[comp.unix.wizards] sendmail/ftpd security-holes raise their ugly heads again...

jc@minya.UUCP (John Chambers) (09/27/89)

Here I am again, with a minor ethical question to fan the flames
a bit, and also a practical question.

The readers of this group probably all have fond memories of the
events last winter concerning the security holes involving sendmail's
debug command and ftpd's quote command.  Much has been written on
the subject, and it seems that rtm is being prosecuted.  So.

A couple weeks back, while doing some testing of other software on
a commercial workstation which I will carefully refrain from naming, 
I decided just for the fun of it to test for these problems.  Sure
enough, they seemed to be there.  It seems that not all vendors have
heard the news, or they don't consider it their problem to plug the
holes.

First, the ethical question.  Should I tell anyone?  (Well, OK, I'm
tell y'all right now; that's not what I mean.)  We know from much
experience that most vendors have a history of not welcoming this
information.  The sendmail problem in particular was well documented
for years before someone (rtm) gave us a demo, and nobody listened
very carefully.  Then when someone gave the demo, rather than thanking
him for it, the world calls for prosecution.  So the obvious conclusion
is that I should be very quiet about it.

Am I right?  If not, why not?

Second, the technical question.  I didn't actually do anything to the
systems in question that actually violated their security.  For example,
I just tested for the existence of sendmail's debug command.  It has
been pointed out that this in itself is not really a security hole, it
is just a symptom.  Disabling the debug command (by using adb to replace
the 'D' with a null, for instance) plugs the hole.  But the real problem
was that there was some way to use this feature to get a remote shell
running with root permissions.  It is entirely possible that some clever
vendor has supplied a sendmail with a debug command, but which won't let
you start up a remote shell.  UUCP does this sort of thing quite well, 
and there's no reason that sendmail couldn't do it, too (other than the
usual NIH syndrome :-).

So it occurs to me that another reason I don't want to openly point an
accusing finger at this vendor is that they might not actually have this
bug.  Not having access to sendmail source, I don't quite know how to
determine the answer.  Can someone explain exactly how to tell whether
a given sendmail daemon has this particular problem?

Before someone posts the obvious flame, I will point out that, yes, I
do know what I'm asking for.  I'm asking that someone tell me (or even
better, post it; it's been nearly a year) exactly how to exploit this
particular pair of security holes.  All the things I've seen published
on the subject have carefully avoided saying just how to do it, with
the usual argument that they don't want to tell everyone how to break
into others' machines.  After this much time, this has become somewhat
of a specious argument.  The industry has had more than six months to  
fix the problems.

What I'd like to do (and what I think is the ethically correct path)
is to test this workstation (and others in the future) quietly, and 
if they fail the test, send in a bug report explaining to the support 
people what is wrong.  But to do that, I have to be able to document 
the problem exactly.  It's not good enough to say "I think you have
a problem."  I want to be able to fill in the part of the form that
says how to elicit the problem.  If I can't show them how to get the
remote su shell, I haven't documented the bug.

It'd also help if I could email them a set of patches, and not have to 
worry about violating someone's licenses.  This is not a trivial point.
I've already had several cases of reporting Sys/V bugs, and received the
response that they can't be fixed, because to do so would make the system
fail the SVID test suite, and the ATT license doesn't allow that.  

It seems to me that there should be a reasonable time, and 6 months seems
reasonable to me, after which problems like these should be posted and
archived, and handed out to all interested parties.  Otherwise, as with
the sendmail and ftpd holes (and the ancient vi problem), they'll keep
coming back to haunt us.

Is this all a hopeless dream, or are we stuck with knowing there are problems
but that if we're smart, we'll keep quiet about them?

-- 
#echo 'Opinions Copyright 1989 by John Chambers; for licensing information contact:'
echo '	John Chambers <{adelie,ima,mit-eddie}!minya!{jc,root}> (617/484-6393)'
echo ''
saying

chris@mimsy.UUCP (Chris Torek) (09/28/89)

In article <21@minya.UUCP> jc@minya.UUCP (John Chambers) writes:
>...  The sendmail problem in particular was well documented
>for years before someone (rtm) gave us a demo, and nobody listened
>very carefully.

This is false.  The sendmail problem was NEVER (not ever, not once)
reported to Berkeley.  Several well-known `usenet personalties' have
asked those who asserted that the bug was `well known' whether they
knew it, and why they thought it was well known; every time the answer
has been the `a friend of a friend told me it was well known' sort.

>... Can someone explain exactly how to tell whether
>a given sendmail daemon has this particular problem?
>... The industry has had more than six months to fix the problems.

