[comp.unix.xenix] Using UUCP under a BBS system???

vortex@cs.mu.oz.au (Mark Gregson) (02/10/90)

	Hi,
	I don't suppose anyone out there would know if
	there is a BBS system for Xenix that will allow
	users to use the UUCP mail facility??

	I have been told that XBBS will do this, is this true or
	false?? I want users to be able to send and receive UUCP
	mail whilst logged into the BBS and not have to give out
	shell accounts for this facility.

	All help greatly appreciated....

	PS: Thanks to those persons that replied to my previous
	messages regarding BBS systems.

	Regards, Mark Gregson

jbayer@ispi.UUCP (Jonathan Bayer) (02/10/90)

vortex@cs.mu.oz.au (Mark Gregson) writes:


>	Hi,
>	I don't suppose anyone out there would know if
>	there is a BBS system for Xenix that will allow
>	users to use the UUCP mail facility??

>	I have been told that XBBS will do this, is this true or
>	false?? I want users to be able to send and receive UUCP
>	mail whilst logged into the BBS and not have to give out
>	shell accounts for this facility.


XBBS will allow you to do this, up to a point.  You can allow your users
access to the shell, at which point they have access to the mail
facility.  However, if you want them to be able to receive mail you will
have to either give them login accounts, or start hacking with the
mailer.


JB
-- 
Jonathan Bayer		Intelligent Software Products, Inc.
(201) 245-5922		500 Oakwood Ave.
jbayer@ispi.COM		Roselle Park, NJ   07204    

larry@nstar.UUCP (Larry Snyder) (02/11/90)

In article <2959@murtoa.cs.mu.oz.au>, vortex@cs.mu.oz.au (Mark Gregson) writes:
> 	I don't suppose anyone out there would know if
> 	there is a BBS system for Xenix that will allow
> 	users to use the UUCP mail facility??

AKCS will do just what you are looking for plus a whole lot more.

> 	I have been told that XBBS will do this, is this true or
> 	false?? I want users to be able to send and receive UUCP
> 	mail whilst logged into the BBS and not have to give out
> 	shell accounts for this facility.
 
The last time I looked at XBBS, it would only allow the spawning of
external news software - and one would have to set up an account for 
your users to access the mailer - which would leave the system open
for security problems.   AKCS takes a cleaner approach with the mail
front end built into the main package.   

Call into my system (running AKCS)
-- 
          Larry Snyder, Northern Star Communications, Notre Dame, IN USA 
                uucp: larry@nstar -or- ...!iuvax!ndmath!nstar!larry
               4 inbound dialup high speed line public access system

jpp@tygra.UUCP (John Palmer) (02/11/90)

In article <511182@nstar.UUCP> larry@nstar.UUCP (Larry Snyder) writes:
}In article <2959@murtoa.cs.mu.oz.au>, vortex@cs.mu.oz.au (Mark Gregson) writes:
}> 	I don't suppose anyone out there would know if
}> 	there is a BBS system for Xenix that will allow
}> 	users to use the UUCP mail facility??
}

The CAT-TALK Conferencing System now operates under Xenix and is available
at a toll free number for $20 a month. Thats cheap considering that you get
unlimited session time.   We carry Usenet news and people can send uucp 
mail (or internet mail). See my signature for instructions on how to sign up 
for access. You get a free 20 minute session to try out the system.

Starting sometime next week, we will be carrying ClariNet newsgroups. These
are professionally written "E-MAGAZINE" type groups.        


-- 
=  CAT-TALK Conferencing Network, Prototype Computer Conferencing System  =
-  1-800-825-3069, 300/1200/2400/9600 baud, 8/N/1. New users use 'new'    - 
=  as a login id.   E-Mail Address: jpp%tygra.UUCP@sharkey.cc.umich.edu   =
-           <<<Redistribution to GEnie PROHIBITED!!!>>>>                  -

les@chinet.chi.il.us (Leslie Mikesell) (02/12/90)

In article <511182@nstar.UUCP> larry@nstar.UUCP (Larry Snyder) writes:
>The last time I looked at XBBS, it would only allow the spawning of
>external news software - and one would have to set up an account for 
>your users to access the mailer - which would leave the system open
>for security problems.

Can you explain why having an account per user would cause any security
problem?  I can understand wanting a mail front-end built into a bbs
for convenience but I don't see any advantage for security.

Les Mikesell
  les@chinet.chi.il.us

karl@ddsw1.MCS.COM (Karl Denninger) (02/12/90)

In article <2959@murtoa.cs.mu.oz.au> vortex@cs.mu.oz.au (Mark Gregson) writes:
>
>	Hi,
>	I don't suppose anyone out there would know if
>	there is a BBS system for Xenix that will allow
>	users to use the UUCP mail facility??
>
>	I have been told that XBBS will do this, is this true or
>	false?? I want users to be able to send and receive UUCP
>	mail whilst logged into the BBS and not have to give out
>	shell accounts for this facility.
>
>	All help greatly appreciated....
>
>	PS: Thanks to those persons that replied to my previous
>	messages regarding BBS systems.

AKCS can handle this; it works best if you also install SMAIL3 (which is
no-charge, seeing as it's freely redistributable).

AKCS is a commercial product.  Call or write for more information on it.  
It's available at a quite-reasonable price.  In addition to being able to
handle the user side of things, it will also gateway Usenet newsgroups if 
you want and/or network with other AKCS systems.

--
Karl Denninger (karl@ddsw1.MCS.COM, <well-connected>!ddsw1!karl)
Public Access Data Line: [+1 708 566-8911], Voice: [+1 708 566-8910]
Macro Computer Solutions, Inc.		"Quality Solutions at a Fair Price"

davidsen@sixhub.UUCP (Wm E. Davidsen Jr) (02/12/90)

In article <2959@murtoa.cs.mu.oz.au> vortex@cs.mu.oz.au (Mark Gregson) writes:
| 
| 	Hi,
| 	I don't suppose anyone out there would know if
| 	there is a BBS system for Xenix that will allow
| 	users to use the UUCP mail facility??

  Citadel does, I think XBBS does, too.
-- 
	bill davidsen - sysop *IX BBS and Public Access UNIX
davidsen@sixhub.uucp		...!uunet!crdgw1!sixhub!davidsen

"Getting old is bad, but it beats the hell out of the alternative" -anon

sandy@locus.com (Sandy Zelkovitz) (02/12/90)

In article <511182@nstar.UUCP>, larry@nstar.UUCP (Larry Snyder) writes:
> In article <2959@murtoa.cs.mu.oz.au>, vortex@cs.mu.oz.au (Mark Gregson) writes:
> > 	I don't suppose anyone out there would know if
> > 	there is a BBS system for Xenix that will allow
> > 	users to use the UUCP mail facility??
> 
> AKCS will do just what you are looking for plus a whole lot more.
> 
> > 	I have been told that XBBS will do this, is this true or
> > 	false?? I want users to be able to send and receive UUCP
> > 	mail whilst logged into the BBS and not have to give out
> > 	shell accounts for this facility.
>  
> The last time I looked at XBBS, it would only allow the spawning of
> external news software - and one would have to set up an account for 
> your users to access the mailer - which would leave the system open
> for security problems.   AKCS takes a cleaner approach with the mail
> front end built into the main package.   
> 
Larry,
 
Unfortunately, you completely forgot about the Additional Features Section
of XBBS. As you know, the System Administrator can select any external
program and/or shell script as a feature for his users. Also, this you
may not know, XBBS has the capability of having MANY special SIG sections.
Each section, also has its own Additional Features section.

