[alt.security] tty security problems under SunOS 4.1 and SunOS 4.1.1

brnstnd@kramden.acf.nyu.edu (Dan Bernstein) (05/14/91)

CERT recently announced patched versions of telnetd and rlogind
available from Sun for SunOS 4.1 and 4.1.1. The patches do stop the
``cover'' program which was posted here recently. I believe the
``uncover'' program posted recently also prevents ``cover'' from
working.

However, the bugs are not fixed. I was able to adapt my breaking
program---still using the same holes that I posted some years back---to
SunOS 4.1 and 4.1.1, both with and without the new telnetd/rlogind.
Mitch Wright has agreed to be a reference for this. I believe the new
version will also survive ``uncover''.

What does this mean for you? In the short term: Hopefully the Netherland
crackers will not be able to duplicate this work. In any case, to evade
tty security this way under SunOS now takes such a complex sequence of
manipulations that the average user won't even be tempted to try.
(Legitimate applications also have to do a ridiculous amount of extra
work, but never mind.) It is thus worthwhile to install the patched
telnetd and rlogind.

In the long term: SunOS is still insecure, and a sufficiently dedicated
cracker can and will be able to get past tty security no matter how many
other holes you close. It is inexcusable for Sun to leave this open.

I'd like to give two further comments. One: Don't believe unjustified
claims that a security hole has been fixed unless you can understand the
fixes yourself. I've received a lot of e-mail asking whether SunOS 4.1
and 4.1.1 had the same problems, or saying that Sun and CERT gave the
impression that the holes were closed, or insisting that the recently
announced patches were more than enough to fix everything and that the
tty problems would never reappear. Uh-huh. Sure they're fixed. I'm
reminded of what so many sites told Stoll upon being told that they'd
been broken into: ``We run a secure shop.''

Two: Security holes must be closed by logic, not just by testing. One of
my louder critics in this discussion---a manager of a large network,
unfortunately---thinks that by seeing break code he can invent a working
fix. He's wrong. It's exactly that sort of thinking that produces one
tty kludge after another, each of which is claimed to be the final
solution and none of which really does the job.

Sun's patched telnetd and rlogind do stop one program. That's good. But
the CERT announcement implies that the patches are a ``SOLUTION'' to the
entire vulnerability of the tty subsystem. That's absolutely wrong. The
documentation inside Sun's patched source claims that the new versions
will detect whenever a tty is open. That's absolutely wrong too.

Just because one break program fails doesn't mean the system is secure.
Unless you can logically prove your security, you have no security.

I hope the SunOS 4.1.1 example gives people a healthy level of distrust
for vendors' claims that a hole has been fixed. Sun---that's right,
powerful vendor Sun---was told about a security-breaking program, did
manage to stop that program, and then didn't look before it leaped into
the claim that the problem was now completely solved.

Why do people think this way? What is so difficult about logic and
common sense that they have to be replaced by testing? You can't play
around with security---and given how easy it is to *guarantee* that a
mechanism is secure, there's no reason to play around.

---Dan

dave@jato.jpl.nasa.gov (Dave Hayes) (05/15/91)

brnstnd@kramden.acf.nyu.edu (Dan Bernstein) writes:

>However, the bugs are not fixed. I was able to adapt my breaking
>program---still using the same holes that I posted some years back---to
>SunOS 4.1 and 4.1.1, both with and without the new telnetd/rlogind.
>Mitch Wright has agreed to be a reference for this. I believe the new
>version will also survive ``uncover''.

Great. Thanks for your support. *sigh*

I dunno why, but I am beginning to enjoy bashing you. However there
does come a time to be a bit less frivolous.

(WARNING: Slight meta-psychological digression here.) You asked: 

>Why do people think this way? What is so difficult about logic and
>common sense that they have to be replaced by testing? You can't play
>around with security---and given how easy it is to *guarantee* that a
>mechanism is secure, there's no reason to play around.

Yes, people ARE different aren't they? Have you ever considered that
these people can't fix something they don't understand? Let's take
this further...do you think that they'd ever WANT to understand when
the information is presented in a negative way?

Have you ever observed that when you tell a person outright that
they are wrong...that they start to get even MORE wrong and MORE 
illogical and extremely nonsensical? Have you ever noticed that this
phenomena also occurs when remarks about intelligence are made, or
insinuations about stupidity are made?

