[comp.sys.apollo] Patches and security

dente@els.ee.man.ac.uk (Colin Dente) (07/19/90)

Ho hum - so much for my ideas about not disclosing the nature of
security-related patches...

Following Jim Richardson's recent mention of patch_m0121, and the importance
of installing the same, I thought 'Hmm... 'spose I'd better get hold
of a copy.'  So, I 'phoned the response centre here in the UK, said I was
after a security related patch, gave them the patch number, and waited
for them to call me back.  The first thing that the response centre
person did was to confirm that I had the right patch number by telling
me precisely the nature of the security hole that it fixes!!  Oh boy
oh boy! nasty one that.

Can I ask any HP/Apollo people reading this to press for it to become
corporate policy (or whatever you call it) NOT to disclose information
of this nature.  I intend to speak to the person involved, and whoever
is in charge of such things in the UK, but in the mean time, PLEASE
keep the nature of security holes quiet.

Anyway, I would repeat Jim's comments on this patch - get it and
install it!!

Colin



--
 Colin Dente                      | JANET: dente@uk.ac.man.ee.els
 Dept. of Electrical Engineering  | ARPA:  dente@els.ee.man.ac.uk 
 University of Manchester, UK     | UUCP:  ...!ukc!man.ee.els!dente 
--------------------------------------------------------------------

rees@dabo.ifs.umich.edu (Jim Rees) (07/20/90)

In article <1469@m1.cs.man.ac.uk>, dente@els.ee.man.ac.uk (Colin Dente) writes:
  PLEASE keep the nature of security holes quiet.

I disagree, and patch 121 is a perfect example of why we need to discuss
security holes.  Unless I miss my guess, this patch does not fix the hole at
all, it just removes a copy of a program that exploits that hole.  You go
away thinking your machine is now somehow more secure, and anyone who really
wants to can still get in.

I may be wrong, but since we're not discussing this hole here, we'll never
find out, will we?

jonathan@jarthur.Claremont.EDU (Jonathan Ball) (07/20/90)

In article <1990Jul19.193641.23420@terminator.cc.umich.edu> rees@citi.umich.edu (Jim Rees) writes:
   In article <1469@m1.cs.man.ac.uk>, dente@els.ee.man.ac.uk (Colin Dente) writes:
   > PLEASE keep the nature of security holes quiet.
   
   I disagree, and patch 121 is a perfect example of why we need to discuss
   security holes.  Unless I miss my guess, this patch does not fix the hole at
   all, it just removes a copy of a program that exploits that hole.  You go
   away thinking your machine is now somehow more secure, and anyone who really
   wants to can still get in.
   
   I may be wrong, but since we're not discussing this hole here, we'll never
   find out, will we?

Well, perhaps Jim Richardson and anyone else who DOES know what the problem
is, and HAS applied the patch, could tell us that information without
revealing the hole to the rest of the world.

Jon
-- 
jonathan@jarthur.claremont.edu (134.173.4.42)

jimr@maths.su.oz.au (Jim Richardson) (07/20/90)

In article <7871@jarthur.Claremont.EDU>, jonathan@jarthur.Claremont.EDU (Jonathan
Ball) writes:
>   I may be wrong, but since we're not discussing this hole here, we'll never
>   find out, will we?
>
>Well, perhaps Jim Richardson and anyone else who DOES know what the problem
>is, and HAS applied the patch, could tell us that information without
>revealing the hole to the rest of the world.

As I said in my previous posting <1990Jul17.004711.19627@metro.ucc.su.OZ.AU> on
this,
>I hope everybody has m0121 installed by now.  Maybe in a month or two it will
>be safe to discuss it on the net ... or maybe not.

Let's *please* give people some more time to install it before we start the
discussion -- particularly since (as roger@GW1.AGS.BNL.GOV (Roger A. Katz)
pointed out in <9007171350.AA29728@gw1.ags.bnl.gov>) you can't even install
the patch with install++ because of yet another bug of some sort but have to
copy the "module" (as Roger delicately and securely described it) into its
place manually.