For the readers of this message that are not familiar with XBBS, the Additional
features section is similar to the "doors" function within may MSDOS bbs
programs. The SysAdmin can select to have a particular selected program to
be either interactive or non-interactive. If you wish to have your users
run the mail program, so be it! All you have to do is select that program
to be interactive and off it goes. I would, however, use a mail program
which does not have a shell escape. This will guarantee system security.

If you really want certain users to have "mail" capabilities, I would set
up a special SIG for this function.

Sanford <sandy> Zelkovitz   XBBS   714-821-9671 (data)
                                   714-821-9670 (voice)

P.S.   XBBS is FREE ( source code included )

larry@nstar.UUCP (Larry Snyder) (02/13/90)

> Can you explain why having an account per user would cause any security
> problem?  I can understand wanting a mail front-end built into a bbs
> for convenience but I don't see any advantage for security.

Les - I just feel better keeping strangers (unknown users) out of my shell
and restricted to the BBS (AKCS in this case) which is very secure.

To reply to your original comments - yes - shell access can be made secure.

-- 
          Larry Snyder, Northern Star Communications, Notre Dame, IN USA 
                uucp: larry@nstar -or- ...!iuvax!ndmath!nstar!larry
               4 inbound dialup high speed line public access system

david@csource.oz.au (David Nugent) (02/14/90)

 > From: sandy@locus.com (Sandy Zelkovitz)
 > Date: 12 Feb 90 15:26:43 GMT
 > Organization: Locus Computing Corp., Los Angeles
 > Message-ID: <237@elrond.locus.com>
 >
 > Unfortunately, you completely forgot about the Additional
 > Features Section
 > of XBBS. As you know, the System Administrator can select
 > any external
 > program and/or shell script as a feature for his users.
 
 
 
Good to see you're still developing it.  Last version I got was 5.1 
(from memory) ... what version is current?  Is it available PEP?
 
 
david


--  
UUCP: ...!munnari!csource!david
INTERNET: david@csource.oz.au
Via FidoNet 3:632/348, Central Source ICBS, Melbourne, Australia

karl@ddsw1.MCS.COM (Karl Denninger) (02/14/90)

In article <237@elrond.locus.com> sandy@locus.com (Sandy Zelkovitz) writes:
>In article <511182@nstar.UUCP>, larry@nstar.UUCP (Larry Snyder) writes:
>> In article <2959@murtoa.cs.mu.oz.au>, vortex@cs.mu.oz.au (Mark Gregson) writes:
>> > 	I don't suppose anyone out there would know if
>> > 	there is a BBS system for Xenix that will allow
>> > 	users to use the UUCP mail facility??
>> 
>> AKCS will do just what you are looking for plus a whole lot more.
>> 
>> > 	I have been told that XBBS will do this, is this true or
>> > 	false?? I want users to be able to send and receive UUCP
>> > 	mail whilst logged into the BBS and not have to give out
>> > 	shell accounts for this facility.
        ^^^^^^^^^^^^^^

	Bingo.  You hit the problem on the head.  Those pesky shell accounts :-)

>> The last time I looked at XBBS, it would only allow the spawning of
>> external news software - and one would have to set up an account for 
>> your users to access the mailer - which would leave the system open
>> for security problems.   AKCS takes a cleaner approach with the mail
>> front end built into the main package.   
>> 
>Larry,
> 
>Unfortunately, you completely forgot about the Additional Features Section
>of XBBS. As you know, the System Administrator can select any external
>program and/or shell script as a feature for his users. Also, this you
>may not know, XBBS has the capability of having MANY special SIG sections.
>Each section, also has its own Additional Features section.

"Doors" have a few giant drawbacks (although we provide them in AKCS too).

They require, at least under Unix:
	1) Separate accounts in order to know who's doing what, or a method
	   that is mutually understood by the CALLED PROGRAM to identify who
	   it is that is calling the program (we provide this in the form of
	   passed arguments).
	2) Ungodly amounts of concern over security; "standard" Unix utilities 
	   (mail included) simply WILL NOT DO.  This goes for text editors,
	   mailers, and nearly everything else provided in the standard Unix
	   distribution.

The second is the killer.  Let's say you don't want people getting to the
shell, for whatever reason.  Here's a partial list of what you can't let
them execute (even internally as a pager or mailer):
	vi and friends (ex, view, etc)
	more
	mail
	pg
	most other editors
	anything with a shell escape, or anything which can chain to an editor

Why?  Well, you'd think that "SHELL=/bin/true;export SHELL" would protect
you from the vi ":!".  It won't.  Try ":set shell ...." sometime inside vi,
then a ":!...." and you'll be suitably shocked.

The same problem exists with "more"; it can chain to "vi", and from there....

There is no way to protect from this without source code to those utilities.
Even if you "rsh" people they can screw you using this method.  Every scheme 
we've tried (other than removing the shell from the system!) I've been able 
to penetrate within a few minutes; "rsh" environments included.  Only a
"chroot" environment provides reasonable safety.

For mailers you have a bigger problem.  You have to do your own mail program,
and a delivery agent as well! Why?  Because most of them can change "folders"
(ie: ELM; this is deadly when one user id owns all the mailboxes!), and the 
rest want to see your mail in /usr/mail/xxxx or /usr/spool/mail/xxxx 
(depending on operating system).  Now how, may I ask, do you manage this if 
you don't have a shell account?  (not to mention delivering the mail to the 
user's mailbox itself, which rmail won't normally do without a passwd entry...) 
Chrooting the user's area is a real problem if you want to do outside mail
as well....

Doors can be useful.  We have a multiuser real-time game called "cosmos" 
which is executable through the AKCS external program functions.  It 
maintains security (there isn't a shell escape in it; if you are stupid
enough to sit around you'll be dead before you could use one :-).  "chat", 
which I have posted to alt.sources a few times (it's shareware; essentially 
an online "CB") does the same thing.

>For the readers of this message that are not familiar with XBBS, the Additional
>features section is similar to the "doors" function within may MSDOS bbs
>programs. The SysAdmin can select to have a particular selected program to
>be either interactive or non-interactive. If you wish to have your users
>run the mail program, so be it! All you have to do is select that program
>to be interactive and off it goes. I would, however, use a mail program
>which does not have a shell escape. This will guarantee system security.

Of course, this also means you have to allow the user a shell login.
Otherwise how do you get DELIVERY of the mail to their user mailbox?  Once
you've given out a shell login, you may as well give out shell access.

MSDOS people have it >somewhat< easier.  DOS isn't designed to be as easily
maneuvered into doing "open" things as Unix is.  Even so, I have heard plenty 
of tales of woe from MSDOS BBS owners who >had< a door program, had it 
"broken out of", and ended up with someone uploading (or executing) Disk 
Manager and formatting their fixed disk!  Ouch!

>If you really want certain users to have "mail" capabilities, I would set
>up a special SIG for this function.

And how about offsite mail?  How do you handle that?  SIGs are fine, with
private messages, but they won't interchange with anyone else.  From AKCS I
can mail to anywhere that my machine can reach, and any Internet or UUCP
site can mail me -- without hassles.  Just use the Reply-To: or From: address;
it will get there.

For those who will flame, no, I'm not poking at Sandy.  I'm trying to find
out if there really is an easier way to do it than AKCS does.  We looked at
this long and hard, and got more than one surprise (ie: the "set shell"
thing above) before we settled on providing the support internally and
writing a driver for smail3 to handle delivery.  There really appeared to be
no easier way to do the job correctly and in a way that wouldn't compromise
security.

