877 lines
34 KiB
Plaintext
877 lines
34 KiB
Plaintext
|
|
Computer underground Digest Sun Dec 15, 1996 Volume 8 : Issue 88
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #8.88 (Sun, Dec 15, 1996)
|
|
|
|
File 1--SPA settles so-caled "anti-piracy" lawsuit with Tripod
|
|
File 2--(Fwd) New SPA imperatives
|
|
File 3-- An Open Letter to the SPA
|
|
File 4--Hackers access Singapore Govt. WWW site (fwd)
|
|
File 5--Re: Hackers access Singapore Govt. WWW site
|
|
File 6--Jenott: Prosecutor attempts suicide, more secrecy
|
|
File 7--BoS: Serious BIND resolver problem (fwd)
|
|
File 8--Modems, PPP, who is doing what? (fwd)
|
|
File 9--Cu Digest Header Info (unchanged since 13 Dec, 1996)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Sat, 16 Nov 1996 07:48:28 -0800 (PST)
|
|
From: Declan McCullagh <declan@well.com>
|
|
To: fight-censorship@vorlon.mit.edu
|
|
Subject: File 1--SPA settles so-caled "anti-piracy" lawsuit with Tripod
|
|
|
|
|
|
---------- Forwarded message ----------
|
|
|
|
For Immediate Release
|
|
Contact: David Phelps, (202) 452-1600, ext. 320, or dphelps@spa.org
|
|
Kara Berklich, (413) 458-2265, or kara@tripod.com
|
|
|
|
SPA Announces Settlement With Tripod, Inc.
|
|
On Internet Anti-Piracy Lawsuit
|
|
|
|
(Washington, D.C. -- Nov. 15, 1996) -- The Software Publishers
|
|
Association (SPA) and Tripod, Inc. of Williamstown, Massachusetts
|
|
have reached a satisfactory settlement of the lawsuit filed against
|
|
Tripod for software copyright infringement. The lawsuit was filed on
|
|
behalf of three of SPA's member companies: Adobe, Inc., Claris
|
|
Software and Traveling Software, Inc.
|
|
|
|
SPA initiated legal action against Tripod, an Internet Service
|
|
Provider (ISP), in early October after receiving information that a
|
|
number of the more than 50,000 individuals using Tripod's Homepage
|
|
Builder -- part of the larger Tripod Web site -- were allegedly
|
|
making available infringing material. After the lawsuit was filed,
|
|
Tripod worked cooperatively with SPA to remove the infringing
|
|
material and to create an addendum to its Membership Terms of Service
|
|
outlining actions Tripod may take to protect itself against copyright
|
|
infringement.
|
|
|
|
"Though we regret that legal action was taken in this matter, given
|
|
our past cooperation with SPA, we are glad to see this action
|
|
satisfactorily resolved. The addendum to our Terms of Service really
|
|
just formalizes Tripod's existing operations. Our Terms of Service
|
|
now explicitly state that we do not tolerate on our members' home
|
|
pages the presence of illegal software, serial numbers, and tools
|
|
that have no other purpose than to crack software. If we become
|
|
aware of the presence of such materials on our members' home pages,
|
|
we will alert those members and ask them to remove that data," said
|
|
Bo Peabody, Tripod's president.
|
|
|
|
|
|
SPA and Tripod Reach Agreement 2-2-2
|
|
|
|
"SPA hasn't asked Tripod to do anything more than any ISP does -- or
|
|
should be doing -- as part of its regular operating procedures.
|
|
Tripod sets an excellent example for ISPs. They should advise their
|
|
subscribers that infringing material will not be tolerated on their
|
|
servers and will take action if it is found," said Sandra Sellers,
|
|
SPA's vice president of intellectual property education and
|
|
enforcement.
|
|
|
|
"SPA urges all ISPs to adopt these measures as part of their normal
|
|
operating procedures and to turn to SPA's educational materials on
|
|
our Web site at www.spa.org," Sellers added.
|
|
|
|
Tripod, Inc. provides the 116,000+ members of the Tripod Web site,
|
|
recently ranked the 27th highest trafficked Web site in the world by
|
|
PC-Meter, with an array of services including the free Homepage
|
|
Builder. Both the Web site and Tripod's one million circulation
|
|
print magazine Tools for Life provide young adults with the resources
|
|
they need to make key life decisions in the areas of career, personal
|
|
finance and lifestyle. The Tripod Web site can be found at
|
|
http://www.tripod.com.
