between UNIX password security >and the various `security' of IP based networking utilities. With those, >there is _no_ security. I think RTM and various others have proved this >beyond a shadow of a doubt. UNIX password security is secure, provided you >have chosen a reasonable password. I do not think my accounts were nuked due to network flaw: Very unfortunately, there are several cracker activities reported to be originated at OCF. And my password was secure enough for your standard, the string as complicated as intercal syntax! >Sure, you can snarf /etc/passwd and try a dictionary attack. But, you have >to get access to the machine first. Without access to the machine it's >near impossible to break. Shadow password files nullify this method of attack, >although I don't like this password file dichotomy. It's not that hard today to obtain a UNIX account. And if you can crack one site, it's likely the site includes users with other remote accounts, which is exactly my case, and crack others--chain reaction also appeard in "Cockoo's Egg". I don't like NORAD-like security but very unfortunately human nature is evil and it takes evil to secure from evil. >The bottom line is that password security works. Most systems aren't broken >into. The ones that are broken are usually compromised by some sloppy >(ie. networking) utility or a flawed UNIX port. But it's far more common than your wallet is stolen. Look, I'm not the only victim and I heard of many cases on this Berkeley alone. And UNIX is still not common enough to attract people's attention--Internet virus case and Cockoo's Egg case attracted people because it was military security related, not because of fame of UNIX. I think I have seen too many cases of insecurity considering still small size of UNIX community. And this will get but more serious as UNIX gains its popularity. We'd better be prepared before it gets even messier. >So Dan, a piece of advice: > > $@$*$H$7$^$((J $@$*(J $@$D$1$F(J! ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ESC is dropped, yet another fraw of netnews sytem I wish I could. And now here's my advice: Living UNIX world is like an orgy: full of joy but riskier these days. ---------------- ____ __ __ + Dan The "insecured" Man ||__||__| + E-mail: dankg@ocf.berkeley.edu ____| ______ + Voice: +1 415-549-6111 | |__|__| + USnail: 1730 Laloma Berkeley, CA 94709 U.S.A |___ |__|__| + |____|____ + "What's the biggest U.S. export to Japan?" \_| | + "Bullshit. It makes the best fertilizer for their rice"
lyndon@cs.AthabascaU.CA (Lyndon Nerenberg) (06/06/90)
samlb@pioneer.arc.nasa.gov.UUCP (Sam Bassett RCS) writes: > I agree -- the documentation should be more straightforward about >the dangers of the .netrc, and for d**n sure, whoever is teaching kids >about UNIX should point out the problem -- especially at Berkeley. .netrc is an ugly BOTCH and should be removed from ftp. I guess I have something to do this afternoon ... -- Lyndon Nerenberg VE6BBM / Computing Services / Athabasca University {alberta,cbmvax,mips}!atha!lyndon || lyndon@cs.athabascau.ca Practice Good Government Use A Kingdom
carroll@m.cs.uiuc.edu (06/06/90)
/* Written 11:22 am May 28, 1990 by dce@smsc.sony.com in m.cs.uiuc.edu:comp.unix.questions */ In article <1990May28.102235.10021@agate.berkeley.edu> dankg@ocf.Berkeley.EDU (Dan Kogai) writes: >In article <9000030@m.cs.uiuc.edu> carroll@m.cs.uiuc.edu writes: >>in it. Does FTP check for .netrc specially? If not, then this seems to >>claim that you ftp'd the .netrc and it was that copy that was used, >>not your 600 .netrc. > > It might be system dependent but ALL ftp I know refuses to use >.netrc with wrong mode. Hold on, Dan. I think that carrol@m.cs.uiuc.edu is asking "when going a get or a put, does ftp check for .netrc specially". That is, is it possible that you did a get/put of everything in a directory, and that your .netrc got copied to a new place without being protected? /* End of text from m.cs.uiuc.edu:comp.unix.questions */ Yes, this is what I meant. The scenario I envisioned was, 1. A tar is done on "." or using find, such that the .files are included, including the .netrc. 2. The tar file is ftp'd somewhere else, with permissions such that another user can get the file (normally or through ftp). 3. This other user then untars the file, and the .netrc, still with 600 permissions, is also untarred, but _owned by the other user_, because that's what tar does (on BSD - on SysV, you have to go to the trouble of using the -o flag). 4. Other user then picks the password out of the file. I can't see how ftp could possibly prevent this from happening, and I strongly suspect that something very similar to this took place. Alan M. Carroll Barbara/Marilyn in '92 : carroll@cs.uiuc.edu + This time, why not choose the better halves? Epoch Development Team CS Grad / U of Ill @ Urbana ...{ucbvax,pur-ee,convex}!cs.uiuc.edu!carroll
woods@robohack.UUCP (Greg A. Woods) (06/06/90)
In article <1990Jun5.152004.15873@agate.berkeley.edu> dankg@volcano.Berkeley.EDU (Dan KoGai) writes: > Unix is at very least insecure enough to make me sleep in nightmare. > I got several mails and some of them are raped even harder. And this applies > to computer in general--My Mac is infected by virus 4 times (but last 2 was > not serious at all, thanx to Disinfectant). Your first sentence is wrong, as I will attempt to show. I don't quite understand your second sentence. As to your final point however, you should realize the susceptibility of a PC (any PC, or home computer, including Apple's Macintosh) to a virus is several orders of magnitude greater than the average UNIX system. Certainly a true UNIX virus is possible, and given the sloppiness of the average vendor these days, one could easily get out. However, I'd suggest that it would be rare that such a virus would be contagious. Binaries just aren't often moved or shared between UNIX systems, and the software distribution hierarchy is entirely different. This is changing with the increasing use of workstations on networks though...and you can't really blame the network for this "flaw". > I do not think my accounts were nuked due to network flaw: Very > unfortunately, there are several cracker activities reported to be originated > at OCF. And my password was secure enough for your standard, the string as > complicated as intercal syntax! I don't know how your site is related to OCF, but if they share a network cable, then yes, you can indeed blame the network.... > It's not that hard today to obtain a UNIX