No, AKCS isn't free; it's commercialware.  Yes, I wrote it.  Of course 
I'm biased.

--
Karl Denninger (karl@ddsw1.MCS.COM, <well-connected>!ddsw1!karl)
Public Access Data Line: [+1 708 566-8911], Voice: [+1 708 566-8910]
Macro Computer Solutions, Inc.		"Quality Solutions at a Fair Price"

peter@ficc.uu.net (Peter da Silva) (02/15/90)

I don't understand this aversion to giving BBS users UNIX ids. You can
make the BBS program their login shell and have all the advantages of
a secure environment, and you won't have to do any special gyrations
to get mail working.

Sure, there are a handful of interactive programs you have to hack, but
there are more free mailers/editors/pagers that you can hack the way you
like than you can shake a stick at.

Really, what's the problem?
-- 
 _--_|\  Peter da Silva. +1 713 274 5180. <peter@ficc.uu.net>.
/      \
\_.--._/ Xenix Support -- it's not just a job, it's an adventure!
      v  "Have you hugged your wolf today?" `-_-'

les@chinet.chi.il.us (Leslie Mikesell) (02/15/90)

In article <1990Feb13.214855.4265@ddsw1.MCS.COM> karl@mcs.MCS.COM (Karl Denninger) writes:
>"Doors" have a few giant drawbacks (although we provide them in AKCS too).

>They require, at least under Unix:
>	1) Separate accounts in order to know who's doing what, or a method
>	   that is mutually understood by the CALLED PROGRAM to identify who
>	   it is that is calling the program (we provide this in the form of
>	   passed arguments).
>	2) Ungodly amounts of concern over security; "standard" Unix utilities 
>	   (mail included) simply WILL NOT DO.  This goes for text editors,
>	   mailers, and nearly everything else provided in the standard Unix
>	   distribution.
[...]
>There is no way to protect from this without source code to those utilities.
>Even if you "rsh" people they can screw you using this method.  Every scheme 
>we've tried (other than removing the shell from the system!) I've been able 
>to penetrate within a few minutes; "rsh" environments included.  Only a
>"chroot" environment provides reasonable safety.

Why not provide separate accounts with the BBS program as the login shell?
This suffices for point (1).
For point (2), if you want to let them execute something that allows shell
escapes, just fork off a child that chroot()'s into a suitable padded
environment before execing the program.  

>For mailers you have a bigger problem.  You have to do your own mail program,
>and a delivery agent as well! Why?  Because most of them can change "folders"
>(ie: ELM; this is deadly when one user id owns all the mailboxes!) and the
>rest want to see your mail in /usr/mail/xxxx or /usr/spool/mail/xxxx 
>(depending on operating system).  Now how, may I ask, do you manage this if 
>you don't have a shell account?  (not to mention delivering the mail to the 
>user's mailbox itself, which rmail won't normally do without a passwd entry...) 
These are good reasons to use normal accounts (which doesn't imply shell
access if the login shell is the BBS program...).

>Chrooting the user's area is a real problem if you want to do outside mail
>as well....

Shouldn't be all that difficult if you mv the system mailbox into the chroot
area before putting the user there and provide suitable mail/rmail programs
that will leave outgoing messages queued where the parent program can find
them as you exit back to the bbs.  Or provide some IPC connection to a
server program that doesn't chroot() but does check requests carefully
(pipes on open fd's come to mind).

>[XBBS stuff deleted...]
>Of course, this also means you have to allow the user a shell login.
>Otherwise how do you get DELIVERY of the mail to their user mailbox?  Once
>you've given out a shell login, you may as well give out shell access.

Not at all.  You can provide a user id for mail but use an impossible-to-
match entry in the encrypted password field, or just specify the bbs as
their login shell.  All mail cares about is a match in the login field, and
of course you want unique id numbers for file ownership purposes.

>MSDOS people have it >somewhat< easier.  DOS isn't designed to be as easily
>maneuvered into doing "open" things as Unix is.  Even so, I have heard plenty 
>of tales of woe from MSDOS BBS owners who >had< a door program, had it 
>"broken out of", and ended up with someone uploading (or executing) Disk 
>Manager and formatting their fixed disk!  Ouch!

That's supposed to be better than unix???

Les Mikesell
  les@chinet.chi.il.us

kmcvay@oneb.UUCP (Ken McVay) (02/16/90)

In article <237@elrond.locus.com>, sandy@locus.com (Sandy Zelkovitz) writes:
>  
> Unfortunately, you completely forgot about the Additional Features Section
> of XBBS. As you know, the System Administrator can select any external
> program and/or shell script as a feature for his users. Also, this you

As a novice to Xenix, Sandy, I can tell you that I avoid offering many
features via bbs shells, simply because I do not know how to protect the
system from abuse, should a user know how to shell to the o/s from, say,
vnews or vi. For that reason, I continue to look for a bbs that will 
permit me to offer my users access to uucp mail and selected newsgroups,
while eliminating unwanted shells. 

I know AKCS will handle this, but I keep hoping something less expensive
will come along (I've been spoiled by Opus/Fido/FrontDoor/SEAdog quality -
the dos world abounds with superb packages at reasonable prices) so that
I can take full advantage of the power of this system. Consider - at the
moment, my Xenix system collects the mail and delivers it to my FrontDoor-
Opus (read: MS-DOS) system, where folks can call in and access the mail.

I know that represents a horrid waste of resources, but it's SAFE, I can
control the access totally, and don't have the security concerns that
exist on the Xenix side, due to my lack of experience.

I'd be delighted to see a bbs package that would let me offer the mail
to my users right HERE, at the source, without shelling anywhere. Ideally,
this bbs software would understand the news, protect moderated groups,
etc. without using vnews, rn, whatever.

Perhaps in a year or two I might be comfortable with shelling to specified
executables, but no way I'll permit it now....maybe one of you guys
with the talent will provide our "dream system" one day, even though, from
your point of view, it's already here :-)

cheers/
-- 
1B Systems Management Ltd. | 4B - 2520 Bowen Road, Nanaimo, B.C. V9T 3L3 
Kenneth McVay  | Voice: 604-758-7414 | Envoy: ken.mcvay | RCSA: 89:681/1
------> uunet!van-bc!oneb!kmcvay     |

karl@ddsw1.MCS.COM (Karl Denninger) (02/16/90)

In article <1990Feb15.072929.22712@chinet.chi.il.us> les@chinet.chi.il.us (Leslie Mikesell) writes:
>In article <1990Feb13.214855.4265@ddsw1.MCS.COM> karl@mcs.MCS.COM (Karl Denninger) writes:
>>"Doors" have a few giant drawbacks (although we provide them in AKCS too).
>
>>They require, at least under Unix:
>>	1) Separate accounts in order to know who's doing what, or a method
>>	   that is mutually understood by the CALLED PROGRAM to identify who
>>	   it is that is calling the program (we provide this in the form of
>>	   passed arguments).
>>	2) Ungodly amounts of concern over security; "standard" Unix utilities 
>>	   (mail included) simply WILL NOT DO.  This goes for text editors,
>>	   mailers, and nearly everything else provided in the standard Unix
>>	   distribution.
>[...]
>>There is no way to protect from this without source code to those utilities.
>>Even if you "rsh" people they can screw you using this method.  Every scheme 
>>we've tried (other than removing the shell from the system!) I've been able 
>>to penetrate within a few minutes; "rsh" environments included.  Only a
>>"chroot" environment provides reasonable safety.
>
>Why not provide separate accounts with the BBS program as the login shell?
>This suffices for point (1).