|
|
|
|
SPA is the principal software industry trade association,
|
|
representing the leading publishers as well as many start-up firms in
|
|
the business, home office, consumer, education, Internet and
|
|
entertainment markets. Its 1,200 member companies account for 85
|
|
percent of the U.S. packaged software industry. Information on SPA
|
|
and its Internet use materials can be found on SPA's Web site at
|
|
http://www.spa.org.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 18 Nov 1996 23:42:00 +0000
|
|
From: David Smith <bladex@bga.com>
|
|
Subject: File 2--(Fwd) New SPA imperatives
|
|
|
|
Attached are the updated codes of conduct in the SPA Internet
|
|
anti-piracy campaign.
|
|
|
|
------- Forwarded Message Follows -------
|
|
|
|
ISP Guidelines for Copyright Protection
|
|
|
|
The below signed ISP voluntarily agrees to:
|
|
|
|
1.Commit to a policy making only legally authorized software
|
|
available to subscribers, members and users.
|
|
|
|
2.Implement its policy by naming a compliance officer and using its
|
|
best efforts to ensure -
|
|
|
|
that the unauthorized reproduction and/or distribution of
|
|
copyrighted computer programs does not occur on or through its
|
|
servers,
|
|
|
|
that information that appears to have been posted to be
|
|
used to circumvent manufacturer-installed copy-protect devices in
|
|
computer programs, including, but not limited to, serial numbers and
|
|
cracker utilities (hereinafter "cracker material") will not be
|
|
posted on its server(s),
|
|
|
|
and that the linking of one or more sites
|
|
on its server(s) to one or more other sites that contain pirated
|
|
computer programs and/or cracker material does not take place unless
|
|
such linking clearly appears to be intended for lawful purposes.
|
|
|
|
3.Remove pirated computer software and cracker materials or otherwise
|
|
block access to it as soon as practicable after it is discovered.
|
|
|
|
4.Educate subscribers, members and other users of their legal obligation
|
|
to respect copyright through, among other things, public service messages,
|
|
warnings and hypertext
|
|
links to appropriate educational web pages.
|
|
|
|
5.Terminate subscribers or members who, without reasonable justification,
|
|
fail or refuse to abide by the policy of making only legally authorized software
|
|
available on its
|
|
server(s).
|
|
|
|
6.Not knowingly sponsor, endorse, or advertise access to infringing software.
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 24 Nov 1996 20:18:18 -0500 (EST)
|
|
From: jw@bway.net
|
|
Subject: File 3-- An Open Letter to the SPA
|
|
|
|
An Open Letter to the SPA
|
|
|
|
|
|
(To Ken Wasch, Software Publishers Association founder and president)
|
|
|
|
Dear Ken:
|
|
|
|
You probably don't remember me, but we spoke circa 1985 or '86.
|
|
I was practicing law then, specializing in computer law, and
|
|
I was representing a software publisher whose software
|
|
was being ripped off on bulletin boards across America.
|
|
I may have been the first attorney in the United States to
|
|
sue a bulletin board sysop for software piracy, and I called
|
|
to bring you up to speed on the case. You sent some money towards
|
|
my legal fees. Later on, you jumped into the business of
|
|
suing software pirates yourself in a major way.
|
|
|
|
I sued four or five bulletin boards before I got out
|
|
of it, and won consent injunctions and financial settlements
|
|
in every case. The difference between what I was doing back
|
|
then, and what you are doing now, is patently obvious. I was
|
|
suing BBS's with names like "The Pirate's Lair", where the
|
|
top screen bore messages like "Upload something juicy for
|
|
admission to the inner sanctum." My client would gain admission
|
|
and would ascertain that illegal copies of his programs were being
|
|
stored on the board, with the sysop's knowledge.
|
|
|
|
You are suing Internet service providers, and you are complaining
|
|
that pages stored on their servers provide links to
|
|
other Web pages which support piracy or discuss copying
|
|
techniques. Its right there on your
|
|
Web pages. In your "ISP Code of Conduct", you require
|
|
that an ISP refrain from:
|
|
|
|
"the linking of one or more sites on its server(s)
|
|
to one or more other
|
|
sites that contain pirated computer programs and/or cracker
|
|
material.... unless such linking clearly
|
|
appears to be intended for lawful purposes. "
|
|
|
|
And, in another document called, "Why the Risk Exists--Theories
|
|
of Copyright Infringement," you claim that "contributory
|
|
infringment" under copyright law includes
|
|
"linking to FTP sites where software may be unlawfully obtained;
|
|
informing others of FTP sites where software may be unlawfully obtained."