I am tempted to avoid flames by not saying anything at all, but I agree
with the assertion (perhaps implicit, I forget whether it was in the
text I deleted) that vendors should have fixed it by now.  I know,
though, that some have not, and so I am not going to post the trick
right now.

There is a simple way to fix it, though: get sendmail version 5.61 from
Berkeley---it is available via anonymous FTP from ucbarpa.berkeley.edu
(looks like it is in `4.3/sendmail.tar.Z') and probably also via uucp
from uunet (those with uunet UUCP service can ask uunet: this is what
you are paying for).  Throw out your vendor's version of sendmail (and
ftpd and rlogind and rdist and login and some others) and install the
latest from Berkeley.  Better yet, beat on your vendor to do it for you
(this is what you are paying for!).

>It seems to me that there should be a reasonable time, and 6 months seems
>reasonable to me, after which problems like these should be posted and
>archived, and handed out to all interested parties.  Otherwise, as with
>the sendmail and ftpd holes (and the ancient vi problem), they'll keep
>coming back to haunt us.

There is a bootstrap problem here: until there is pressure to fix things,
things will not get fixed; until things get fixed, there is pressure not
to disclose the bugs. . . .
-- 
In-Real-Life: Chris Torek, Univ of MD Comp Sci Dept (+1 301 454 7163)
Domain:	chris@mimsy.umd.edu	Path:	uunet!mimsy!chris

truesdel@sun217..nas.nasa.gov (David A. Truesdel) (09/28/89)

It should be noted that the mere presense of the debug mode IS NOT a security
hole, the ability to address mail to an arbitrary shell (with the aid of
"debug") IS.

Before ragging on your unnamed vendor, you should check to see if the security
hole really is present.
-dave truesdell (truesdel@prandtl.nas.nasa.gov)

"When in doubt, use brute force."

schwartz@psuvax1.cs.psu.edu (Scott Schwartz) (09/28/89)

In article <19837@mimsy.UUCP> chris@mimsy.UUCP (Chris Torek) writes:
   I am tempted to avoid flames by not saying anything at all, but I agree
   with the assertion (perhaps implicit, I forget whether it was in the
   text I deleted) that vendors should have fixed it by now.  I know,
   though, that some have not, and so I am not going to post the trick
   right now.

I don't understand.  Isn't it the case that 90% of the hackers in 
the universe have already heard about this bug?  I mean, what exactly
are we keeping secret?

   There is a bootstrap problem here: until there is pressure to fix things,
   things will not get fixed; until things get fixed, there is pressure not
   to disclose the bugs. . . .

Last year Weemba-from-Berkeley loudly proclaimed that in a years time
everyone would be back to sleep on this issue.  Guess what, looks like
he was right.  I'm pretty well convinced that silence is futile.
--
Scott Schwartz		<schwartz@shire.cs.psu.edu>
for h in `cat /etc/hosts`; do telnet $h smtp; done;
Now back to our regularly scheduled programming....

pvo3366@sapphire.OCE.ORST.EDU (Paul O'Neill) (09/28/89)

In article <21@minya.UUCP> jc@minya.UUCP (John Chambers) writes:
>
>First, the ethical question.  Should I tell anyone?  .........
>..............................................We know from much
>experience that most vendors have a history of not welcoming this
>information. 
>		...................
>Is this all a hopeless dream, or are we stuck with knowing there are problems
>but that if we're smart, we'll keep quiet about them?
>

Of course tell someone -- the vendor.
What "much experience"?  Pure folklore.

What follows is a true story and a picture-perfect example of how security
holes should be handled.

Can you say "mail to a pipe"?  I thought so.

Can you say "mail to a pipe without ``debug''"?  Ah ha, choked on that one,
didn't ya'?

While working on a mail problem on a Sun 386i I discovered a bug in Sun's
sendmail that allowed just this.  Debug was turned off, yet mail to a pipe
was possible.

I told Sun about it.  They figured out a fix *that night*.

They had a tape with the fix on it at the next Berkeley Sun Local Users Group
(SLUG) meeting within a week.

They had the fix available for anonymous ftp on uunet.uu.net within a month.
[Have you installed those things from ~ftp/sun-fixes yet?  They're there
for a reason, you know.]

So -- now that the vendor has been told, the fix has been propogated and 
everyone has had time to install it, it's time to tell the security
mailing list about it.

To summarize:
1) tell the vendor
2) wait
3) tell the [resonably secure] world

Discussion?