Does it?  What if you don't want the hassle (which is non-zero) for any one
of several reasons, or you just don't want to assign user logins and
passwords at the Unix level?  There may be several reasons for this; some
political (ie: you don't have "root" access on the machine) and some technical.

>For point (2), if you want to let them execute something that allows shell
>escapes, just fork off a child that chroot()'s into a suitable padded
>environment before execing the program.  

That works, but is a pain in the neck.  It requires duplicating programs 
(note that ln'ing programs is VERY dangerous for chrooted areas, as if a 
"bad guy" changes the linked image, he changes the original too!)  What
do you do if you don't have the disk space to reasonably provide that
"chrooted" area for use?

We used to run with a "chroot()"ed area.  So did Chinet, if I remember
correctly.  Neither of us do now.  Hmmmm.... I don't know why Chinet stopped
doing it, but I do know that disk consumption was part of the reason we
quit.

Also, chroot() requires root privileges to execute.  That's an entirely 
different can of worms; one that many people would rather not open.

>>For mailers you have a bigger problem.  You have to do your own mail program,
>>and a delivery agent as well! Why?  Because most of them can change "folders"
>>(ie: ELM; this is deadly when one user id owns all the mailboxes!) and the
>>rest want to see your mail in /usr/mail/xxxx or /usr/spool/mail/xxxx 
>>(depending on operating system).  Now how, may I ask, do you manage this if 
>>you don't have a shell account?  (not to mention delivering the mail to the 
>>user's mailbox itself, which rmail won't normally do without a passwd entry...) 
>These are good reasons to use normal accounts (which doesn't imply shell
>access if the login shell is the BBS program...).

Or a good reason to have the system manage the entire thing, providing a
mail reader and sender, and forget about the potential hassles of "normal 
accounts".

>>Chrooting the user's area is a real problem if you want to do outside mail
>>as well....
>
>Shouldn't be all that difficult if you mv the system mailbox into the chroot
>area before putting the user there and provide suitable mail/rmail programs
>that will leave outgoing messages queued where the parent program can find
>them as you exit back to the bbs.  Or provide some IPC connection to a
>server program that doesn't chroot() but does check requests carefully
>(pipes on open fd's come to mind).

Now you have to write a mail delivery program.  

I guess this is ok if you want to hack on things for a few
(days/weeks/months).  It's not so hot if you want to take something out of
the package, install and use it!

Not all people who want to run systems for the public also want to take 2-3
weeks to get things set up and stabilized, not to mention tested.  

Mail delivery isn't exactly trivial either.  You would think it would be,
but it's not -- since not all user agents output mail in a RFC-compatible
format (or are missing important headers, such as mail(1)).  We ran into 
this originally when we were working on AKCS, which is why we now recommend 
that people go to smail3 (most vendor's mail packages have at least one or 
two warts :-)

>>[XBBS stuff deleted...]
>>Of course, this also means you have to allow the user a shell login.
>>Otherwise how do you get DELIVERY of the mail to their user mailbox?  Once
>>you've given out a shell login, you may as well give out shell access.
>
>Not at all.  You can provide a user id for mail but use an impossible-to-
>match entry in the encrypted password field, or just specify the bbs as
>their login shell.  All mail cares about is a match in the login field, and
>of course you want unique id numbers for file ownership purposes.

The "of course" can be rather, uh, interesting when you run into the 32k
limit on user id numbers.  Now you get to compact the /etc/passwd file, or
do something automatically to do the same.

One of the nice things about getting the bbs user information out of
/etc/passwd is that you >know< at a glance that anyone who has a password
entry is a shell user and not a "bbs" user.  Very useful indeed when you're
trying to keep track of what's going on!

>>MSDOS people have it >somewhat< easier.  DOS isn't designed to be as easily
>>maneuvered into doing "open" things as Unix is.  Even so, I have heard plenty 
>>of tales of woe from MSDOS BBS owners who >had< a door program, had it 
>>"broken out of", and ended up with someone uploading (or executing) Disk 
>>Manager and formatting their fixed disk!  Ouch!
>
>That's supposed to be better than unix???

I didn't say "better", I said less likely to give you a "gotcha" without
your knowing about it.  Every MSDOS user knows what FORMAT C: does.  Not too
many mainstream Unix buyers know what dd can do to /dev/dsk/0s0!

Too many vendors do really foolish (and poor) things like shipping their 
Unices so they install with writable roots, writable device files (ouch!) 
and lots of other "fun" things.  SCO and 386/ix aren't immune to this; both 
of those required some work before they were secure enough to let people at 
the shell without too much worry.  We've closed the obvious holes... but it
wasn't that way when freshly installed.

Joe Average UNIX installer (who is more and more the typical Unix buyer!)
doesn't know all these things, isn't going to take the time to learn them,
and WILL get hurt.  Saying "well, you should know" isn't good enough if we
expect Unix to catch on as a "mainstream" operating system.  Trying to get
the vendors to clean up their acts (and installations) isn't easy (if even
possible) either.  So what do you do?

You make your products as bulletproof as possible.  You allow the shell user,
or the person with login access (but a shell of your product) to use the 
package -- without hassle.  You also provide a nice secure path in which
doesn't require that the user be able to do these things if you can.

Choice is the name of the game; that's the Unix way, isn't it? :-) 

--
Karl Denninger (karl@ddsw1.MCS.COM, <well-connected>!ddsw1!karl)
Public Access Data Line: [+1 708 566-8911], Voice: [+1 708 566-8910]
Macro Computer Solutions, Inc.		"Quality Solutions at a Fair Price"

dell@Apple.COM (Thomas E. Dell) (02/16/90)

peter@ficc.uu.net (Peter da Silva) writes:

>I don't understand this aversion to giving BBS users UNIX ids. You can
>make the BBS program their login shell and have all the advantages of
>a secure environment, and you won't have to do any special gyrations
>to get mail working.
>
>Sure, there are a handful of interactive programs you have to hack, but
>there are more free mailers/editors/pagers that you can hack the way you
>like than you can shake a stick at.
>
>Really, what's the problem?

With say 2,000 BBS users, I would prefer they all use one group account
than add two thousand unnecessary lines to the password file. 

And if you play games with getty, you can make it so that dialup BBS 
users receive your BBS directly, instead of /bin/login. No one will try 
to break into 'root', 'uucp', etc. as it tempting with Unix BBS's. 

The approach taken by Waffle is to include mail & news as an integral
part of the BBS - there is no worry of escaping out of external programs,
and you have considerably more control over which newsgroups users may
have access to {post,read}. This also leads to a much nicer UI. Of course 
if you WANT to do this via externals ("roll your own"), you can, but it 
isn't recommended.

For importing mail, a program is supplied to receive mail diverted from
smail or sendmail aliases. This may require a large number of aliases, but 
I prefer this method over granting individual accounts or using an "akcs." 
prefix in front of everyone's username.

Like AKCS, waffle is also commercial ($100 for Xenix source, contact 
root@vox.darkside.com for details if anyone is interested). 