|
|
|
|
|
|
You've gone way overboard. You yourself are an attorney and
|
|
you have been in the copyright enforcement business long enough to
|
|
know that the speech you are describing cannot possibly be
|
|
contributory infringement.
|
|
|
|
A link is the online equivalent of a footnote. If I published
|
|
a book tomorrow on software piracy and cited in a footnote
|
|
a book on how to pirate software, would you sue me?
|
|
If I published a manual on how to commit software piracy, in fact
|
|
you could not sue me; the First Amendment protects not only
|
|
the speech we approve of, but even some quite despicable
|
|
speech; otherwise it wouldn't count for anything.
|
|
|
|
Add to this the fact that the ISP itself is at one remove from the
|
|
Web page containing a link. It is simply providing storage space
|
|
for a page maintained by someone else, and it doesn't have the
|
|
bandwidth to review all the Web pages contained on its equipment.
|
|
It is no more appropriate for ISP's to screen all user
|
|
pages than it would be for a bookstore to perform a legal
|
|
review of the contents of all books which
|
|
it carries or for the phone company to screen its customer's
|
|
phone calls.
|
|
|
|
|
|
By suing ISP's for contributory infringment, you are effectively
|
|
exploiting the average federal judge's continuing ignorance
|
|
about the Internet. If the judges before whom you filed
|
|
these actions clearly recognized that there is no difference, for these
|
|
purposes, between a Web page and a book or magazine, they would
|
|
dismiss your complaint, and might very well
|
|
entertain a request for Rule 11 sanctions for your unsupported
|
|
interpretations of the contributory infringment laws.
|
|
|
|
ISP's today are the weak link in the system of
|
|
online freedom of expression. Strong freedom of speech
|
|
protection for the Internet, harbingered by the decision in
|
|
ACLU v. Reno, has little practical value if any private party
|
|
opposed to the expression of an idea can effectively use the
|
|
threat of litigation to bully an ISP into pulling the plug on
|
|
a Web page.
|
|
|
|
Most ISP's, especially small ones, simply do not have the financial
|
|
resources or legal representation to defend a lawsuit, even a groundless
|
|
one, and will therefore always err on the side of unplugging a
|
|
user's web pages. The vulnerability of ISP's to tactics like yours
|
|
leaves individual users, making noncommercial uses of the Web,
|
|
extremely vulnerable.
|
|
|
|
I understand that your motivation is to be assertive in defense
|
|
of your members' interests. However, you also have a responsibility
|
|
to respect the community of which you form a part. I find your
|
|
aggressive pursuit of ISP's to be disrespectful of two
|
|
overlapping communities: software users, many of whom
|
|
maintain Web pages or at least use the Web, and the online community,
|
|
of which you form a part by maintaining Web pages of your own.
|
|
|
|
I am on the board of directors of two software companies, and would
|
|
never consider having either of them join your organization
|
|
for as long as you pursue your policy against ISP's. In addition,
|
|
I will not purchase the software of any members of your organizations
|
|
who lend their names to lawsuits which you bring against ISP's,
|
|
and I would hope that others who read this letter--which
|
|
I am posting on the Internet--will consider doing the same.
|
|
|
|
Sincerely yours,
|
|
Jonathan Wallace
|
|
jw@bway.net
|
|
http://www.spectacle.org
|
|
|
|
-----------------------------------------------
|
|
Jonathan Wallace
|
|
The Ethical Spectacle http://www.spectacle.org
|
|
Co-author, Sex, Laws and Cyberspace http://www.spectacle.org/freespch/
|
|
|
|
"We must be the change we wish to see in the world."--Gandhi
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 9 Dec 1996 16:46:44 -0800 (PST)
|
|
From: "Z.B." <zachb@netcom.com>
|
|
Subject: File 4--Hackers access Singapore Govt. WWW site (fwd)
|
|
|
|
Source - Fight-Censorship List <fight-censorship@vorlon.mit.edu>
|
|
|
|
This showed up on the DEFCON list a little while ago. I thought it might
|
|
be of some interest here.
|
|
|
|
|
|
---------- Forwarded message ----------
|
|
Date--Mon, 9 Dec 1996 15:46:41 -0800 (PST)
|
|
To--DC-Stuff List
|
|
Subject--Hackers access Singapore Govt. WWW site
|
|
|
|
Muhahaha!