account. And if you can > crack one site, it's likely the site includes users with other remote accounts, > which is exactly my case, and crack others--chain reaction also appeard in > "Cockoo's Egg". I don't like NORAD-like security but very unfortunately human > nature is evil and it takes evil to secure from evil. Yes, but first you'll have to crack the passwords of the people at the "breached" site. Then you'll have to hope they use the same passwords on the target sites. Then you repeat the loop. Fortunately it is likely you'll be discovered before the second iteration, since there is still a significant lag required to break the passwords the hard way. (You'll also have to get through any "external" security the target sites may have, such as call-back or dialup passwords.) Again, the network makes this so much easier! > In article <1752@necisa.ho.necisa.oz> boyd@necisa.ho.necisa.oz (Boyd Roberts) writes: > >The bottom line is that password security works. Most systems aren't broken > >into. The ones that are broken are usually compromised by some sloppy > >(ie. networking) utility or a flawed UNIX port. > > But it's far more common than your wallet is stolen. Look, I'm not > the only victim and I heard of many cases on this Berkeley alone. And UNIX > is still not common enough to attract people's attention--Internet virus > case and Cockoo's Egg case attracted people because it was military security > related, not because of fame of UNIX. I think I have seen too many cases > of insecurity considering still small size of UNIX community. And this will > get but more serious as UNIX gains its popularity. We'd better be prepared > before it gets even messier. Berkeley is on a network. If it were possible that the network be secure, or not exist, the breakins would be as common as those to Fort Knox. Most breaches of commercial UNIX systems are due entirely to sloppy, or non-existant, system administration. What does the "fame" of UNIX have to do with anything? Do you think it will be a more common target if it becomes more famous? I doubt anything would raise the ratio of UNIX breakins to those of other types of systems. I would imagine the ratio is already quite high. UNIX is already quite famous in the cracker community. UNIX is fundamentaly quite "secure" (in the common definition). It does not, however, have mandatory security by default. UNIX makes it easy for you to disable any security features, sometimes by accident. Networks are fundamentaly quite insecure. They are designed to provide open and easy access to "remote" resources. -- Greg A. Woods woods@{robohack,gate,eci386,tmsoft,ontmoh}.UUCP +1 416 443-1734 [h] +1 416 595-5425 [w] VE3-TCP Toronto, Ontario; CANADA
ram@attcan.UUCP (Richard Meesters) (06/06/90)
In article <1990Jun5.081053.25508@athena.mit.edu>, jik@athena.mit.edu (Jonathan I. Kamens) writes: < In article <11529@vpk1.UUCP>, ram@attcan.UUCP (Richard Meesters) writes: < |> I'm not suggesting that we necessarily use the crypt() function call < ala UNIX < |> to provide the data encryption. What I'm suggesting is that perhaps the ftp < |> code should include some form of encryption/decryption algorithm to protect < |> the password information. IMHO, any plain-text password stored on a system < |> is a security risk, no matter how well it is protected. < < Clearly, the strain running through all of this is the .netrc file -- < delete that, and problems go away (well, most of them -- you still have < network snooping). < < If you make the assumptions that no one else can get your password < (i.e. either you never store it in a .netrc file or people really can't < read your .netrc file {hehehehehehe :-}), and that no one is snooping on < the network, then ftp is as secure as the normal Unix password scheme. < *Think about* how Unix password security works, and then try to come up < with a concrete example of what you're proposing. < Again, my thrust has really been that having a plain-text password in a file is BAD (excuse the shout). And the best possible thing to do is eliminate it. But if that's not possible, and a large number of users will most certainly balk at their administrators making life more miserable by making them (gasp!) type passwords when they want to go across the network, then we need to provide some level of security to the users, IMHO. < Of course, if you don't assume that the network is secure, then you < need some network-secure authentication scheme, such as Kerberos. < > |> Again, see above. It doesn't have to be the same encryption algorithm that < |> is used for /etc/passwd (or use the same key?). So the password in < |> /etc/passwd does not necessarily have any bearing on the passwd in .netrc. < |> The danger of a plain-text passwd in a file is that someone only has to SEE < |> it, rather than necessarily decrypt it to be able to use it. < < It doesn't matter. If I can read your .netrc, then I can decrypt the < password, since ftp knows how to decrypt it, and ftp sources are < publicly available (and the ftp binary is publicly executable on the < system). Therefore, even encrypted, the security of the password < depends on the security of the .netrc file -- you're no better off than before. < What you're proposing is a two-way encryption function. That doesn't < buy you anything, as long as files are not secure from unauthorized < reading, since what's in the file *is* the password. < < In effect, what you're proposing is a filter through which every < password must be passed before using it. Anybody who can read your < password out of the .netrc can pass it through that filter as well as you can. < I agree that if you have access to the encryption function you can break the password/security of the system. But it does buy you something. What it gives you is protection from the person who only gets a chance to _look_ at your .netrc/[file where password information is stored - this has in effect gone beyond a specific topic] and see instantly what that password is. At least with some level of encryption, someone will only see 'asfj8af2' instead of 'farpoint' or whatever you use as a password. If anyone is dedicated enough, or has access to enough information/source, he/she is likely to be able to break almost any protection scheme you can think of. It's a matter of degree. Regards, ------------------------------------------------------------------------------ Richard A Meesters | Technical Support Specialist | Insert std.logo here AT&T Canada | | "Waste is a terrible thing ATTMAIL: ....attmail!rmeesters | to mind...clean up your act" UUCP: ...att!attcan!ram | ------------------------------------------------------------------------------