     ...Tom

dell@apple.com / root@vox.darkside.com / Thomas E Dell

larry@nstar.UUCP (Larry Snyder) (02/16/90)

In article <1899@oneb.UUCP>, kmcvay@oneb.UUCP (Ken McVay) writes:
> 
> I know AKCS will handle this, but I keep hoping something less expensive
> will come along (I've been spoiled by Opus/Fido/FrontDoor/SEAdog quality -
> the dos world abounds with superb packages at reasonable prices) so that
 
Ken - AKCS prices (last time I checked) started as low as $89 (for
286 based machines) with 386 versions available for $149.  I consider
those prices in the same range as SEADOG/FrontDoor - since Seadog
was selling for $90 - and that was only the front end (no BBS package).

-- 
          Larry Snyder, Northern Star Communications, Notre Dame, IN USA 
                uucp: larry@nstar -or- ...!iuvax!ndmath!nstar!larry
               4 inbound dialup high speed line public access system

palowoda@fiver.UUCP (Bob Palowoda) (02/17/90)

From article <LER1FK4xds13@ficc.uu.net>, by peter@ficc.uu.net (Peter da Silva):
> I don't understand this aversion to giving BBS users UNIX ids. You can
> make the BBS program their login shell and have all the advantages of
> a secure environment, and you won't have to do any special gyrations
> to get mail working.
> 
> Sure, there are a handful of interactive programs you have to hack, but
> there are more free mailers/editors/pagers that you can hack the way you
> like than you can shake a stick at.
> 
> Really, what's the problem?



  Hmm, I guess I can make a comment here after running a bbs for a while.
First when attracting first time users to a bbs specially a UNIX bbs you
want to make the editors very easy to use. And you want the editors to
resemble what the more popular bbs in dos type world uses. Something
like the PC-Board editors. Lots of online menu most likely able to use
ansi sequences and ibm graphics characters to format the menus. So far
this dosn't exsist. Or I just haven't seen it yet. Also vi is out. 
Try teaching over 2000 people vi online. There are editor that control 
security level like 'Fenix'. However last time I checked there was no
online default help menu that pops up when entering the editor. 

  As for not createing an account for every user I tend to agree with
the other sysops. Not so much as a security reason. But for the fact
of system accounting. I would rather have the bbs program maintain itself
and not use UNIX to do it. A database of user account info, paths termtypes
which also the user could setup through 'none unix account methods'. Try
teaching a first time user unix accounting and you will see what I mean.
Maybe Karls bbs has this already. I haven't seen it. 

  As for the mail program ELM would be perfect with the shell functions
stripped out. I figure I could use some sort of system alais to the 
bbsuser.first.lastname and let sendmail handle it. Once again this should
fit in with the proper editor like I mention above and be coupled into
a security level of the user database info. Also the database could
control the local users mail in another directory by the user without
going to the system.

  Out of all the UNIX type bbs I have tried none of them meet all the above
needs. I use XBBS because of it's user interface. Dosn't mean it's the
best. It's a bear to maintain.  But I give high marks for the user 
interface. Does it make a difference. I should think so, it may where
your future customers get thier first impression. Or last.

---Bob
   
-- 
Bob Palowoda  pacbell!indetech!palowoda    *Home of Fiver BBS*  login: bbs
Home {sun|daisy}!ys2!fiver!palowoda         (415)-623-8809 1200/2400
Work {sun|pyramid|decwrl}!megatest!palowoda (415)-623-8806 2400/9600/19200 TB
Voice: (415)-623-7495                        Public access UNIX XBBS   

allbery@NCoast.ORG (Brandon S. Allbery) (02/18/90)

As quoted from <999@fiver.UUCP> by palowoda@fiver.UUCP (Bob Palowoda):
+---------------
| First when attracting first time users to a bbs specially a UNIX bbs you
| want to make the editors very easy to use. And you want the editors to
| resemble what the more popular bbs in dos type world uses. Something
+---------------

Peter specifically mentioned *freeware* editors, *not* vi.  As far as editors
with automatic pop-up help menus, take a look at MicroEmacs sometime.  (Not
that I recommend dumping a novice into Emacs....)

+---------------
|   As for not createing an account for every user I tend to agree with
| the other sysops. Not so much as a security reason. But for the fact
| of system accounting. I would rather have the bbs program maintain itself
| and not use UNIX to do it. A database of user account info, paths termtypes
+---------------

Nobody said you had to turn on system accounting to use Unix user IDs; use the
same accounting methods you would with any other Unix BBS.

Way back when, I considered using Unix user names and giving each user his/her
own account; I rejected it because "login:" (and "Login incorrect") are rather
unfriendly... not to mention BSD-based systems and AT&T's 3B/2's which don't
accept what your typical user expects for a backspace (BSD systems I've used
demand DEL; 3B/2's want #.  (Yes, pound sign!  Welcome to the 90's, now go buy
an ASR33!  ;-)

++Brandon
-- 
Brandon S. Allbery    allbery@NCoast.ORG, BALLBERY (MCI Mail), ALLBERY (Delphi)
      uunet!cwjcc.cwru.edu!ncoast!allbery ncoast!allbery@cwjcc.cwru.edu

randy@chinet.chi.il.us (Randy Suess) (02/19/90)

In article <1990Feb15.204106.8719@ddsw1.MCS.COM> karl@mcs.MCS.COM (Karl Denninger) writes:
]
]We used to run with a "chroot()"ed area.  So did Chinet, if I remember
]correctly.  Neither of us do now.  Hmmmm.... I don't know why Chinet stopped
]doing it, but I do know that disk consumption was part of the reason we
]quit.
]
	This was during the time of extreme security paranoia.  Chroot
	(under sysVr3.1 on a 3b2) worked out quite well, including
	a complete seperate set of /dev entries, links to most /usr stuff
	(/bin and /etc stuff had to be duplicated).  A number of programs
	were modified to work across the chroot partitions, including
	the conferencing system, and the party program.  Email was
	strictly within the chrooted area.
	It was finally removed due to other policy decisions, not because
	of unworkability.

	-randy
-- 
Randy Suess
randy@chinet.chi.il.us

karl@ddsw1.MCS.COM (Karl Denninger) (02/19/90)

In article <1990Feb18.180120.22530@chinet.chi.il.us> randy@chinet.chi.il.us (Randy Suess) writes:
>In article <1990Feb15.204106.8719@ddsw1.MCS.COM> karl@mcs.MCS.COM (Karl Denninger) writes:
>]
>]We used to run with a "chroot()"ed area.  So did Chinet, if I remember
>]correctly.  Neither of us do now.  Hmmmm.... I don't know why Chinet stopped
>]doing it, but I do know that disk consumption was part of the reason we
>]quit.
>]
>	This was during the time of extreme security paranoia.  Chroot
>	(under sysVr3.1 on a 3b2) worked out quite well, including
>	a complete seperate set of /dev entries, links to most /usr stuff
>	(/bin and /etc stuff had to be duplicated).  A number of programs
>	were modified to work across the chroot partitions, including
>	the conferencing system, and the party program.  

That's interesting; I would think that if the conferencing package was
looking for a base directory (from a common reference) nothing would have to
be done other than having two "directing" files.... but then again, I know
little of the internals of Picospan (what is running over on Chinet)

In fact, AKCS was designed with just this in mind; when we were doing the
chroot thing ourselves it was during the time that AKCS was being originally
designed and that was a major part of it.

>       Email was
>	strictly within the chrooted area.

Which is a problem if you want people to be able to get/send offsite mail :-)

>	It was finally removed due to other policy decisions, not because
>	of unworkability.

Yep.  We stopped using it here partly because of problems with disk space
(we don't have unlimited room available on that machine) and partly due to
the decision which was made not to grant shell access to other than system
contributors.  It certainly did work, although we never put the time into
making email operate properly across the chroot()ed area.