In the meantime, there *is* a safe way of approaching security questions:
use CERT.  I haven't had time (or the telephone link, from this distance)
to talk to them myself.  If there are people who *do* want to discuss
security issues in depth, please do it with CERT not on Usenet, at least
for the time being.

I append two old postings of Gene Spafford's describing CERT.  I hope someone
will take this up.
--
Jim Richardson
Department of Pure Mathematics, University of Sydney, NSW 2006, Australia
Internet: jimr@maths.su.oz.au  ACSNET: jimr@maths.su.oz  FAX: +61 2 692 4534
--
From: spaf@cs.purdue.EDU (Gene Spafford)
Newsgroups: comp.sources.d,news.sysadmin
Subject: Re: Security, not obscurity.
Message-ID: <10263@medusa.cs.purdue.edu>
Date: 8 Apr 90 01:31:16 GMT
References: <16900@well.sf.ca.us> <1990Mar29.055350.2922@Jhereg.Minnetech.MN.ORG> <1105@rwing.UUCP> <2364@sialis.mn.org> <LYNDON.90Apr5115012@orthanc.AthabascaU.CA> <291@van-bc.UUCP>
Reply-To: spaf@cs.purdue.edu (Gene Spafford)
Followup-To: comp.sources.d
Organization: Department of Computer Science, Purdue University

If you want to report a security bug or problem, your best bet is to
report it to the CERT (Computer Emergency Response Team).  Their
e-mail address is cert@cert.sei.cmu.edu
The CERT 24-hour hotline is (412) 268-7080.  They will accept (and
solicit) reports of any security flaw in software/hardware in systems
currently on the Internet, and they will also accept reports of
breakins and security incidents in progress.

The folks at the CERT have ties in to most major vendors, they take
reports very seriously, they keep the information confidential until
fixes are available, and they don't dally when they get a report.
They also have good contacts and working relationships with the
various law enforcement agencies that would respond to problems you
may be having.  The CERT does no investigation on its own, and has no
explicit jurisdiction or authority over security or law -- they are
just a trusted crisis center that can direct your reports to the most
appropriate parties.

If you want to submit something to the security mailing list, you can
mail it to "security@cpd.com" or "zardoz!security".  Mailings to this
list will reach people at major vendors, including DEC, AT&T and Sun,
as well as the CERT and admins at many major sites.  Note that the
list may go to some unprotected sites, and anything appearing in the
list is assumed to be known to the "bad guys" shortly after posting,
so please use care in sending in news of gaping holes that cannot be
fixed (send them to CERT, instead).

If, for any reason, you do not wish to be associated with a report to
the CERT or a security list, you can send reports to me.  If I receive
a report via email (or phone -- 317-494-7825) with a request to
forward it anonymously, I will be happy to pass it along to the
appropriate place with all identification stripped.  I will also pass
along other reports, too, if you ask me to.  That assumes you feel you
can trust me, of course. (1/4   :-)
-- 
Gene Spafford
NSF/Purdue/U of Florida  Software Engineering Research Center,
Dept. of Computer Sciences, Purdue University, W. Lafayette IN 47907-2004
Internet:  spaf@cs.purdue.edu	uucp:	...!{decwrl,gatech,ucbvax}!purdue!spaf


From: spaf@cs.purdue.EDU (Gene Spafford)
Newsgroups: comp.sources.d
Subject: Re: Security, not obscurity.
Message-ID: <10283@medusa.cs.purdue.edu>
Date: 10 Apr 90 01:00:08 GMT
References: <16900@well.sf.ca.us> <1990Mar29.055350.2922@Jhereg.Minnetech.MN.ORG> <1105@rwing.UUCP> <2364@sialis.mn.org> <LYNDON.90Apr5115012@orthanc.AthabascaU.CA> <291@van-bc.UUCP> <10263@medusa.cs.purdue.edu>
Reply-To: spaf@cs.purdue.edu (Gene Spafford)
Organization: Department of Computer Science, Purdue University