jik@athena.mit.edu (Jonathan I. Kamens) (06/07/90)
In article <720015@hpclapd.HP.COM>, defaria@hpclapd.HP.COM (Andy DeFaria) writes: |> I'm no security guru on Unix but it seems to me that the way around this |> problem would be to remove this silly restriction and allow ftp (and |> others?) to send encrypted passwords to the other host. I thought I already explained this. Sigh. Let's assume that what you said is possible. In that case, I do the following: 1. Log into your machine. 2. Grab the encrypted password for root out of the (publicly readable) /etc/passwd. 3. "Ftp localhost". 4. Use username "root", and the encrypted password I've already snarfed. Presto, I've just ftp'd as root, without ever knowing the root password! There is a fundamental concept you're missing -- the act of encrypting the password and comparing it to the password in /etc/passwd is the authentication; if you don't do the encryption, you haven't proven anything. (How many times am I going to have to explain this?) Jonathan Kamens USnail: MIT Project Athena 11 Ashford Terrace jik@Athena.MIT.EDU Allston, MA 02134 Office: 617-253-8495 Home: 617-782-0710
les@chinet.chi.il.us (Leslie Mikesell) (06/07/90)
In article <1990Jun5.152004.15873@agate.berkeley.edu> dankg@volcano.Berkeley.EDU (Dan KoGai) writes: >>Dan, my man you seem to have jumped to the conclusion that UNIX isn't >>secure because someone broke into your account and blew away your files. > Unix is at very least insecure enough to make me sleep in nightmare. >I got several mails and some of them are raped even harder. The usual protection against losing files either due to accidents or malicious removal is to keep backups. Doesn't your site maintain some reasonably current tape copies of everything? I also try to keep copies of files that are personally valuable on PC floppies which at the moment are the ultimate in portable media. All you really need is access to a PC, modem, and dial-up port to tranfer to/from just about anything. Les Mikesell les@chinet.chi.il.us
boyd@necisa.ho.necisa.oz (Boyd Roberts) (06/08/90)
In article <1990Jun5.152004.15873@agate.berkeley.edu>, dankg@volcano.Berkeley.EDU (Dan KoGai) writes: > In article <1752@necisa.ho.necisa.oz> boyd@necisa.ho.necisa.oz (Boyd Roberts) writes: > > >So Dan, a piece of advice: > > > > $@$*$H$7$^$((J $@$*(J $@$D$1$F(J! > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ESC is dropped, yet another fraw of > netnews sytem > No, guess again. Iie chigaimasu, ESC ga arimasen deshita. Boyd Roberts boyd@necisa.ho.necisa.oz.au ``When the going gets wierd, the weird turn pro...''
dankg@tornado.Berkeley.EDU (Dan KoGai) (06/08/90)
In article <1990Jun7.161215.27328@chinet.chi.il.us> les@chinet.chi.il.us (Leslie Mikesell) writes: >The usual protection against losing files either due to accidents or >malicious removal is to keep backups. Doesn't your site maintain >some reasonably current tape copies of everything? I also try to keep >copies of files that are personally valuable on PC floppies which at the >moment are the ultimate in portable media. All you really need is access >to a PC, modem, and dial-up port to tranfer to/from just about anything. One of my accounts did: Not this OCF account. But losing files are rather small problems. What if your root password is illegally changed by someone else? If so unless you can replace /etc/passwd or yp, you can't get back to root again (replace whole disk with carbon-copy image of previous backup?). Of course you can do it by replacing whole disk but it's a hardware solution and not very efficient. My case is not just accident. The moron showed me capability of doing even nastier things. So backup is not a solution of cracker and never intended to be: cracker is not an accident and we are not supposed to confuse accident and felony. As long as we depend on crypt() to encrypt password and password file is open to public, unix can never be secure enough--I wrote a 10-line C code to crack it and successfully found my own password (Thank god this method doesn't apply on Apollo where my OCF account resides but works any with /etc/passwd. And easily extendable to yp). It took horrible time but this kind of time is nothing compared to the prize it guarantees). I'm not at all UNIX guru but all I needed was how password protection was implemented and decent C knowledge--both accessible. We should at very least separate encrypted password from finger entries. And if possible, replace dummy crypt() with something else--we don't need much speed for login process, do we? ---------------- ____ __ __ + Dan The "Hackn' Scared" Man ||__||__| + E-mail: dankg@ocf.berkeley.edu ____| ______ + Voice: +1 415-549-6111 | |__|__| + USnail: 1730 Laloma Berkeley, CA 94709 U.S.A |___ |__|__| + |____|____ + if (!strcmp(cryptpass, crypt(pass, cryptpass))) \_| | + You_Are_Toast();
defaria@hpclapd.HP.COM (Andy DeFaria) (06/08/90)
>/ hpclapd:comp.unix.questions / jik@athena.mit.edu (Jonathan I. Kamens) / 2:46 pm Jun 6, 1990 / >In article <720015@hpclapd.HP.COM>, defaria@hpclapd.HP.COM (Andy >DeFaria) writes: >|> I'm no security guru on Unix but it seems to me that the way around this >|> problem would be to remove this silly restriction and allow ftp (and >|> others?) to send encrypted passwords to the other host. > > I thought I already explained this. Sigh. > > Let's assume that what you said is possible. In that case, I do the >following: > >1. Log into your machine. >2. Grab the encrypted password for root out of the (publicly readable) ^^^^^^^^^^^^^^^^^ > /etc/passwd. >3. "Ftp localhost". >4. Use username "root", and the encrypted password I've already snarfed. > >Presto, I've just ftp'd as root, without ever knowing the root password! > > There is a fundamental concept you're missing -- the act of encrypting >the password and comparing it to the password in /etc/passwd is the >authentication; if you don't do the encryption, you haven't proven anything. > > (How many times am I going to have to explain this?) > >Jonathan Kamens USnail: >MIT Project Athena 11 Ashford Terrace >jik@Athena.MIT.EDU Allston, MA 02134 >Office: 617-253-8495 Home: 617-782-0710 >---------- I thought I explained this. IMHO /etc/passwd should NOT be publicly readable. If this were true then you couldn't ftp as root because you wouldn't even know the encrypted password, which, IMHO, you shouldn't have access to.