The entire "security" thing may come back with a vengence. There have been a
couple of incidents lately which may end up having a large impact on the
future of "freely available" shell access..... one would hope not, but it
seems as though allowing that kind of free roaming is asking for far more
trouble than it is worth.....

--
Karl Denninger (karl@ddsw1.MCS.COM, <well-connected>!ddsw1!karl)
Public Access Data Line: [+1 708 566-8911], Voice: [+1 708 566-8910]
Macro Computer Solutions, Inc.		"Quality Solutions at a Fair Price"

randy@chinet.chi.il.us (Randy Suess) (02/19/90)

In article <1990Feb18.212134.15800@ddsw1.MCS.COM> karl@mcs.MCS.COM (Karl Denninger) writes:
]>]
]>	A number of programs
]>	were modified to work across the chroot partitions, including
]>	the conferencing system, and the party program.  
]
]That's interesting; I would think that if the conferencing package was
]looking for a base directory (from a common reference) nothing would have to
]be done other than having two "directing" files.... but then again, I know
]little of the internals of Picospan (what is running over on Chinet)
]
	Picospan has hard coded path names in it, so I had to have
	two versions, one in the chroot partition pointing to
	the normal conference tree, /usr/bbs and the modified pico 
	pointing to the chrooted partition, /usr/guest/usr/bbs, 
	usr/guest being the chroot partition.

]In fact, AKCS was designed with just this in mind; when we were doing the
]chroot thing ourselves it was during the time that AKCS was being originally
]designed and that was a major part of it.
]
	Picospan was designed back when UNIX ran on tube based computers.

]>       Email was strictly within the chrooted area.
]
]Which is a problem if you want people to be able to get/send offsite mail :-)
]
	Which was the primary reason for running the chroot stuff.  
	Temporary guests can't email AT&T source code to themselves.
	This is what started the whole security paranoia thing.
	Seems chinet is used alot by local Bell Lab's people.
	I have more fake logins belonging to AT&T Security people
	than regular users!

]>	It was finally removed due to other policy decisions, not because
]>	of unworkability.
]
]Yep.  We stopped using it here partly because of problems with disk space
](we don't have unlimited room available on that machine) and partly due to
]the decision which was made not to grant shell access to other than system
]contributors.
]
	I decided that I am running an public access UNIX system, and
	if guests cannot access all that UNIX can give them, I might
	as well shut it all down.  Paranoia was no fun.

]The entire "security" thing may come back with a vengence. There have been a
]couple of incidents lately which may end up having a large impact on the
]future of "freely available" shell access..... one would hope not, but it
]seems as though allowing that kind of free roaming is asking for far more
]trouble than it is worth.....
]
	It is interesting that I havn't seen anything on the net
	about the above.  A local UNIX bbs was shutdown/confiscated
	by a 3 letter agency because of having the unfortunate
	distinction of being home to the 911 crackers a few weeks
	back.
]Karl Denninger (karl@ddsw1.MCS.COM, <well-connected>!ddsw1!karl)

-- 
Randy Suess
randy@chinet.chi.il.us

morrison@ficc.uu.net (Brad Morrison) (02/20/90)

In article <1990Feb13.214855.4265@ddsw1.MCS.COM> karl@mcs.MCS.COM (Karl Denninger) writes:

>The second is the killer.  Let's say you don't want people getting to the
>shell, for whatever reason.  Here's a partial list of what you can't let
>them execute (even internally as a pager or mailer):
>	vi and friends (ex, view, etc)
>	more
>	mail
>	pg
>	most other editors
>	anything with a shell escape, or anything which can chain to an editor

>Why?  Well, you'd think that "SHELL=/bin/true;export SHELL" would protect
>you from the vi ":!".  It won't.  Try ":set shell ...." sometime inside vi,
>then a ":!...." and you'll be suitably shocked.

>The same problem exists with "more"; it can chain to "vi", and from there....

>There is no way to protect from this without source code to those utilities.
>Even if you "rsh" people they can screw you using this method.  Every scheme 
>we've tried (other than removing the shell from the system!) I've been able 
>to penetrate within a few minutes; "rsh" environments included.  Only a
>"chroot" environment provides reasonable safety.

What about having a wrapper around the real shells that only execs the
real one if the user id is below some threshold?  Then give your restricted
users IDs above the threshold.
-- 

kmcvay@oneb.UUCP (Ken McVay) (02/20/90)

In article <LER1FK4xds13@ficc.uu.net>, peter@ficc.uu.net (Peter da Silva) writes:
> Sure, there are a handful of interactive programs you have to hack, but
> 
> Really, what's the problem?

The "problem" is that many of us (new to unix) folks neither know what, where,
or HOW to "hack," nor do we WANT to. And, if I may be so bold to make a 
prediction, as more and more "illiterati" join the ranks of 386-owning, *IX-
running system administrators, the demand for hackless uucp-capable, news-
reading bulletin board systems will increase sharply....as will the desire
to provide them.

I'm delighted that you enjoy programming - we couldn't get along without
you - but I don't, and products that require me to do so won't fly.  This is
not to say that those who have worked so hard to provide the systems that DO
exist aren't appreciated - they are - but their systems never achieve full
potential on "no-hacker" systems, and never will. As hardware costs come
down, and o/s costs follow, the need for friendlier bbs software will
increase...hopefully it will one day reach the friendly functionality of
Opus, Fido, QBBS, RemoteAccess, PCBoard and RBBS-PC :-)



-- 
1B Systems Management Ltd. | 4B - 2520 Bowen Road, Nanaimo, B.C. V9T 3L3 
Kenneth McVay  | Voice: 604-758-7414 | Envoy: ken.mcvay | RCSA: 89:681/1
------> uunet!van-bc!oneb!kmcvay     |

karl@ddsw1.MCS.COM (Karl Denninger) (02/20/90)

In article <1990Feb19.135042.3950@chinet.chi.il.us> randy@chinet.chi.il.us (Randy Suess) writes:
>In article <1990Feb18.212134.15800@ddsw1.MCS.COM> karl@mcs.MCS.COM (Karl Denninger) writes:

.................

>]>       Email was strictly within the chrooted area.
>]
>]Which is a problem if you want people to be able to get/send offsite mail :-)
>]
>	Which was the primary reason for running the chroot stuff.  
>	Temporary guests can't email AT&T source code to themselves.
>	This is what started the whole security paranoia thing.
>	Seems chinet is used alot by local Bell Lab's people.
>	I have more fake logins belonging to AT&T Security people
>	than regular users!

Which says something for (or against, depending on your point of view) for
validation of all new users before you grant then access, or at least before
you grant them continued access.

I have caught a couple of "security spooks" on our system once or twice.
They were summarially ejected since they didn't provide accurate and honest
registration information.  One was caught on-line and disconnected while
logged into ANOTHER user's account!  The person who's account was penetrated
(using what may or may not have been illegal means) declined to take further
action after being notified (other than changing the account password).

>]>	It was finally removed due to other policy decisions, not because
>]>	of unworkability.
>]
>]Yep.  We stopped using it here partly because of problems with disk space
>](we don't have unlimited room available on that machine) and partly due to
>]the decision which was made not to grant shell access to other than system
>]contributors.
>]
>	I decided that I am running an public access UNIX system, and
>	if guests cannot access all that UNIX can give them, I might
>	as well shut it all down.  Paranoia was no fun.