|
|
|
|
Hackers Access Singapore Government's Website
|
|
|
|
SINGAPORE - Computer hackers broke into the government's Internet
|
|
website and posted a list of the user identities of more than 100
|
|
officials from various government bodies, the Straits Times newspaper
|
|
reported today.
|
|
|
|
The newspaper said Singapore's government directory was hacked into
|
|
and the list of user IDs left on the government's home page for at
|
|
least 12 hours.
|
|
|
|
The website has links to the home pages of various government bodies,
|
|
like the Singapore Broadcasting Authority, the Attorney-General's
|
|
Chambers and other ministries.
|
|
|
|
The list has now been removed from the website and its original
|
|
contents restored.
|
|
|
|
Hacking is an offense under Singapore's Computer Misuse Act, carrying
|
|
a fine of Singapore $2,000 and a two-year jail sentence.
|
|
|
|
Penalties are more severe for gaining unauthorized access to computer
|
|
data with an intent to commit an offense such as fraud.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 9 Dec 1996 21:10:43 -0800 (PST)
|
|
From: Declan McCullagh <declan@well.com>
|
|
Subject: File 5--Re: Hackers access Singapore Govt. WWW site
|
|
|
|
Source - fight-censorship@vorlon.mit.edu
|
|
|
|
A followup article was in today's Straits Times on page 2, saying
|
|
the police were investigating this heinous crime. The Authorities
|
|
were shocked, SHOCKED, I say, that anyone would commit such an
|
|
act against the benevolent, munificient state. Perhaps the
|
|
government needs to take out anti-hacking ads on the sides of
|
|
buses -- one I saw this morning on the way downtown showed how
|
|
taxpayer money is spent: on a full-color advert promoting
|
|
"Singapore Family Values."
|
|
|
|
Singapore Net-experts, meanwhile, have been telling me that it's
|
|
not much of a hack. Rather, it's much more likely that the
|
|
offenders (might they be caned?) took advantage of a cgi script
|
|
loophole to execute a copy command moving /etc/passwd into
|
|
index.html. Boring stuff, yet exquisitely timed. Singapore is
|
|
putting its technological prowess on display this week for the
|
|
WTO summit meeting here. There's nothing more amusing than an
|
|
embarrassed repressive, censorhappy government.
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 14 Dec 1996 16:49:32 -0600 (CST)
|
|
From: Crypt Newsletter <crypt@sun.soci.niu.edu>
|
|
Subject: File 6--Jenott: Prosecutor attempts suicide, more secrecy
|
|
|
|
At the beginning of the week, the court martial of Eric Jenott took
|
|
a strange turn when the military judge, Fred Arquilla, replaced the
|
|
Army's lead prosecutor, Gordon Wells, because he had attempted to
|
|
commit suicide.
|
|
|
|
Wells tried to kill himself by slashing one of his wrists with a razor
|
|
early Sunday morning and was immediately taken to an army medical center,
|
|
according to the Fayetteville Observer.
|
|
|
|
Moving swiftly, Arquilla appointed a new lead prosecutor, Tim Lucas,
|
|
and postponed further action for a day and a half. On Monday, Jenott
|
|
also pleaded not guilty to all charges leveled at him.
|
|
|
|
Arquilla denied a defense motion to have Quihang Liu named an essential
|
|
witness. Liu is a Chinese engineer and former friend of Jenott's who
|
|
is said by the Army to have been a recipient of secret passwords supplied
|
|
by the Ft. Bragg soldier. Liu has indicated he will not return to the
|
|
United States for the trial. Arquilla also denied a request by Jenott's
|
|
defense for a review copy of the information taken from 600 diskettes
|
|
and two hard disks, formerly belonging to the Ft. Bragg soldier, and
|
|
seized by the government.
|
|
|
|
On Thursday, Army investigator James P. Samberg testified the
|
|
Ft. Bragg hacker told him he was trying to "hurt the United States
|
|
and help China" when he gave away a "secret" password.
|
|
|
|
As the proceeding unfolded on Thursday, Samberg read from Jenott's
|
|
personal diary, a diary seized at the Ft. Bragg barracks in June.
|
|
|
|
From Jenott's diary -- dated sometime in 1991, according to Samberg:
|
|
|
|
"I just wish America, my own country, would be put to shame.
|
|
America is disgusting. I'm getting more and more impatient to go
|
|
to China."