jik@athena.mit.edu (Jonathan I. Kamens) (06/09/90)
In article <1990Jun8.154523.5102@agate.berkeley.edu>, dankg@tornado.Berkeley.EDU (Dan KoGai) writes: |> One of my accounts did: Not this OCF account. But losing files |> are rather small problems. What if your root password is illegally changed |> by someone else? If so unless you can replace /etc/passwd or yp, you can't |> get back to root again (replace whole disk with carbon-copy image of previous |> backup?). Please do not try to post authoritatively about things concerning which you are not an authority. There are very few Unix systems on which a system administrator with the necessary access can't log on as the superuser, even if he doesn't know the root password, as long as the machine is intact enough to boot into single-user mode. |> As long as we depend on crypt() to encrypt password and password file |> is open to public, unix can never be secure enough--I wrote a 10-line C code |> to crack it and successfully found my own password (Thank god this method |> doesn't apply on Apollo where my OCF account resides but works any with |> /etc/passwd. And easily extendable to yp). It took horrible time but this |> kind of time is nothing compared to the prize it guarantees). I am becoming more and more convinced that you're flaming without much justification about something about which you know little, and frankly, it's getting a little irritating. Well-chosen passwords *are* secure enough in almost all situations, even when the /etc/passwd file is world-readable. The fact that you wrote a C program to crack passwords and it successfully found yours just means that your password was not well-chosen. You can't blame Unix for that. |> I'm not at all UNIX guru but all I needed was how password protection |> was implemented and decent C knowledge--both accessible. We should at very |> least separate encrypted password from finger entries. And if possible, |> replace dummy crypt() with something else--we don't need much speed for |> login process, do we? Actually, I consider fast log-in time to be one of the most important features in any given system. Jonathan Kamens USnail: MIT Project Athena 11 Ashford Terrace jik@Athena.MIT.EDU Allston, MA 02134 Office: 617-253-8495 Home: 617-782-0710
omerzu@quando.UUCP (Thomas Omerzu) (06/09/90)
In article <720016@hpclapd.HP.COM> defaria@hpclapd.HP.COM (Andy DeFaria) writes: [...] >>2. Grab the encrypted password for root out of the (publicly readable) >> /etc/passwd. [...] > >I thought I explained this. IMHO /etc/passwd should NOT be publicly >readable. If this were true then you couldn't ftp as root because you [...] I cannot find out where you explained this, but have you ever tried to remove public read permissions from /etc/passwd? Very funny results, not the simplest 'ls -l' will work ... And now MAY WE STOP this discussion PLEASE? To me it seems as if everything worthy of discussion has been said at least twice, and every new aspect is more unqualified than the one before ... -- Thomas Omerzu, omerzu@quando.quantum.de
jik@athena.mit.edu (Jonathan I. Kamens) (06/10/90)
In article <720016@hpclapd.HP.COM> defaria@hpclapd.HP.COM (Andy DeFaria) writes: >I thought I explained this. IMHO /etc/passwd should NOT be publicly >readable. If this were true then you couldn't ftp as root because you >wouldn't even know the encrypted password, which, IMHO, you shouldn't have >access to. Oh, jolly good. So now you're proposing to take all the passwords (or, at least, encrypted passwords) and put them in an /etc/shadow file, but other than the fact that the file isn't world-readable, the rest of the scenario I described is correct, right? In that case, you're basing the entire security of your system on the readability or non-readability of one file. Do you know how many ways there are in Unix to read a file you're not supposed to be able to read? Or to read portions of that file? The elegance of the standard Unix security mechanism is that, given well-chosen and moderately-frequently-changed passwords, it doesn't *matter* whether or not someone can read the /etc/passwd file, because doing so *does not enable them to break the security of your system*, at least not in the short term. Under the system you propose, you've completely eliminated that elegance. Indeed, if the password file isn't world-readable, then why not just store the plaintext password in it, and not the encrypted password? After all, according to what you're saying, all you need to do to verify that someone is who they say they are is to compare the string they give you to the string in a file that isn't world-readable, so why bother with the encryption? One more note -- this wole discussion started when someone suggested that people be allowed to store their encrypted passwords in the .netrc file, rather than their plaintext passwords, to prevent people who managed to read their .netrc file from using it to gain access to other systems. Your proposal doesn't fix that problem, because, as I've already said, if the encrypted password is what is used for the authentication, then if I can read your .netrc, I can still use its contents to break into your other accounts. Jonathan Kamens USnail: MIT Project Athena 11 Ashford Terrace jik@Athena.MIT.EDU Allston, MA 02134 Office: 617-253-8495 Home: 617-782-0710
jik@athena.mit.edu (Jonathan I. Kamens) (06/10/90)
In article <1557@quando.UUCP> omerzu@quando.UUCP (Thomas Omerzu) writes: >I cannot find out where you explained this, >but have you ever tried to remove public read permissions >from /etc/passwd? >Very funny results, not the simplest 'ls -l' will work ... What he was talking about was something on the order of a protected /etc/shadow file containing only the encrypted passwords, not a wholesale protection of everything in /etc/passwd. >And now MAY WE STOP this discussion PLEASE? >To me it seems as if everything worthy of discussion has been said >at least twice, and every new aspect is more unqualified than the >one before ... Indeed. Jonathan Kamens USnail: MIT Project Athena 11 Ashford Terrace jik@Athena.MIT.EDU Allston, MA 02134 Office: 617-253-8495 Home: 617-782-0710