You know, I'll level with you. For all my negative remarks that I
make about you (and still feel like making)...I realize (in my own folly) 
that because of this you won't listen to a word I say...it doesn't matter
whether or not my remarks make sense. 

Now look at these two paragraphs:

>Sun's patched telnetd and rlogind do stop one program. That's good. But
>the CERT announcement implies that the patches are a ``SOLUTION'' to the
>entire vulnerability of the tty subsystem. That's absolutely wrong. The
>documentation inside Sun's patched source claims that the new versions
>will detect whenever a tty is open. That's absolutely wrong too.

>I hope the SunOS 4.1.1 example gives people a healthy level of distrust
>for vendors' claims that a hole has been fixed. Sun---that's right,
>powerful vendor Sun---was told about a security-breaking program, did
>manage to stop that program, and then didn't look before it leaped into
>the claim that the problem was now completely solved.

Can you see how this applies to vendors? Sure, they resist making changes
and I've had some pretty bad experiences with them. Why? Because we give
them so much flak about these things. (I'm no exception) 

It's no wonder that they resist some guy who has nothing better to do than
find out what they did wrong. Humans spend 80% of their lives pointing out
others mistakes...if we spent half that time learning to correct them we'd
probably be in a better place than we are now.

SO when you ask "Why do people...", you might consider what effect you
have had on them first. Perhaps in the case of the wayward vendors,
you might offer them a comprehensive and SIMPLE solution to this problem,
instead of just jumping up and down and pointing out the mistake.

After all...coming up with break code doesn't really help you come up 
with a fix now, does it?
-- 
Dave Hayes - Network & Communications Engineering - JPL / NASA - Pasadena CA
dave@elxr.jpl.nasa.gov       dave@jato.jpl.nasa.gov           ames!elroy!dxh

   "It is a dragon, destroyer of all," cried the ants. 
                                   Then a cat caught the lizard.

jim@segue.segue.com (Jim Balter) (05/17/91)

In article <1991May14.184506.4756@jato.jpl.nasa.gov> dave@jato.jpl.nasa.gov writes:
>SO when you ask "Why do people...", you might consider what effect you
>have had on them first. Perhaps in the case of the wayward vendors,
>you might offer them a comprehensive and SIMPLE solution to this problem,
>instead of just jumping up and down and pointing out the mistake.

Dan appears to have offered what he believes to be a comprehensive solution,
and as simple as he thinks he can make it.  ("Make things as simple as
possible, but no simpler." -- Al E.)  The one jumping up and down is you.

>After all...coming up with break code doesn't really help you come up 
>with a fix now, does it?

Nor does posting it all over the net, now, does it?

Dan provides a solution but doesn't provide the break code.  Ed Carp and
you and a bunch of others yell and scream in a most insulting, rude, impolite
and uninformed manner at Dan.  Now you say that he should offer a solution
but not come up with break code.  Go figger.

As I see it, a bunch of non-wizardly sys admins are trying to disrupt a
technical discussion about tty security problems and how to fix them,
with demands that some code that demonstrates the problem be posted so that
they can "understand the problem" and then go hack and slash or whatever
in order to "fix" the problem.  This is simply not a competent approach
toward problem solving.  If you aren't competent (meaning possessing required
knowledge and skills; nothing pejorative) to understand the problem from
the discussion so far, what can possibly make you think that you are competent
to solve the problem based upon the program that breaks the system?
But many people don't seem to understand this.  There are a lot of programmers
who, given an equation solver, some equations, and the right answer, would
run off and hack on the equation solver until it yielded the right answer,
without ever cracking a book on mathematics.  (And some are going, Yeah,
what's wrong with that?")  It might be better if programmers were given intense
analytical training before being let near a computer, with its instantly
gratifying feedback.

dave@jato.jpl.nasa.gov (Dave Hayes) (05/18/91)

jim@segue.segue.com (Jim Balter) writes:
>Dan appears to have offered what he believes to be a comprehensive solution,
>and as simple as he thinks he can make it.  ("Make things as simple as
>possible, but no simpler." -- Al E.) 

That maybe how it appears to you.  I certainly don't know how it appeared
to the vendors. I can only suspect that it appeared too complex and 
convoluted to vendors who would not listen....either that or the
information is presented in a hostile way.

Nevertheless Dan did ask a question. ("Why do people think this way") 
I merely answered. That's more than he's done for me.  

> The one jumping up and down is you.