Ooops!  A minor goof.  The CERT 24-hotline number is (412) 268-7090
The 7080 is a daytime general information number for CERT.
-- 
Gene Spafford

pha@CAEN.ENGIN.UMICH.EDU (235 Chry) (07/20/90)

	From: jonathan%jarthur%usc.uucp@ucsd.edu
	Organization: Harvey Mudd College, Claremont, CA 91711
	Message-Id: <7871@jarthur.Claremont.EDU>
	Subject: Re: Patches and security
	
	In article <1990Jul19.193641.23420@terminator.cc.umich.edu> rees@citi.umich.edu (Jim Rees) writes:
	   In article <1469@m1.cs.man.ac.uk>, dente@els.ee.man.ac.uk (Colin Dente) writes:
	   > PLEASE keep the nature of security holes quiet.
	   
	   I disagree, and patch 121 is a perfect example of why we need to discuss
	   security holes.  Unless I miss my guess, this patch does not fix the hole at
	   all, it just removes a copy of a program that exploits that hole.  You go
	   away thinking your machine is now somehow more secure, and anyone who really
	   wants to can still get in.
	   
	   I may be wrong, but since we're not discussing this hole here, we'll never
	   find out, will we?
	 
	Well, perhaps Jim Richardson and anyone else who DOES know what the problem
	is, and HAS applied the patch, could tell us that information without
	revealing the hole to the rest of the world.
	 
	Jon
	-- 
	jonathan@jarthur.claremont.edu (134.173.4.42)
	

I sent jonathan a description of the problem, and why patch 121 doesn't
fix anything.

This is a very serious problem.  It defies rational thought to believe that
it exists in the first place, and that this type of "patch" supposedly fixes
it in the second place.

Security by obscurity is DANGEROUS!!!!

Paul Anderson
CAEN Systems Programmer
University of Michigan

dente@craven.ee.man.ac.uk (Colin Dente) (07/20/90)

In article <7871@jarthur.Claremont.EDU> jonathan@jarthur.Claremont.EDU (Jonathan Ball) writes about Jim Rees writing about what I said in the first place:

[Me]
>>> PLEASE keep the nature of security holes quiet.

[Jim]
>>I disagree, and patch 121 is a perfect example of why we need to discuss
>>security holes.  Unless I miss my guess, this patch does not fix the hole at
>>all, it just removes a copy of a program that exploits that hole.  You go
>>away thinking your machine is now somehow more secure, and anyone who really
>>wants to can still get in.

Well, much as I hate doing it, on reflection I have to (at least
partially) agree with Jim, even though he is correcting me 8-)

When I saw the nature of the patch, I thought 'Great - that solves the
problem entirely' - more fool me!  As Jim so rightly points out, all
the patch does is change a single program that doesn't run suid or
anything fancy.  The *REAL* security hole is the fact that a simple
user-mode program could, *and still can* create an suid root file when
run as a normal user.  Let's face it, when you consider the nature of
this bug - 10.2 CAN NEVER BE EVEN SLIGHTLY SECURE.  Give me access to
any machine, and the ability to load at most two files on, and I can
become root by typing a single command.  This is no exaggeration.
Even sites which have installed patch 121 are not immune from the
effects of this hole (they simply require me to load two files instead
of one).

[Jim]
>>I may be wrong, but since we're not discussing this hole here, we'll never
>>find out, will we?
Unfortunately, you're not wrong - as I said before - 10.2 is wide open.

[Jon]
>Well, perhaps Jim Richardson and anyone else who DOES know what the problem
>is, and HAS applied the patch, could tell us that information without
>revealing the hole to the rest of the world.

Unfortunately, I don't think I can say much more about it without
revealing it's exact nature, but I will say this to HP:

If this bug has not been fixed in SR10.3, then I can see no way of
justifying its release.  Fixing this bug should be made the highest
possible priority if you wish to have any pretensions towards being a
supplier of professional computer equipment.