dankg@tornado.Berkeley.EDU (Dan KoGai) (06/11/90)
In article <1990Jun8.175747.18776@athena.mit.edu> jik@athena.mit.edu (Jonathan I. Kamens) writes: > I am becoming more and more convinced that you're flaming without much >justification about something about which you know little, and frankly, >it's getting a little irritating. All I know is I became victim and there are a lot others. And it's not that hard to overcome crypt(). I admit I know too little to become a security expert. But it doesn't take a wizard to know every single file I had were brutally deleted. Are you still saying I am just flaming? if you stop me or people like me from what you call flaming, Give us secure system for first place so I don't have to post something like this anymore, period! > Well-chosen passwords *are* secure enough in almost all situations, >even when the /etc/passwd file is world-readable. The fact that you >wrote a C program to crack passwords and it successfully found yours >just means that your password was not well-chosen. You can't blame Unix >for that. I think my password was well-chosen: It is hardly English or any other language, with Uppercase and Numbers. My previous one was very random also. Yet my 10-line (now 20 and can handle even more complex cases) successfully found it: I didn't use /usr/dict/words or any sort at all. > Actually, I consider fast log-in time to be one of the most important >features in any given system. Provided it's secure enough. UNIX is not. I'm not very exceptionally rare victims. I know a lot of even severe cases broken harder, which are protected with UNIX experts. How many victims do we need to convince you guys that today's UNIX needs major upgrade of secirity? Well, even after Stockton Masscare, this country allows us to have guns without any lisence. maybe asking Americans for secirity is never secure enough for 1st place. ---------------- ____ __ __ + Dan The "Just one of many victims" Man ||__||__| + E-mail: dankg@ocf.berkeley.edu ____| ______ + Voice: +1 415-549-6111 | |__|__| + USnail: 1730 Laloma Berkeley, CA 94709 U.S.A |___ |__|__| + |____|____ + if (!strcmp(cryptpass, crypt(pass, cryptpass))) \_| | + You_Are_Toast();
jrh@mustang.dell.com (James Howard) (06/11/90)
Dan KoGai writes: > All I know is I became victim and there are a lot others. [ much whining deleted ] > How many victims do we need to convince you > guys that today's UNIX needs major upgrade of secirity? Well, even after > Stockton Masscare, this country allows us to have guns without any lisence. > maybe asking Americans for secirity is never secure enough for 1st place. > > ---------------- > ____ __ __ + Dan The "Just one of many victims" Man > ||__||__| + E-mail: dankg@ocf.berkeley.edu > ____| ______ + Voice: +1 415-549-6111 > | |__|__| + USnail: 1730 Laloma Berkeley, CA 94709 U.S.A > |___ |__|__| + > |____|____ + if (!strcmp(cryptpass, crypt(pass, cryptpass))) > \_| | + You_Are_Toast(); Here is a quote that seems appropriate, although I do not remember the source: Even the truly paranoid have real enemies. flames > /dev/null --------------------------------------------------------- James Howard Dell Computer Corp. jrh@mustang.dell.com The opinions expressed are my own, and not necessarily those of my employer. ---------------------------------------------------------
rogerj@batcomputer.tn.cornell.edu (Roger Jagoda) (06/11/90)
In article <1931@aurora.cs.athabascau.ca> lyndon@cs.AthabascaU.CA (Lyndon Nerenberg) writes: >samlb@pioneer.arc.nasa.gov.UUCP (Sam Bassett RCS) writes: > >> I agree -- the documentation should be more straightforward about >>the dangers of the .netrc, and for d**n sure, whoever is teaching kids >>about UNIX should point out the problem -- especially at Berkeley. > >.netrc is an ugly BOTCH and should be removed from ftp. I guess I >have something to do this afternoon ... Wait, the .netrc file DOES have a good use--anonymous FTP sites. I mean how many times do you REALLY want to type ANONYMOUS anyway. Sam's right, the UCB kids just need better teaching about the tool, although, UNIX has this problem in other tools too. Just MHO. As for the passwd file being readable by ANYONE, there's no argument I know of that can be presented for why that EVER was a good idea. If a file is readable it is useable, or MIS-useable. Novell, VMS, IBM OSes all have similar files that are NOT readable...for good reasons. Now, shadow passwd files are part of the solution, allowing the OS to get by with a passwd file with attributes of 600 is another part and doing away with the file altogether is the BEST part! -- ------------------------------------------------------------------------------ Roger Jagoda -- My employers don't even like paying Cornell University me, let alone accept responsibility fqoj@cornella.cit.cornell.edu for anything I say or do! --
defaria@hpclapd.HP.COM (Andy DeFaria) (06/12/90)
>/ hpclapd:comp.unix.questions / jik@athena.mit.edu (Jonathan I. Kamens) / 1:30 am Jun 10, 1990 / > Oh, jolly good. So now you're proposing to take all the passwords >(or, at least, encrypted passwords) and put them in an /etc/shadow >file, but other than the fact that the file isn't world-readable, the >rest of the scenario I described is correct, right? If you can't get the password because you can't read it then you scenario fails. > In that case, you're basing the entire security of your system on >the readability or non-readability of one file. Do you know how many >ways there are in Unix to read a file you're not supposed to be able >to read? Or to read portions of that file? I don't know how many ways there are in Unix to read a file you're not supposed to be able to read but if there are any then they are holes in the files system itself.