I agree that paranoia is no fun.  For a personally-owned system I can be
seen to agree that it's no "big deal" if the system someday goes away on you
for an indefinite period of time, or even permanently.  On the other hand I
wouldn't like it at all, and aren't about to allow it if I can help it.

For a commercially owned machine it's an entirely different game, especially 
if you have a nice Ethernet between systems (then all of them are subject to
"going away").  Scratch one business.

>]The entire "security" thing may come back with a vengence. There have been a
>]couple of incidents lately which may end up having a large impact on the
>]future of "freely available" shell access..... one would hope not, but it
>]seems as though allowing that kind of free roaming is asking for far more
>]trouble than it is worth.....
>]
>	It is interesting that I havn't seen anything on the net
>	about the above.  A local UNIX bbs was shutdown/confiscated
>	by a 3 letter agency because of having the unfortunate
>	distinction of being home to the 911 crackers a few weeks
>	back.

Oh, but we have.  Do you read comp.dcom.telecom?  The little fiasco with the
E911 people was described there, and it made my blood run cold.  What if
that file on the E911 system had been, Gods forbid, posted to the net?

The owner's involvement or cooperation in this particular case isn't at
issue; he wasn't named in the indictment, and to my knowledge isn't under
suspicion of any wrongdoing.  Nonetheless, his machine is at the present
time not in his possession, and while we all hope it is returned soon,
it could remain "gone" until the trials of the people who have been 
indicted.  That could easily be >years< from now!

Folks, having the FBI come to my door and asking for dump tapes from my
system to prove that someone did a bad thing is one thing, but having them 
come and take the >machine<, when I was not personally involved in the
wrongdoing, is NOT OK.

How, without the security being damn tight, do you prevent it from 
happening to you or I?  If you give out shell access to anyone who asks, 
you may find one day that you too have some "classified" (or proprietary) 
information on the system -- when the 3-letter agencies come knocking on 
your door.  Security scans are one thing, but they won't find things that
don't have obvious names (or contents).  How many of us "grep" every text
file on the system, and even if you do what if the user in question does
a simple rotation on the file to thwart this investigation?  

The problem is by no means small.  The only real solution seems to SEEK AND
GET common carrier status -- which solves the problem.  It's the reason the 
phone company doesn't get seized when a drug deal is done over the phone.  

With common carrier status the BBS/Public Access system owner is exempt from
having his/her equipment grabbed unless the authorities can show that he/she
knew that the activity was going on and permitted it (or worse, took part!)
In other words, unless you are charged with a crime (or indicted), your
equipment is safe.  They can still ask for your records (if you keep them)
and/or dump tapes, but your equipment stays where it belongs.

This is what every public-access site, every BBS, needs.  Common carrier
status.  There are precedents for this -- CI$ has it, for example.  Why 
not the "little guys"?

As things sit now all public-access sites which grant access to the shell,
for pay or not, are in jeopardy due to a few twits.  I know this isn't exactly
the right place for this kind of posting, but it IS something to think about
if you currently offer (or are thinking of offering) public access to your
Unix system. 

Your machine could be next.  

There is currently work being done on this very item.  Stay tuned.  Send
support (just voices at this point please) here; I'll forward the notes to 
the appropriate parties.

--
Karl Denninger (karl@ddsw1.MCS.COM, <well-connected>!ddsw1!karl)
Public Access Data Line: [+1 708 566-8911], Voice: [+1 708 566-8910]
Macro Computer Solutions, Inc.		"Quality Solutions at a Fair Price"

cpcahil@virtech.uucp (Conor P. Cahill) (02/21/90)

In article <.OV1S=Axds13@ficc.uu.net> morrison@ficc.uu.net (Brad Morrison) writes:
>What about having a wrapper around the real shells that only execs the
>real one if the user id is below some threshold?  Then give your restricted
>users IDs above the threshold.

Because all that would need to happen is that the user's find out what the name 
of the real shell.  Of course, a better solution would be to place the shell
into a different group and set the modes to 0750.  Then you could set up the
group of the incomming users so that only those within said group can run
the applicable program.  However, this could cause lots of problems
when the user tries to execute a function/program that depends upon the 
shell being available for non-interactive work (such as getcwd() on a system
V system), then these functions would fail unexplicably.

The best answer is still a chrooted environment or a much better controlled
environment.
-- 
+-----------------------------------------------------------------------+
| Conor P. Cahill     uunet!virtech!cpcahil      	703-430-9247	!
| Virtual Technologies Inc.,    P. O. Box 876,   Sterling, VA 22170     |
+-----------------------------------------------------------------------+

karl@ddsw1.MCS.COM (Karl Denninger) (02/21/90)

In article <.OV1S=Axds13@ficc.uu.net> morrison@ficc.uu.net (Brad Morrison) writes:
>In article <1990Feb13.214855.4265@ddsw1.MCS.COM> karl@mcs.MCS.COM (Karl Denninger) writes:
>
>>The second is the killer.  Let's say you don't want people getting to the
>>shell, for whatever reason.  Here's a partial list of what you can't let
>>them execute (even internally as a pager or mailer):
>>	vi and friends (ex, view, etc)
>>	more
>>	mail
>>	pg
>>	most other editors
>>	anything with a shell escape, or anything which can chain to an editor
>
>>Why?  Well, you'd think that "SHELL=/bin/true;export SHELL" would protect
>>you from the vi ":!".  It won't.  Try ":set shell ...." sometime inside vi,
>>then a ":!...." and you'll be suitably shocked.
>
>>The same problem exists with "more"; it can chain to "vi", and from there....
>
>>There is no way to protect from this without source code to those utilities.
>>Even if you "rsh" people they can screw you using this method.  Every scheme 
>>we've tried (other than removing the shell from the system!) I've been able 
>>to penetrate within a few minutes; "rsh" environments included.  Only a
>>"chroot" environment provides reasonable safety.
>
>What about having a wrapper around the real shells that only execs the
>real one if the user id is below some threshold?  Then give your restricted
>users IDs above the threshold.

But what if the user finds out the real shell's name?

SUID'ing the "wrapper" program won't work either, since it has to set the
user id's to the real ones >before< it execs the real shell, and thus you
again can get caught out.

Security by obscurity is not security; it's hiding things.  And hidden
things aren't locked, they're simply hidden.  Of course, since they are only
hidden, they can also be found.

Once a user finds out what you called /bin/sh (if you rename it) they can
have a jolly good time using the same method as above.

--
Karl Denninger (karl@ddsw1.MCS.COM, <well-connected>!ddsw1!karl)
Public Access Data Line: [+1 708 566-8911], Voice: [+1 708 566-8910]
Macro Computer Solutions, Inc.		"Quality Solutions at a Fair Price"

frk@mtxinu.COM (Frank Korzeniewski) (02/22/90)

In article <1990Feb20.191019.9391@virtech.uucp> cpcahil@virtech.UUCP (Conor P. Cahill) writes:
#In article <.OV1S=Axds13@ficc.uu.net> morrison@ficc.uu.net (Brad Morrison) writes:
#>What about having a wrapper around the real shells that only execs the
#>real one if the user id is below some threshold?  Then give your restricted
#>users IDs above the threshold.
#
#Because all that would need to happen is that the user's find out what the name 
#of the real shell.  Of course, a better solution would be to place the shell
#into a different group and set the modes to 0750.  Then you could set up the
#group of the incomming users so that only those within said group can run
#the applicable program.  However, this could cause lots of problems
#when the user tries to execute a function/program that depends upon the 
#shell being available for non-interactive work (such as getcwd() on a system
#V system), then these functions would fail unexplicably.
#
#The best answer is still a chrooted environment or a much better controlled
#environment.