|
|
|
|
Samberg also presented a poem, attributed to Jenott in 1993,
|
|
entitled "Red Blood and Snow." "By the way, I've been a communist for
|
|
about three years," was said to be the poem's closing line.
|
|
|
|
Jenott's defense counsel, Tim Dunn, attacked Samberg's credibility.
|
|
According to the Observer, Samberg had acknowledged "falsifying a
|
|
weapons qualification record."
|
|
|
|
Prosecutors tried to build the case that Jenott was a communist Chinese
|
|
defector in waiting by trotting out one of Jenott's platoon members,
|
|
Nicolas Salado. Salado had travelled with Jenott in February 1996 to
|
|
visit Quihang Liu in Knoxville. Salado testified that he saw
|
|
Jenott and Liu access Playboy's site on the Internet -- a known
|
|
hotspot of communists -- and that Jenott spoke to Liu in Chinese.
|
|
|
|
Prosecutor Matthew Wilkov claimed Jenott burned his passport because he
|
|
wanted to defect. The defense countered that Jenott merely wanted to be a
|
|
tourist.
|
|
|
|
In keeping with the aura of secrecy that has surrounded the court
|
|
martial, military judge Fred Arquilla closed the court to the public
|
|
a number of times, supposedly due to the discussion of classified
|
|
material, according to the Observer. At one point, a witness' name
|
|
rank and unit were classified. The Observer reporter got it anyway
|
|
and published the name of the classified soldier: "Alan Castle."
|
|
|
|
Willkov said Jenott had also hacked systems run by by the Joint Chiefs
|
|
of Staff, the secretary of the Army, the Department of Defense, the
|
|
Army, the Navy and the Air Force -- installing password sniffers on
|
|
them during the process.
|
|
|
|
On Friday, Fred Arquilla locked the public out of the trail for all
|
|
but three minutes. The rest of the day the court was closed under a
|
|
court order for military secrecy.
|
|
|
|
Digested from Fayetteville Observer daily news reports: http://www.foto.com .
|
|
|
|
George Smith
|
|
Crypt Newsletter
|
|
http://www.soci.niu.edu/~crypt
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 20 Nov 1996 08:16:38 -0500 (EST)
|
|
From: Noah <noah@enabled.com>
|
|
Subject: File 7--BoS: Serious BIND resolver problem (fwd)
|
|
|
|
Source -Noah
|
|
|
|
---------- Forwarded message ----------
|
|
Date--Mon, 18 Nov 1996 22:53:16 -0700 (MST)
|
|
From--Oliver Friedrichs <oliver@secnet.com>
|
|
Subject--BoS--Serious BIND resolver problem
|
|
|
|
Secure Networks Inc.
|
|
|
|
Security Advisory
|
|
November 18, 1996
|
|
|
|
Vulnerability in Unchecked DNS Data.
|
|
|
|
In research for our upcoming network auditing tool, we have uncovered a
|
|
serious problem present in implementations of BIND which trust invalid data
|
|
sent to them. This vulnerability specifically applies to hostname to address
|
|
resolution and can result in local and remote users obtaining root privileges.
|
|
|
|
It is recommended that security conscious users upgrade to the latest version
|
|
of the BIND resolver immediately. Information on obtaining the latest
|
|
official release is provided at the end of this message.
|
|
|
|
Technical Details
|
|
~~~~~~~~~~~~~~~~~
|
|
|
|
When a standard hostname lookup is performed on internet connected systems,
|
|
the resulting address should be 4 bytes (Forgetting about IPv6 for now).
|
|
Assuming that the address will always be 4 bytes, many privileged and
|
|
unprivileged programs (including network daemons) trust the address length
|
|
field which is returned from gethostbyname() in the hostent structure. By
|
|
trusting the length field returned by DNS to be 4 bytes, it then copies the
|
|
address into a 4 byte address variable. The vulnerability exists due to the
|
|
fact that we can specify the size of IP address data within the DNS packet
|
|
ourselves. By specifying a size larger than 4 bytes, an overflow occurs, as
|
|
the program attempts to copy the data into the 4 byte structure it has
|
|
allocated to store the address.
|
|
|
|
One example of this vulnerability occurs in rcmd.c, the standard BSD library
|
|
routine which is used by rsh and rlogin to remotely connect to systems. Note
|
|
that the code itself is not faulty, however the resolver implementation is.
|
|
Example code follows:
|
|
|
|
hp = gethostbyname(*ahost);
|
|
if (hp == NULL) {
|
|
herror(*ahost);
|
|
return (-1);
|
|
}
|
|
*ahost = hp->h_name;
|
|
|
|
.