jik@athena.mit.edu (Jonathan I. Kamens) (06/12/90)
In article <1990Jun10.183417.6226@agate.berkeley.edu>, dankg@tornado.Berkeley.EDU (Dan KoGai) writes: |> All I know is I became victim and there are a lot others. And it's |> not that hard to overcome crypt(). I admit I know too little to become |> a security expert. But it doesn't take a wizard to know every single file |> I had were brutally deleted. Are you still saying I am just flaming? |> if you stop me or people like me from what you call flaming, Give us secure |> system for first place so I don't have to post something like this anymore, |> period! As I, and several other people, have already pointed out, it *is* sufficiently hard to overcome crypt() if your password is well chosen. One of the reasons I said in a previous posting that I don't think you know what you're talking about is that you keep on claiming that crypt() is easy to break, when in fact it isn't. Your files were removed because you had a .netrc file with a plaintext password in it. That has nothing to do with crypt(). As someone else has already pointed out, it is incredibly stupid to put any password which you don't want other people to know into your .netrc file. The fact that you did so has nothing at all to do with whether or not crypt() is secure. |> I think my password was well-chosen: It is hardly English or |> any other language, with Uppercase and Numbers. My previous one was very |> random also. Yet my 10-line (now 20 and can handle even more complex cases) |> successfully found it: I didn't use /usr/dict/words or any sort at all. Your password may very well have been well-chosen. That's completely irrelevant to the argument of whether or not crypt() is adequate, since the way your account was broken into was by someone who read your .netrc file, not by someone who cracked your password by encryption. |> Provided it's secure enough. UNIX is not. I'm not very exceptionally |> rare victims. I know a lot of even severe cases broken harder, which are |> protected with UNIX experts. How many victims do we need to convince you |> guys that today's UNIX needs major upgrade of secirity? Well, even after |> Stockton Masscare, this country allows us to have guns without any lisence. |> maybe asking Americans for secirity is never secure enough for 1st place. I am fully in agreement with the claim that Unix security needs to be enhanced in many areas. I just don't think that what happened to you is any sort of good example of why this is so, and I still think that what happened to you is more your fault than it is the fault of Unix. Or, at most, the fault of Unix documentation and of the people who run your site for not telling you not to put important passwords in the .netrc file. Finally, I think your argument about guns is bogus and irrelevant. Even after a guy with a can of gasoline burned down a nightclub and killed something like 80 people (someone feel free to correct me if I'm wrong), many more people than were killed and injured at Stockton, this country allows us to have gasoline without any license. Figure that out. Jonathan Kamens USnail: MIT Project Athena 11 Ashford Terrace jik@Athena.MIT.EDU Allston, MA 02134 Office: 617-253-8495 Home: 617-782-0710
woods@robohack.UUCP (Greg A. Woods) (06/12/90)
In article <1990Jun10.183417.6226@agate.berkeley.edu> dankg@tornado.Berkeley.EDU (Dan KoGai) writes: > In article <1990Jun8.175747.18776@athena.mit.edu> jik@athena.mit.edu (Jonathan I. Kamens) writes: > > > I am becoming more and more convinced that you're flaming without much > >justification about something about which you know little, and frankly, > >it's getting a little irritating. > >[....] Are you still saying I am just flaming? > if you stop me or people like me from what you call flaming, Give us secure > system for first place so I don't have to post something like this anymore, > period! Whoa! Jonathan is absolutely right! You aren't just flaming though, you're whining, and beginning to annoy at least me.... If you were to have a system secure enough not to have to worry again, you'd never be posting from it, nor reading and/or sending mail on it. The only truly secure system is a physically isolated system, with properly administered physical security policies. I would even go so far as to suggest that you would not be running news on an even moderately secure UNIX system. Mail is a bit safer. Networking (eg. with things such as NFS, or even SMTP) is much more more dangerous. > I think my password was well-chosen: It is hardly English or > any other language, with Uppercase and Numbers. My previous one was very > random also. Yet my 10-line (now 20 and can handle even more complex cases) > successfully found it: I didn't use /usr/dict/words or any sort at all. OK, I'll believe you. However, you did mention that it took quite a bit of horsepower to crack. Mind telling us just how much? Was your algorithm tainted towards the pattern employed in your password? Was your programme actually used by an outside party to crack your own password? Meanwhile, do you have proof your password was compromised? If not, have you considered again that it may have been a security violation through the network, or perhaps in a poorly designed application which allowed the compromise. It may even have been an "inside" job by some other "authorized" user of your system. Again, I must also resurrect the question of why your files weren't on backup media, ready to be restored in event of disaster. (I apologize if they were, but in that case, what are you crying about?) > > Actually, I consider fast log-in time to be one of the most important > >features in any given system. > > Provided it's secure enough. UNIX is not. I'm not very exceptionally > rare victims. I know a lot of even severe cases broken harder, which are > protected with UNIX experts. How many victims do we need to convince you > guys that today's UNIX needs major upgrade of secirity? [....] And how many times do we have to tell you that the responsibility for UNIX security lies with the administrator. UNIX, in and of itself, can be made quite secure. I believe the official rating of a carefully maintained and only slightly modified system can reach C2 (per "the Orange Book"). Certainly the "objects" deemed important by a commercial user can indeed be monitored easily enough to maintain a C2 rating. Personally I do not see a great philosophical gain in the efforts by such vendors as AT&T to create an even more secure UNIX system (i.e. B2). [Yes, "today's UNIX" is, and has been for quite some time, getting a major security upgrade.] I don't feel the implementation of B2-secure UNIX systems maintains either the spirit of UNIX, or even the spirit of POSIX. Such things are only done to attract those who are already entrapped by the red tape of the existing security establishment. The great majority of both industry and government applications do not require such measures, and would not require them even if the threat of crackers was much greater than it really is. Proper administration of these systems, which is even more critical with the added security features of these systems, will provide adequate security in most cases. No system can be considered secure unless there is a security policy that is enforced outside of the system itself. The system can be no more secure than the environment in which it operates. The proper administration of a sufficient security policy to maintain a B2 level system is far beyond the capabilities of most "users" of UNIX. -- Greg A. Woods woods@{robohack,gate,eci386,tmsoft,ontmoh}.UUCP +1 416 443-1734 [h] +1 416 595-5425 [w] VE3-TCP Toronto, Ontario; CANADA
gwyn@smoke.BRL.MIL (Doug Gwyn) (06/12/90)
In article <1990Jun10.083006.17475@athena.mit.edu> jik@athena.mit.edu (Jonathan I. Kamens) writes: > The elegance of the standard Unix security mechanism is that, given >well-chosen and moderately-frequently-changed passwords, it doesn't >*matter* whether or not someone can read the /etc/passwd file, because >doing so *does not enable them to break the security of your system*, >at least not in the short term. While that was reasonably the case when this scheme was first devised, it is certainly no longer true. Thus, hiding the encrypted passwords is now necessary for security, and if there are no other security loopholes that suffices to protect the passwords. Better authentication schemes are welcome, but until one is widely adopted shadow encrypted password files plug one of the biggest security gaps.
dennis@bailey.cpac.washington.edu (Dennis Gentry) (06/12/90)
In article <1990Jun10.183417.6226@agate.berkeley.edu> dankg@tornado.Berkeley.EDU (Dan KoGai) writes:
It's not that hard to overcome crypt().