Brads idea could be extended just a little bit to overcome your objections.
Just use bash or ash for which the source is available and put the wrapper
check on the user id into the shell source code.  Lets see a user get
around this!!

Frank Korzeniewski     (frk@mtxinu.com)

morrison@ficc.uu.net (Brad Morrison) (02/22/90)

>>In article <1990Feb13.214855.4265@ddsw1.MCS.COM> karl@mcs.MCS.COM (Karl Denninger) posed the problem of the shell escapes from things, especially vi.

Then, in article <.OV1S=Axds13@ficc.uu.net>, I proposed a wrapper around
the real shell to exclude restricted users.

In article <1990Feb20.202554.19826@ddsw1.MCS.COM> karl@mcs.MCS.COM (Karl Denninger) writes:

>But what if the user finds out the real shell's name?

Touche; I hadn't thought about this...Conor P. Cahill also pointed this
out, and I'm sure that more people have thought of it.

>Security by obscurity is not security; it's hiding things.  And hidden
>things aren't locked, they're simply hidden.  Of course, since they are only
>hidden, they can also be found.

So hiding it is out.  I think that the problem isn't hacking the shell,
though; of all the tools mentioned as permitting shell escapes, the only
real offender is 'vi'.  All of the others are bad only because they can
chain to vi and get a configurable shell escape via ":set shell=/bin/sh".

But you don't want to exclude 'vi', I don't think.  What about replacing
it, instead of replacing the shell?
-- 
Brad Morrison                (713) 274-5449 |   "OK.  Come back tomorrow.
Ferranti International Controls Corporation |    Bring two apples and
uunet!ficc!morrison    morrison@ficc.uu.net |    a hammer."

karl@ficc.uu.net (Karl Lehenbauer) (02/23/90)

In article <PYX1O.9xds13@ficc.uu.net> morrison@ficc.uu.net (Brad Morrison) writes:
>But you don't want to exclude 'vi', I don't think.  What about replacing
>it, instead of replacing the shell?

Yeah, and elvis is a good vi clone, even superior to vi in some respects.
It's still a pain to go in an edit it to not have shell escapes and to
not allow entering arbitrary pathnames/filenames, but it's in our BBS-to-do
job jar.
-- 
-- uunet!ficc!karl "...as long as there is a Legion of super-Heroes, 
   uunet!sugar!karl       all else can surely be made right."   -- Sensor Girl

cpcahil@virtech.uucp (Conor P. Cahill) (02/24/90)

In article <1134@mtxinu.UUCP> frk@mtxinu.UUCP (Frank Korzeniewski) writes:
>Brads idea could be extended just a little bit to overcome your objections.
>Just use bash or ash for which the source is available and put the wrapper
>check on the user id into the shell source code.  Lets see a user get
>around this!!

Fine.  This could be done. However, you will still break any program that
does a popen(). (or calls a library routine that does a popen()).

In addition most system administrators will not
want to rely on anything other than the stock sh or csh for system 
administration work.  If you replaced /bin/sh with bash, you would be
opening lots of doors for lots of problems with the system administration
shell scripts.

If you are going to leave the real shell around somewhere else, then
you have the problem of the user's finding out where it is.


These kind of security problems have lots of quick answers, but with
a little thought a persistant person can get around most of them.  I still
think the "best" answer is to have the restricted persons run in a 
chroot()ed environment because there is no way to get out of there. 
-- 
+-----------------------------------------------------------------------+
| Conor P. Cahill     uunet!virtech!cpcahil      	703-430-9247	!
| Virtual Technologies Inc.,    P. O. Box 876,   Sterling, VA 22170     |
+-----------------------------------------------------------------------+

peter@ficc.uu.net (Peter da Silva) (02/27/90)

> The "problem" is that many of us (new to unix) folks neither know what, where,
> or HOW to "hack," nor do we WANT to. And, if I may be so bold to make a 
> prediction, as more and more "illiterati" join the ranks of 386-owning, *IX-
> running system administrators, the demand for hackless uucp-capable, news-
> reading bulletin board systems will increase sharply....as will the desire
> to provide them.

So what you're saying is that there's a market for small, friendly, bbs-
compatible programs like editors, mail readers, and so on. One of these
days I'll get the Sugarland UNIX software into shape.

But that really doesn't explain why none of the existing UNIX-based BBS
programs make more than a token attempt to be well-integrated with UNIX.

Which is, after all, the point.
-- 
 _--_|\  Peter da Silva. +1 713 274 5180. <peter@ficc.uu.net>.
/      \
\_.--._/ Xenix Support -- it's not just a job, it's an adventure!
      v  "Have you hugged your wolf today?" `-_-'

david@oldcolo.UUCP (David Hughes Jr) (03/04/90)

Have followed this string with interest.  I am attempting to bring up UFGate
under Opus.  Has anyone out there done this?  I have Opus and UFGate
installed, all the control files making proper calls (according to docs). 
But it doesn't work.  

Anyone doing UFGate and can answer some questions (outside this conference)?

david hughes

larry@nstar.UUCP (Larry Snyder) (03/05/90)

In article <W+-1B-Fxds13@ficc.uu.net>, peter@ficc.uu.net (Peter da Silva) writes:
> So what you're saying is that there's a market for small, friendly, bbs-
> compatible programs like editors, mail readers, and so on. One of these
> days I'll get the Sugarland UNIX software into shape.

I'm looking for a good small safe wordstar compatible editor for use
under 386/ix (or Xenix). 
-- 
The Northern Star Public Access Unix Site, Notre Dame, Indiana USA 
     uucp: iuvax!ndmath!nstar!larry    internet: larry@nstar
USR HST 219-287-9020 * PEP 219-289-3745	* Hayes V9600 219-289-0286

roy@comcon.UUCP (Roy M. Silvernail) (03/05/90)

In article <511237@nstar.UUCP>, larry@nstar.UUCP (Larry Snyder) writes:
> 
> I'm looking for a good small safe wordstar compatible editor for use
> under 386/ix (or Xenix). 

I was looking for just about the same thing, and found nada... so I
grabbed the stevie source, installed a new restricted_user command, and
put it up on my BBS for the users. 

No, it's not as easy to use as WS-types, but it's lots more powerful,
and the users in the programming cadre really like it!

-- 
_R_o_y _M_. _S_i_l_v_e_r_n_a_i_l  | UUCP: uunet!comcon!roy  |  "Every race must arrive at this
#include <opinions.h>;#define opinions MINE  |   point in its history"
SnailMail: P.O. Box 210856, Anchorage,       |   ........Mr. Slippery
Alaska, 99521-0856, U.S.A., Earth, etc.      |  <Ono-Sendai: the right choice!>

uimop@alake.FIDONET.ORG (Greg Sheppard) (03/08/90)

DH> Anyone doing UFGate and can answer some questions (outside this confer
  
 David, I'm running UFGate with Searchlight BBS software.  Not quite
the same as Opus, but it's working pretty good.  Give me a call and we
can continue this voice.


--  
Greg Sheppard                                   Telephone: 1-206-581-4276
imop@alake.UUCP                                      Work: 1-206-581-8924

david@oldcolo.UUCP (David Hughes Jr) (03/14/90)

I just installed UFGate too.  Works smooth.  It was all the other MSDOS BBS
software that drove me to insanity.  

Now running though.  Can you give a quickie paragraph on Searchlight
software?

tx, david hughes

uucp: oldcolo!david