|
|
.
|
|
.
|
|
|
|
bzero(&sin, sizeof sin);
|
|
sin.sin_len = sizeof(struct sockaddr_in);
|
|
sin.sin_family = hp->h_addrtype;
|
|
sin.sin_port = rport;
|
|
bcopy(hp->h_addr_list[0], &sin.sin_addr, hp->h_length);
|
|
|
|
In this example, we copy hp->h_length ammount of data into the address
|
|
variable of a sockaddr_in structure, which is 4 bytes. The hp->h_length
|
|
variable is taken directly from the DNS reply packet. If we now look at how
|
|
rcmd() declares it's variables, and after looking through rlogin with a
|
|
debugger, we can determine that this is a dangerous situation.
|
|
|
|
int rcmd(ahost, rport, locuser, remuser, cmd, fd2p)
|
|
char **ahost;
|
|
u_short rport;
|
|
const char *locuser, *remuser, *cmd;
|
|
int *fd2p;
|
|
{
|
|
struct hostent *hp;
|
|
struct sockaddr_in sin, from;
|
|
fd_set reads;
|
|
|
|
On further testing, and implementation of exploitation code, we can verify
|
|
that this is indeed possible via the rlogin service. In order to exploit the
|
|
problem, we first start a program to send a fake DNS replies.
|
|
|
|
[root@ariel] [Dec 31 1969 11:59:59pm] [~]% ./dnsfake
|
|
oakmont.secnet.com(4732)->idoru.secnet.com(53) : lookup: random-domain.com (1:1)
|
|
sent packet fake reply: 270 bytes
|
|
idoru.secnet.com(53)->oakmont.secnet.com(4732) : reply: random-domain.com (1:1)
|
|
|
|
We then cause rcmd() within rlogin to do a host lookup and response with
|
|
our false data.
|
|
|
|
[oliver@oakmont] [Dec 31 1969 11:58:59pm] [~]% whoami
|
|
oliver
|
|
[oliver@oakmont] [Jan 01 1970 00:00:01am] [~]% rlogin random-domain.com
|
|
random-domain.com: Connection refused
|
|
# whoami
|
|
root
|
|
#
|
|
|
|
Impact
|
|
~~~~~~
|
|
|
|
By checking common BSD sources, we can see that over 20 local programs are
|
|
vulnerable to this attack, and possibly 2 remote daemons. The possibility
|
|
of exploiting local programs may seem insignificant, however if one considers
|
|
an attacker somewhere on the internet intercepting DNS lookups, and inserting
|
|
their own replies, it isn't. There is a real threat of passive attacks
|
|
present here, whereby any user on a network running any of these programs can
|
|
be a victim. Take for instance traceroute, or ping both of which fall prey
|
|
to this problem.
|
|
|
|
Aside from stock UN*X programs which ship with most vendor operating systems,
|
|
there appears to be problems related to h_length in external software packages.
|
|
Due to the flaw, FWTK (Firewall Toolkit) a freely available firewall kit
|
|
appears vulnerable. The generic routine, conn_server(), which is utilizied
|
|
by the proxy servers, appears to trust the data as well.
|
|
|
|
Vulnerable Systems
|
|
~~~~~~~~~~~~~~~~~~
|
|
|
|
At this point we would assume that most vendor systems who have incorporated
|
|
BIND directly into their operating system are vulnerable.
|
|
|
|
Solaris is not vulnerable according to Casper Dik <Casper.Dik@Holland.Sun.COM>
|
|
|
|
Fix Information
|
|
~~~~~~~~~~~~~~~
|
|
|
|
The maintainers of BIND, and CERT were notified of this problem several
|
|
months previous to this posting.
|
|
|
|
We recommend upgrading to the latest release of BIND which solves this
|
|
problem due to the incorporation of IPv6 address support.
|
|
|
|
The latest official release of BIND is availible at:
|
|
|
|
ftp.vix.com in the directory /pub/bind/release/4.9.5
|
|
|
|
|
|
|
|
We wish to acknowledge and thank Theo Deraadt, the maintainer of the OpenBSD
|
|
operating system for his help in finding and analyzing this problem. More
|
|
information on OpenBSD can be found at http://www.openbsd.org.