There are no published easy methods of overcoming crypt(). If
you have found one, I would like to help you co-author a paper.
I think my password was well-chosen: It is hardly English or any
other language, with Uppercase and Numbers. My previous one was
very random also. Yet my 10-line (now 20 and can handle even
more complex cases) successfully found it: I didn't use
/usr/dict/words or any sort at all.
Again, I would be extremely surprised if your 20 line program
can successfully find well chosen passwords at any reasonable
rate (say one per year on a fast workstation). Also, it is easy
for a good system administrator to change the original string
being encrypted so that remote password attacks are much more
difficult. Dan, would you be willing to mail me your 20 line
program for analysis? If you are not, I'd still believe you if
you can you find my password. Here is my password entry. (If
any of you besides Dan crack my password, please let me know by
sending e-mail.)
dennis:H3MsMYv9Jed8Y:100:10:Dennis Gentry:/u/dennis:/bin/csh
Thanks,
Dennis
dennis@cs.washington.edu
volpe@underdog.crd.ge.com (Christopher R Volpe) (06/12/90)
In article <1990Jun12.012339.12779@athena.mit.edu> jik@athena.mit.edu (Jonathan I. Kamens) writes: > >In article <1990Jun10.183417.6226@agate.berkeley.edu>, >dankg@tornado.Berkeley.EDU (Dan KoGai) writes: > >|> I think my password was well-chosen: It is hardly English or >|> any other language, with Uppercase and Numbers. My previous one was very >|> random also. Yet my 10-line (now 20 and can handle even more complex cases) >|> successfully found it: I didn't use /usr/dict/words or any sort at all. > > Your password may very well have been well-chosen. That's completely >irrelevant to the argument of whether or not crypt() is adequate, since >the way your account was broken into was by someone who read your .netrc >file, not by someone who cracked your password by encryption. > Wait a minute. It sounds to me like Dan is claiming that with a 10 (or 20) line C program, he was able to find an arbitrary password (with uppercase and numerals) via encryption. Yes, it's true, that his account was broken into by someone who read the password from the .netrc file, but that has nothing to do with his claim. He says he didn't use /usr/dict/words or any sort of [word list] at all, which implies something along the lines of an exhaustive search. I find that highly unlikely, considering that the password encryption mechanism is an implementation of DES, which uses a 56 bit key. A brute force search of the keyspace is pretty unfeasable. Perhaps I misunderstood the claim. ============================ Chris Volpe Computer Scientist G.E. Corporate Research and Development volpecr@crd.ge.com
shwake@raysnec.UUCP (Ray Shwake) (06/12/90)
In article <1557@quando.UUCP> omerzu@quando.UUCP (Thomas Omerzu) writes: > >but have you ever tried to remove public read permissions >from /etc/passwd? >Very funny results, not the simplest 'ls -l' will work ... I recently structured permissions on one password file such that one group - let's call them outsider - can't access /etc/passwd, but others can. Simply assign GROUP ownership of /etc/password to the outsider group and take away their read permission. viz. -rw----r-- 1 bin outsider 1041 May 02 16:26 /etc/passwd BTW, many new UNIX implementations post-3.2 support password shadowing, such that the encrypted passwords are NOT publicly accessible.
bitbug@vicom.com (James Buster) (06/13/90)
I think that something the original complainant forgets is *just how annoying* a truly secure system is. Have you ever used a system with mandatory security? Such a system, when properly setup, means that often you can't freely send data around. Want to send mail to a friend? Sorry, your friend has the *wrong label*, and can't read the mail. Allowing your friends to just read your files will also fail, for the same reason. You could allow such information transfer, but then you've compromised security, haven't you? All in all, no fun. In general, ease of use is inversely proportional to level of security. -- --------------------------------------------------------------------- James Buster (Domain) bitbug@vicom.com Mad Hacker Extraordinaire (UUCP) ...!ames!vsi1!bitbug ---------------------------------------------------------------------
jik@athena.mit.edu (Jonathan I. Kamens) (06/13/90)
In article <720017@hpclapd.HP.COM> defaria@hpclapd.HP.COM (Andy DeFaria) writes: >I don't know how many ways there are in Unix to read a file you're not >supposed to be able to read but if there are any then they are holes in the >files system itself. Exactly. There are quite a few known bugs in various implementations of Unix, some of which ban be exploited as security holes, and many of which have not yet been fixed by many vendors. In addition, there are probably bugs that we don't know about, and some of them can be exploited as security holes. Finally, vendors are always developing Unix, and I'm sure that you'll agree that with development comes new bugs, some of which aren't discovered for some time, and some of which can be exploited as security holes. Given all this, I think that any security which depends on the unreadibility of one file is flawed. Jonathan Kamens USnail: MIT Project Athena 11 Ashford Terrace jik@Athena.MIT.EDU Allston, MA 02134 Office: 617-253-8495 Home: 617-782-0710
boyd@necisa.ho.necisa.oz (Boyd Roberts) (06/13/90)
In article <1990Jun10.183417.6226@agate.berkeley.edu> dankg@tornado.Berkeley.EDU (Dan KoGai) writes: > > All I know is I became victim and there are a lot others. And it's >not that hard to overcome crypt(). I admit I know too little to become >a security expert. Exactly. Dan, this is comp.unix.questions, not comp.unix.bitching. Move the discussion to alt.flame and give this group a rest. It is obvious from your postings that paranoia is the driving force behind them. Enough! Boyd Roberts boyd@necisa.ho.necisa.oz.au ``When the going gets wierd, the weird turn pro...''