Boy am I mad...




--
 Colin Dente                      | JANET: dente@uk.ac.man.ee.els
 Dept. of Electrical Engineering  | ARPA:  dente@els.ee.man.ac.uk 
 University of Manchester, UK     | UUCP:  ...!ukc!man.ee.els!dente 
                 ... I am the one you warned me of ...

thompson@PAN.SSEC.HONEYWELL.COM (John Thompson) (07/21/90)

> I sent jonathan a description of the problem, and why patch 121 doesn't
> fix anything.
I have also verified that the patch is trivial to work around.  I also
verified that 'install' does not install the patch "module."

> This is a very serious problem.  It defies rational thought to believe that
> it exists in the first place, and that this type of "patch" supposedly fixes
> it in the second place.
It is even worse in that it _TELLS_ you that it was unable to break security,
but does so anyway!!!  The problem is that, now that a copy of the dangerous
module has been available, the only way I can think of to repair the damage
is to change the internals for that module.  That would involve several
driver-level changes, and would ruin many other software packages.

> Security by obscurity is DANGEROUS!!!!
True!  Notice how obscure we are, anyway.  I have opened up a call with Apollo
on the failure of this patch.  I am going to try and get a new APR for it,
along with some sort of answer from them as to what they intend to do about it.
Until then, I will not mention where the breaach is, or how to get around the
"patched" hole, although most everyone seems to know anyway.

John Thompson (jt)
Honeywell, SSEC
Plymouth, MN  55441
thompson@pan.ssec.honeywell.com

As ever, my opinions do not necessarily agree with Honeywell's or reality's.
(Honeywell's do not necessarily agree with mine or reality's, either)

jonathan@jarthur.Claremont.EDU (Jonathan Ball) (07/21/90)

In article <7871@jarthur.Claremont.EDU>, I write:
 >Well, perhaps Jim Richardson and anyone else who DOES know what the problem
 >is, and HAS applied the patch, could tell us that information without
 >revealing the hole to the rest of the world.

In article <1990Jul20.031221.14378@metro.ucc.su.OZ.AU> jimr@maths.su.oz.au (Jim Richardson) writes:
 >Let's *please* give people some more time to install it before we start the
 >discussion [...] If there are people who *do* want to discuss
 >security issues in depth, please do it with CERT not on Usenet, at least
 >for the time being.

Agreed.  I apologize for opening the can of worms.  

Jon
-- 
jonathan@jarthur.claremont.edu (134.173.4.42)
-- 
jonathan@jarthur.claremont.edu (134.173.4.42)

jimr@maths.su.oz.au (Jim Richardson) (07/21/90)

In article <7892@jarthur.Claremont.EDU>, jonathan@jarthur.Claremont.EDU
(Jonathan Ball) writes:
>Agreed.  I apologize for opening the can of worms.

Thanks, Jon.  [ I have been trying to send you mail for a couple of days, but
jarthur appears to be dead from here. ]

I hope everybody saw my posting <1990Jul20.031221.14378@metro.ucc.su.OZ.AU> on
CERT (Computer Emergency Response Team): (412) 268 7090, cert@cert.sei.cmu.edu.
That article of mine seems to have crossed with Jon's, Colin's, and several
others.

Please talk to CERT (and HP I suppose :-) about the new hole, rather than
discussing it on the net yet.  The ramifications of OS security are really too
enormous and wide-reaching for safe open discussion for the time being: things
may come to that eventually, but we have enough other avenues still open not
to be completely desperate yet.  