|
|
|
|
- Oliver Friedrichs <oliver@secnet.com>
|
|
|
|
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
|
Version: 2.6.3ia
|
|
|
|
mQCNAzJATn0AAAEEAJeGbZyoCw14fCoAMeBRKiZ3L6JMbd9f4BtwdtYTwD42/Uz1
|
|
A/4UiRJzRLGhARpt1J06NVQEKXQDbejxGIGzAGTcyqUCKH6yNAncqoep3+PKIQJd
|
|
Kd23buvbk7yUgyVlqQHDDsW0zMKdlSO7rYByT6zsW0Rv5JmHJh/bLKAOe7p9AAUR
|
|
tCVPbGl2ZXIgRnJpZWRyaWNocyA8b2xpdmVyQHNlY25ldC5jb20+iQCVAwUQMkBO
|
|
fR/bLKAOe7p9AQEBOAQAkTXiBzf4a31cYYDFmiLWgXq0amQ2lsamdrQohIMEDXe8
|
|
45SoGwBzXHVh+gnXCQF2zLxaucKLG3SXPIg+nJWhFczX2Fo97HqdtFmx0Y5IyMgU
|
|
qRgK/j8KyJRdVliM1IkX8rf3Bn+ha3xn0yrWlTZMF9nL7iVPBsmgyMOuXwZ7ZB8=
|
|
=xq4f
|
|
-----END PGP PUBLIC KEY BLOCK-----
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
Oliver Friedrichs - (403) 262-9211 - Secure Networks Inc.
|
|
Suite 440, 703-6th Avenue S.W. Calgary, AB, Canada, T2P 0T9
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 26 Nov 1996 09:28:24 -0600
|
|
From: "Gilbert L. Sebenste" <sebenste@geog.niu.edu>
|
|
Subject: File 8--Modems, PPP, who is doing what? (fwd)
|
|
|
|
((MODERATORS' NOTE: During a busy time of the term, we had some
|
|
dial-in access problems into our University computer system
|
|
attributed to faulty modems. Some questions arose about what
|
|
resources/set-ups other universities have, and a poster to a local
|
|
discussion group provided the following information. Given the
|
|
number of CuD readers affililiated with colleges/universities,
|
|
I thought the following might be of interest -- jt)).
|
|
|
|
Hi gang,
|
|
|
|
Well, after reading the message explosion after the modems got clogged,
|
|
may of you wonder who is doing what at other universities. The program
|
|
through which we get our weather data, UNIDATA, asked that of it's
|
|
participating schools. I think you'll find this interesting.
|
|
|
|
---------- Forwarded message ----------
|
|
Date--Mon, 25 Nov 1996 12:04:54 -0500 (EST)
|
|
From--Russ De Souza <rdesouza@nimbus.millersv.edu>
|
|
To--community@unidata.ucar.edu
|
|
Subject--Summary of PPP responses. Additional data from the PA State
|
|
|
|
System of Higher Education (SSHE) is also in report. Laurie attempted to
|
|
summarize results at bottom. Summary of PPP responses. Additional data
|
|
from the PA State System.
|
|
|
|
Community Summary of PPP responses + Summary of Information
|
|
|
|
Dial-in Access Availability Non-SSHE Schools
|
|
|
|
|
|
University of Nebraska
|
|
|
|
Off-campus users use Internet providers at their own cost;
|
|
negotiating license with providers for pricing limits and service
|
|
levels in exchange for providerUs connectivity to campus network.
|
|
|
|
|
|
University of Washington
|
|
|
|
Have modem pool for dial-in PPP access; user accounts as
|
|
validation.
|
|
|
|
|
|
Creighton University
|
|
|
|
Contract with USWest - faculty, staff, student, alumni can use
|
|
their service - unlimited connect time @ $11.95/month.
|
|
|
|
|
|
NE Louisiana University
|
|
|
|
PPP/SLIP not implemented due to security concerns. Some
|
|
departments considering doing limited PPP/SLIP on their own
|
|
networks.
|
|
|
|
|
|
Florida State University
|
|
|
|
250 lines with PPP connectivity. Individual departments also
|
|
have limited number of lines on their networks. Busy signals still
|
|
a problem.
|
|
Negotiating with IBM for $11.95/month unlimited access time for users.
|
|
|
|
|
|
Plymouth State
|
|
|
|
20 dialups with SLIP/PPP. Busy signals often. Suggestions to
|
|
users to find Internet Provider at own expense.
|
|
|
|
|
|
Lyndon State College
|
|
|
|
>From their research, usually less expensive and easier to
|
|
administer if access supplied by local provider. Agreement with
|
|
local provider: college provides installation seminars so local
|
|
provider reduces connectivity costs.