root@rdb1.UUCP (Robert Barrell) (06/13/90)
In article <8480@crdgw1.crd.ge.com>, volpe@underdog.crd.ge.com (Christopher R Volpe) writes: > Wait a minute. It sounds to me like Dan is claiming that with a 10 > (or 20) line C program, he was able to find an arbitrary password > (with uppercase and numerals) via encryption.... >... > He says he didn't use /usr/dict/words or any sort of [word list] at all, > which implies something along the lines of an exhaustive search. > I find that highly unlikely, considering that the password encryption > mechanism is an implementation of DES, which uses a 56 bit key. > A brute force search of the keyspace is pretty unfeasable. Perhaps > I misunderstood the claim. Instead of performing an exhaustive search on passwords, perhaps Dan is doing something by running through all the possible 2-character salt values on the encrypted password. Even so, isn't crypt() supposed to "rotate" so many times anyway to defeat such an attempted decryption? Also, what about the CBW (Crypt-Breaker's Workshop) programs? I believe they are only for entire files that have been encrypted, but don't know if they are useful for passwords or not. -- Robert Barrell | ...!cbmvax!gvlv2!lock60!rdb1!root | Cody Computer Services Milo's Meadow BBS | root@rdb1.canal.org | 55 East High Street login: nuucp or bbs |-----------------------------------| Pottstown, PA 19464 (215) 323-0497 | Business and Police Dept Software | (215) 326-7476
edp@east.sun.com (Ed Pendzik {Prof Services} Sun Rochester) (06/13/90)
In article <1990Jun10.183417.6226@agate.berkeley.edu> dankg@tornado.Berkeley.EDU (Dan KoGai)
How many victims do we need to convince you
guys that today's UNIX needs major upgrade of secirity? Well, even after
Stockton Masscare, this country allows us to have guns without any lisence.
maybe asking Americans for secirity is never secure enough for 1st place.
please show how a lunatic in CA has anything to do with computer security.
despite his criminal record and tough CA gun laws he had no problems legally
buying firearms. this was a breakdown of the CA legal system.
Ed Pendzik
defaria@hpclapd.HP.COM (Andy DeFaria) (06/13/90)
>/ hpclapd:comp.unix.questions / jik@athena.mit.edu (Jonathan I. Kamens) / 4:49 pm Jun 12, 1990 / > Given all this, I think that any security which depends on the >unreadibility of one file is flawed. Yeah but what do you call leaving the file totally readable? What would be an unflawed security scheme? As fas as "a system too secure is unusable" goes I believe that the security of system should be set up such that you have access to the info that you need and are not allowed to get at info that you don't need or that would compromise the security of the system. The biggest problems that I see to this set up is: 1) Determining what all users need to be able to access. This is done initially by system admin BUT IT MUST BE AN ON-GOING ITERRATIVE AND INTERACTIVE PROCESS. If this is not carried through properly the system does indeed become hard to use. 2) Having a system admin that puts up stupid rules and barriers under the name of security. If someone has a litgitimate (sp?) need for a piece of info then there shouldn't be a big buerucratic (sp?) process to get the proper permissions to access the info. If the system admin people start saying things like "I can't allow you to look at this... It's company policy" then you're in trouble (especially when you ask "Why?" and they simply say "It's company policy". I seriously believe that any person that does this should be shot!). All in all if the system is set up right you should only be accessing info that you need to access and you should have the capability to access it anyway. If you are attempting to access info and you can't it should be because you probably don't need that info and if you really do, then it should be a simple procedure to get access to it.
jik@athena.mit.edu (Jonathan I. Kamens) (06/14/90)
In article <207@rdb1.UUCP> root@rdb1.UUCP (Robert Barrell) writes: > Also, what about the CBW (Crypt-Breaker's Workshop) programs? I >believe they are only for entire files that have been encrypted, but >don't know if they are useful for passwords or not. CBW is designed for breaking the encryption on files that were encrypted using crypt(1). The crypt program *does not* use DES encryption, which is what the crypt(3) function uses. Instead, it uses "a one-rotor machine designed along the lines of the German Enigma, but with a 256-element rotor" (that's from the man page). In other words, CBW isn't useful for breaking password encryption. Jonathan Kamens USnail: MIT Project Athena 11 Ashford Terrace jik@Athena.MIT.EDU Allston, MA 02134 Office: 617-253-8495 Home: 617-782-0710
kdq@demott.COM (Kevin D. Quitt) (06/14/90)
In article <EDP.90Jun13093936@pertsovka.east.sun.com> edp@east.sun.com (Ed Pendzik {Prof Services} Sun Rochester) writes: > >please show how a lunatic in CA has anything to do with computer security. OOH! OOH! I KNOW! Somebody broke into his account, and deleted all his files, and he didn't have a backup, so... 8-{)} -- _ Kevin D. Quitt Manager, Software Development 34 12 N 118 27 W DeMott Electronics Co. 14707 Keswick St. Van Nuys, CA 91405-1266 VOICE (818) 988-4975 FAX (818) 997-1190 MODEM (818) 997-4496 Telebit PEP last demott!kdq kdq@demott.com 96.37% of the statistics used in arguments are made up.
akhale@chamomile.uucp (Abhijit Khale) (06/14/90)
In article <207@rdb1.UUCP> root@rdb1.UUCP (Robert Barrell) writes: > Also, what about the CBW (Crypt-Breaker's Workshop) programs? I believe >they are only for entire files that have been encrypted, but don't know if they >are useful for passwords or not. > CBW helps to break crypt(1) which uses a comparitively simple encryption algorithm. crypt(3) which is used by the password encryption algorithm is based on the DES which is well-nigh impossible to break. Abhijit
gwyn@smoke.BRL.MIL (Doug Gwyn) (06/14/90)
In article <207@rdb1.UUCP> root@rdb1.UUCP (Robert Barrell) writes: > Also, what about the CBW (Crypt-Breaker's Workshop) programs? I believe >they are only for entire files that have been encrypted, but don't know if they >are useful for passwords or not. No, passwords are encrypted using a different algorithm. crypt(1) is not hard to break; crypt(3) is quite hard to break.