[comp.unix.questions] Slaying Gould dragon with a wooden horse

bobr@zeus.UUCP (Robert Reed) (11/07/86)

In <157@houligan.UUCP> Dave Cornutt writes:
    Any system, no matter how secure it is designed to be, is only as secure
    as the people who run it make it.  If the searchpath problem was fixed,
    Darryl still have gotten in by creating a Trojan-horse program in his
    directory and convincing the superuser to run it.  (An old student
    approach: "I'm getting a wierd error out of this homework program; could
    you please run it and tell me what you think is wrong?").  This would
    have worked just as well, and there is *no system on the market* that
    can stop this type of attack...because the thing being taken advantage
    of isn't the system, it's the system administrator.

Maybe yes, maybe no.  It is certainly true in either case that the sys-admin
was duped, but in Darryl's trojan horse scheme, he was relying on the
coincidence of two conditions:

  1. That the search path tried the current working directory first.

  2. That the system administrator would think nothing of using standard
     utilities while running as root in that directory.

It is one thing to build a trojan horse behind, say, ls; one that does its
dirty deed and then execs the real ls.  It's quite another to convince an
administrator to run a user program WHILE IN A PRIVILEDGED ACCOUNT.  It's
certainly possible to do it, especially with a novice admin, just as it is
possible to take advantage of one who leaves terminals logged into root.  I
know I would have real qualms about executing someone's xyz program while
running as root.  But I might not even think about running ls, cat, more, or
emacs.
-- 
Robert Reed, Tektronix CAE Systems Division, bobr@zeus.TEK

jsdy@hadron.UUCP (Joseph S. D. Yao) (11/12/86)

Darryl,

I quite agree with you.  Any company that claims to have solved
security measures with hardware and software is either being
ignorant, or themselves immoral and fraudulent.  (And if they
gave you a card with their netaddr, please forward that comment!)
Any security system must include people training as well as
whatever software and hardware.  Besides, their system (as you
described it) did have holes, which you "legitimately" exploited.

The only secure system is one sealed in the center of the earth ...
or the sun.

	One Who Knows.
-- 

	Joe Yao		hadron!jsdy@seismo.{CSS.GOV,ARPA,UUCP}
			jsdy@hadron.COM (not yet domainised)