|
|
|
|
|
|
University of Hawaii
|
|
|
|
PPP connectivity provided; 90-minute access time limit (through
|
|
modem servers); heavily used. Some departments have limited
|
|
number of dialups available, mainly text-based.
|
|
|
|
|
|
University of Iowa
|
|
|
|
Many universities requiring faculty/students to pay for their own
|
|
SLIP/PPP connections. Have contract with MCI to provide local
|
|
dial-in phone numbers; $16/month for 60 hours access time. Are
|
|
phasing out their University-run pool of modems to save $400,000
|
|
annually.
|
|
|
|
|
|
Rutgers University
|
|
|
|
Dial-ins are handled by Cisco servers and provide a variety of
|
|
connectivity options (telnet, PPP, SLIP, etc.)
|
|
Full-time students pay $100/semester for computing services,
|
|
including networking and dial-up lines.
|
|
|
|
|
|
University of Wisconsin - Madison
|
|
|
|
400 modems, using Cisco routers. Will be increasing to 1,000
|
|
modems. Support variety of connectivity options (see Rutgers above).
|
|
|
|
|
|
Utah State University
|
|
|
|
128 dial-in lines, almost all traffic is PPP; evening access limited
|
|
to 5 hours per week per user. People wanting longer connectivity
|
|
time to ISPs, $19.95/month unlimited access time.
|
|
|
|
|
|
Summary of Information
|
|
Dial-in Access Availability
|
|
|
|
SSHE Schools
|
|
|
|
Bloomsburg University
|
|
|
|
56 modems - text only - all users have access. Networking residence halls
|
|
to support students. 16-modem PPP comm. server - limited to usage by 60
|
|
faculty and staff who have a Runiversity based need.
|
|
Recommending home user to use Internet Providers; at least
|
|
three local providers, $15 - $20/month for unlimited use.
|
|
|
|
|
|
Mansfield University
|
|
|
|
Decision was made to let existing Internet Providers handle
|
|
graphical dial-in support; recommend Epix and cable company.
|
|
|
|
|
|
Edinboro University
|
|
|
|
Do not provide graphical dial-in access; cost prohibitive.
|
|
|
|
|
|
Slippery Rock University
|
|
|
|
Text dial-in access provided an no charge. Faculty and students
|
|
wanted full graphical access are directed to third party providers.
|
|
Very few complaints from users.
|
|
|
|
|
|
Kutztown University
|
|
|
|
Text connectivity only via dial-in access. Arrangement with
|
|
Prolog as provider for alumni and friends. Average connect time
|
|
on their text dialups is 17 minutes; Service Provider reports 1 3/4
|
|
hours average connect time.
|
|
|
|
|
|
Lock Haven University
|
|
|
|
Providing PPP access, in the process of upgrading equipment.
|
|
Costs: $25,000 for 46 line support, plus phone line costs: $3,000 to
|
|
install then $1,000 per month.
|
|
|
|
|
|
|
|
Summary of comments made by people providing information:
|
|
|
|
- The costs of maintaining a modem pool to provide even text-only access
|
|
has been increasing rapidly over recent years due to a number of factors --
|
|
primarily a rapidly increasing base of users wanting this service. (University
|
|
of Nebraska)
|
|
|
|
- Serious users are still encouraged to go third-party. (Florida State)
|
|
|
|
- There is some justification for getting students to pay for their own
|
|
off-campus SLIP/PPP Internet access as it turns out that many students have
|
|
been using the University dial-in lines to browse the WWW for non-academic
|
|
purposes. (University of Iowa)
|
|
|
|
- There are many issues associated with providing Netscape to off-campus
|
|
students:
|
|
|
|
- More trunk lines will be needed;
|
|
- more modems are needed;
|
|
- Support calls are more difficult than typical text-based connections;
|
|
- How many modems is enough? Are occasional busy signals accepted?
|
|
- Should time limits be enforced to prevent net-surfing?
|
|
- With the need for faster connections every 15 months, where will the
|
|
funding come from? (28.8 modems yesterday, 33.6 modems today, 57.6 modems
|
|
tomorrow - gets expensive.) (Bloomsburg)
|
|
|
|
- With a limited number of lines the first 32 persons would be happy, but
|
|
the majority would be less than happy. (Kutztown)
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 15 Dec 1996 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 9--Cu Digest Header Info (unchanged since 13 Dec, 1996)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #8.88
|
|
************************************
|
|
|