Paul O'Neill                 pvo@oce.orst.edu
Coastal Imaging Lab
OSU--Oceanography
Corvallis, OR  97331         503-754-3251

jc@minya.UUCP (John Chambers) (10/11/89)

> So -- now that the vendor has been told, the fix has been propogated and 
> everyone has had time to install it, it's time to tell the security
> mailing list about it.

Security mailing list?  What security mailing list?  I keep hearing rumors
about such a thing, but when I inquire, I'm told that they won't even tell
how to contact it, because I might be a malicious hacker intent on taking
advantage of such vital knowledge.  I suspect that this is a cover for the
fact that there isn't a real security mailing list.

I was in fact reinforced in this belief a couple of years back, when I did
get on a security mailing list for a while.  What a letdown.  I didn't read
a single article that told me something I didn't already know.  At least
half of the postings were concerning problems with setuid, from people who
clearly didn't understand the difference between setuid and setuid-root.

Is there a real security mailing list, that won't waste my time with such
silliness, and will actually teach me something?  Can I get on it?  Even
if I no longer have a job that requires a security clearance?  

-- 
#echo 'Opinions Copyright 1989 by John Chambers; for licensing information contact:'
echo '	John Chambers <{adelie,ima,mit-eddie}!minya!{jc,root}> (617/484-6393)'
echo ''
saying

news@cpd.com (usenet news administrator) (10/23/89)

In article <32@minya.UUCP> jc@minya.UUCP (John Chambers) writes:
>Security mailing list?  What security mailing list?  I keep hearing rumors
>about such a thing, but when I inquire, I'm told that they won't even tell
>how to contact it, because I might be a malicious hacker intent on taking
>advantage of such vital knowledge.  I suspect that this is a cover for the
>fact that there isn't a real security mailing list.

Perhaps you should gain some experiance in using netnews before
throwing ridiculous accusations around.  I run the security list, as
you can easily find out by reading news.lists, where Gene Spafford
posts a list of publicly accessable mailing lists every month or so.
Also, it seems that you haven't been reading this group very
religously, since I end up posting a response about the security list
here every 3 or 4 months.  In fact, looking at the log of postings
here, the latest response went out October 9.  Who wouldn't tell you
how to contact me?  If it's your system administrator that feels you
would be dangerous to include on the list, then I certainly won't
allow you to join.

>I was in fact reinforced in this belief a couple of years back, when I did
>get on a security mailing list for a while.  What a letdown.  I didn't read
>a single article that told me something I didn't already know.  At least
>half of the postings were concerning problems with setuid, from people who
>clearly didn't understand the difference between setuid and setuid-root.

There was a previous security list run by Andrew Burt on the system
isis in Colorado, which became defunct a few years ago.  I started the
security list back up again about a year ago.  I believe it has
material of worth, but it is intended more as a system administrators
security information source, than as a security theory discussion
forum.  This news group and misc.security seem to have some good
discussions, but I wouldn't know, since I don't have the time to read
netnews very often these days.  I won't waste everyone's bandwidth
putting out the entire security list blurb, but here are a few
pertinant lines from it:

The unix security mailing list exists for these reasons:

1. To notify system administrators and other appropriate people of
   serious security dangers BEFORE they become common knowledge.
2. Provide security enhancement information.

Most unix security mailing list material has been explanations of, and
fixes for, specific security "holes".

>Is there a real security mailing list, that won't waste my time with such
>silliness, and will actually teach me something?  Can I get on it?  Even
>if I no longer have a job that requires a security clearance?  

You might be able to get on it, assuming 2 things happen:
1.	A system administrator of a reasonably sized educational system or
	of a well-known commercial organization requests it, or you convince
	me that you have a good "need to know".  This list is not for the
	"just curious".
2.	I clear out the backlog of 637 security-request letters

So send a request to security-request here and I'll get to it sometime
this decade 8-).  Actually, the new product development that has been
occupying a ridiculous amount of my time will be done in a few weeks,
and I'll be able to spend a bit more time than the perfunctory couple
of hours a week that I have been spending on the security list.  So
please be patient, all you people whose mail has been stuck in my
security mailbox.

Neil Gorsuch                   INTERNET: neil@cpd.com
president                      UUCP: uunet!zardoz!neil
Uninet                         MAIL: 1209 E. Warner, Santa Ana, CA, USA, 92705
peripherals division of        PHONE: +1 714 546 1100
Custom Product Design, Inc.    FAX: +1 714 546 3726

AKA: root, security-request, uuasc-request, postmaster, usenet, news