[comp.unix.wizards] What makes one problem more significant

jmcarli@PacBell.COM (Jerry M. Carlin) (05/15/91)

In article <16155@smoke.brl.mil> gwyn@smoke.brl.mil (Doug Gwyn) writes:
>I guarantee that there are other security problems on most versions
>of UNIX besides the one you've been carrying on about.  What makes
>that one problem so much more significant than the others?

There are also security problems with MVS/RACF. especially if you are
not VERY VERY careful setting it up such as SVC's leaving people in supervisor
state for example and careless use of "RACF SPECIAL" for another.

But more to the point, you've raised a VERY good question. I'd rank
significance in 3 levels but would be interested in other's opinions (how's
that for having an open mind :-) This ranking assumes I trust people I know
more than "strangers" and want to limit access to the system. Obviously
such things as "anonymous ftp" are not included but for "production" or
"critical" computers, the most important to me is limiting access.

The next is to limit access to root and other's IDs. Finally I'd put
everthing else in a major category. I'd rank the tty bugs in #2 and #3
since snarfing root's password is possible as well as annoying people
by sending trash to their screen.

Summary:
	1. remote access without knowing id/password.
	2. getting access to other ID's especially root.
	3. the rest

--
Jerry M. Carlin	(415) 823-2441 jmcarli@srv.pacbell.com
To dream the impossible dream. To fight the unbeatable foe.

gwyn@smoke.brl.mil (Doug Gwyn) (05/16/91)

In article <1991May14.225158.8265@PacBell.COM> jmcarli@PacBell.COM (Jerry M. Carlin) writes:
>	1. remote access without knowing id/password.
>	2. getting access to other ID's especially root.
>	3. the rest

I'm not sure I quite understood these categories.  Are they the same as:
	1. secure against attack by outsiders
	2. secure against attack by insiders
	3. secure against accidents
In these terms, we generally consider category #2 to be something that
can be dealt with by administrative action, and category #3 is expected
to be handled by the operating system.  The login password system ought
to be sufficient to cope with category #1; however, with the advent of
.rhosts and NFS there are a lot of new holes to plug.

I think Dan was going after a problem in category #2, which I don't
find particularly interesting.

smb@ulysses.att.com (Steven Bellovin) (05/18/91)

In article <16164@smoke.brl.mil>, gwyn@smoke.brl.mil (Doug Gwyn) writes:
} I'm not sure I quite understood these categories.  Are they the same as:
} 	1. secure against attack by outsiders
} 	2. secure against attack by insiders
} 	3. secure against accidents
} In these terms, we generally consider category #2 to be something that
} can be dealt with by administrative action, and category #3 is expected
} to be handled by the operating system.  The login password system ought
} to be sufficient to cope with category #1; however, with the advent of
} ..rhosts and NFS there are a lot of new holes to plug.
} 
} I think Dan was going after a problem in category #2, which I don't
} find particularly interesting.

My concerns, and probably Dan's, are twofold.  First, in a comparatively
uncontrolled environment -- say, a university, where the comp center
has to take more or less all comers -- a lot of damage can be done
before the administative procedures are used.  Second, and more serious,
I worry about hackers breaking in to your system via some bug, and then
using it to launch attacks on others.  Collecting passwords is a time-honored
hacker technique.

		--Steve Bellovin