Damn straight. I have no problems jumping up and down about what is 
going on with disemmination of security infomration..and not just 
Dan's personal problem with being helpful (as opposed to determining 
what help everybody needs). I get paid to jump up and down about this 
stuff. I don't mind it one bit. 

>>After all...coming up with break code doesn't really help you come up 
>>with a fix now, does it?
>Nor does posting it all over the net, now, does it?

I'd be willing to wager a large amount of money that posting code over the net
would produce a fix MUCH FASTER then coming up with the code. 

>Dan provides a solution but doesn't provide the break code.  Ed Carp and
>you and a bunch of others yell and scream in a most insulting, rude, impolite
>and uninformed manner at Dan. 

Now think for a second. Why do you think that we feel the way we do? Note the
common thread in the people who scream a lot (and I have a *BIG* mouth when
I want to have one)...we all have a legitimate interest in any security problems
over the internet. Dan, in all his holy infinite wisdom, has created an effect
on us by posting enough information to produce more crackers but not enough to
allow us to deal with them. Fortunately there are other members of the community
here that have more consideration and less ego who are willing to help, but IMHO
there's no excuse for Dan's behavior...and he shoudl EXPECT the rudeness (in fact
I believe he revels in it). 

> Now you say that he should offer a solution but not come up with break code.
> Go figger.

You should. I was commenting upon his effort to break SunOS 4.1/4.1.1; trying to
figure what that would get him. It was also a very sarcastic comment.  

>As I see it, a bunch of non-wizardly sys admins are trying to disrupt a
>technical discussion about tty security problems and how to fix them,

Boy this sounds elitist. I guess us humans do need to demonstrate their superiority
over others time and time again...it's a fact of human nature.

>with demands that some code that demonstrates the problem be posted so that
>they can "understand the problem" and then go hack and slash or whatever
>in order to "fix" the problem.  This is simply not a competent approach
>toward problem solving.  

It is also incompetant to post details of the problem if you aren't willing
to post fixes/solutions and a description of the problem. I personally believe
that security by obscurity isn't (what a time worn phrase), but if you believe
different...then WHY POST ANYTHING AT ALL. Anything else is blatant and obnoxious
hypocracy. 

If you aren't competent (meaning possessing required
>knowledge and skills; nothing pejorative) to understand the problem from
>the discussion so far, what can possibly make you think that you are competent
>to solve the problem based upon the program that breaks the system?

This is an assumption about the way people think. I guarantee you that there exists
someone out there who couldn't understand the conceptual details until you
showed them some code. Interestingly enough, there is a musician who I am teaching
who doesn't understand a whit about altered dominant scales on paper, but when I played
them for him he immediately understood. 

Please cut the rest of humanity some slack. There are a LOT of different types of people
out here. 
-- 
Dave Hayes - Network & Communications Engineering - JPL / NASA - Pasadena CA
dave@elxr.jpl.nasa.gov       dave@jato.jpl.nasa.gov           ames!elroy!dxh

            Think enough and you won't know anything!

jim@segue.segue.com (Jim Balter) (05/20/91)

In article <1991May17.181554.26175@jato.jpl.nasa.gov> dave@jato.jpl.nasa.gov writes:
>jim@segue.segue.com (Jim Balter) writes:
>>Dan appears to have offered ...
>
>That maybe how it appears to you.  ...

I was speaking of how things appear to Dan, not to me, you, or vendors.
Please follow the thread.

>> The one jumping up and down is you.
>
>Damn straight.

But you accused Dan of jumping up and down.  Please follow the thread.

>>>After all...coming up with break code doesn't really help you come up 
>>>with a fix now, does it?
>>Nor does posting it all over the net, now, does it?
>
>I'd be willing to wager a large amount of money that posting code over the net
>would produce a fix MUCH FASTER then coming up with the code. 

Rational communication with you appears to be beyond my abilities.
I will desist.  I apologize for wasting the time of other readers.

>>Dan provides a solution but doesn't provide the break code.  Ed Carp and
>>you and a bunch of others yell and scream in a most insulting, rude, impolite
>>and uninformed manner at Dan. 
>
>Now think for a second. Why do you think that we feel the way we do?

Only your therapists know for sure.

>...and he shoudl EXPECT the rudeness (in fact
>I believe he revels in it). 

Slaveowners believe that their slaves wanted to be mastered, too.
Rationalization is an amazing achievement of the human brain.