The newsfeed to Australia has been snail-like for the last few days and I'm
struggling to keep up down here.  If there's a news guru on/near the US
backbone willing to do me a favour perhaps you could email me.
--
Jim Richardson
Department of Pure Mathematics, University of Sydney, NSW 2006, Australia
Internet: jimr@maths.su.oz.au  ACSNET: jimr@maths.su.oz  FAX: +61 2 692 4534

mike@tuvie (Inst.f.Techn.Informatik) (07/21/90)

In article <1491@m1.cs.man.ac.uk>, dente@craven.ee.man.ac.uk (Colin Dente) writes:
|> In article <7871@jarthur.Claremont.EDU> jonathan@jarthur.Claremont.EDU (Jonathan Ball) writes about Jim Rees writing about what I said in the first place:
|> 
|> When I saw the nature of the patch, I thought 'Great - that solves the
|> problem entirely' - more fool me!  As Jim so rightly points out, all
|> the patch does is change a single program that doesn't run suid or
|> anything fancy.  The *REAL* security hole is the fact that a simple
|> user-mode program could, *and still can* create an suid root file when
|> run as a normal user.  Let's face it, when you consider the nature of
|> this bug - 10.2 CAN NEVER BE EVEN SLIGHTLY SECURE.  Give me access to
|> any machine, and the ability to load at most two files on, and I can
|> become root by typing a single command.  This is no exaggeration.
|> Even sites which have installed patch 121 are not immune from the
|> effects of this hole (they simply require me to load two files instead
|> of one).
|> 
|> If this bug has not been fixed in SR10.3, then I can see no way of
|> justifying its release.  Fixing this bug should be made the highest
|> possible priority if you wish to have any pretensions towards being a
|> supplier of professional computer equipment.

Well, I fear the day people find out the syscalls necessary to do this 
breach! In the maentime I think sysadmins should note that they should 
*REMOVE* THE OLD COPY OF THE PROGRAM! It is probably still in your authorized 
area ind /install/ri.apollo.os.v.10.2/ - and you know the rest of the 
patch. This will still allow anybody with access to a cartridge tape, 
a disk, email, the keyboard or just about anything else allow to intrude -
but not quite as easily! 

			bye,
				mike
       ____  ____
      /   / / / /   Michael K. Gschwind             mike@vlsivie.at
     /   / / / /    Technical University, Vienna    mike@vlsivie.uucp
     ---/           Voice: (++43).1.58801 8144      e182202@awituw01.bitnet
       /            Fax:   (++43).1.569697
   ___/

pha@CAEN.ENGIN.UMICH.EDU (Paul H. Anderson) (07/23/90)

	 
	 
	> I sent jonathan a description of the problem, and why patch 121 doesn't
	> fix anything.
	I have also verified that the patch is trivial to work around.  I also
	verified that 'install' does not install the patch "module."
	 
	> This is a very serious problem.  It defies rational thought to believe that
	> it exists in the first place, and that this type of "patch" supposedly fixes
	> it in the second place.
	It is even worse in that it _TELLS_ you that it was unable to break security,
	but does so anyway!!!  The problem is that, now that a copy of the dangerous
	module has been available, the only way I can think of to repair the damage
	is to change the internals for that module.  That would involve several
	driver-level changes, and would ruin many other software packages.
	 
	> Security by obscurity is DANGEROUS!!!!
	True!  Notice how obscure we are, anyway.  I have opened up a call with Apollo
	on the failure of this patch.  I am going to try and get a new APR for it,
	along with some sort of answer from them as to what they intend to do about it.
	Until then, I will not mention where the breaach is, or how to get around the
	"patched" hole, although most everyone seems to know anyway.
	 
	John Thompson (jt)
	Honeywell, SSEC
	Plymouth, MN  55441
	thompson@pan.ssec.honeywell.com
	 
	As ever, my opinions do not necessarily agree with Honeywell's or reality's.
	(Honeywell's do not necessarily agree with mine or reality's, either)

I've also got a call open on it - it was immediately raised to P1 priority
at my request, and I am expecting an answer from customer services tomorrow
or Wednesday as to if/when/how the hole will be fixed.

I will let this group know the results of that call.  I have asked for a patch
for SR10.1, SR10.2, as well as SR10.3.  Having a patch for just 10.3 doesn't help,
as we have about an even mix of 10.1 and 10.2 machines running around.

Paul Anderson