Crack LinuxPPC Day 3:It Gets Better 461
So this ought to amuse ya: Its Day 3 of the Crack LinuxPPC, Win
PPC Contest that Jeff Carr has been doing. During that time, The
Win2k crack box has gone down several times... yet the LinuxPPC box
remains stable. Jeff has decided to make the game more interesting.
The machine is still crack.linuxppc.org, but the world now may know
that the Root Password is "linuxppc". If you can crack the stock
LinuxPPC box in a reproducable manner, you get the machine.
Re:Crack with the root password? (Score:1)
But, being a stock install, this is probably not the case and therefore getting access to any shell account would be sufficient.
-Restil
Re: Unompressed by both, but more impressed by (Score:1)
Nonsense. Just like a web browser, the Win2000 guest book is an integral part of the operating system.
Re:Huh? when was it down? (Score:1)
linuxppc down??? (Score:1)
Re:NT != DOS (Score:1)
http://www.info.apple.com/applespec/applespec.taf (Score:1)
Re:When has it been down? (Score:1)
MS_COINTELPRO?
I wouldn't be the least bit surprised. It would only be a slightly more negative attitude than is often expressed in some of their AstroTurf campaigns they've run in the past over things like streaming media ("I can't use that Really Medium player or whatver. Why can't you use Windows Media Player instead? It always works for me!" (followed by M$ literally throwing money at the content company to as an 'incentive' to switch)).
Re:ESR's article == FUD (or at least BS) (Score:1)
1. Because of protected memory, you don't have access to kernal memory as a user. So, any virus would have to somehow launch as ROOT.
2. A back orifice like tool would probably be able to compromise individual user security, but again, do little damage to the system as a whole, without adequate user permissions.
3. Same thing with macro attacks. Individual users only, unless the application did stupid 'suid' stuff.
Basically, to REALLY compromise security on a *nix boxc, you've got to have root access. When this is the case, I find the 'rm -rf
But that's just me.
Re:Example of proficient techies at Microsoft. (Score:1)
--
Wonko the Sane
This Win box isn't reality... (Score:1)
Take one and two and tell me how this equates to any real world server. Sure I can put up any OS serving only port 80 and consider it secure!
What about realworld where your server is not on-site and must be remote administrated, or atleast, not on-site in your office, but in another building where your ISD group maintains it.
IMHO this whole set-up is a scam.
Re:Crack with the root password? (Score:1)
Re:I suspect Micorsoft just killed Windows 2000. (Score:1)
"The press are picking up on this, including some non-IT rags (see Linux Today). This is going to be a PR disaster of the finest water.
"Expect a(nother) name change for NT5/W2K sometime during the fall. That'll let them pretend it's a different product."
No, they'll merely change the slogan (drumroll please):
It just doesn't work.
Re:NT != DOS (Score:1)
DoS = Denial of Service
DOS = Disk Operating System
Re:Crack with the root password? (Score:1)
Doug
cant telnet in as root? simple. (Score:1)
Re:Check out ESR's article on this (Score:1)
Has ESR forgotten that the internet worm of the late 80's used a bug in sendmail?
How is that any different than the Melissa virus on Windows? Both problems spread via an insecurity in the mail program.
Re:To be fair to Microsoft (Score:2)
I'm sure if they ask Bill real nice he could shell out some dough for a server and an NT4 license...
The only people stopping Microsoft from putting out a non-beta crack test is Microsoft. We can only guess why they aren't. My guess is that they think that W2K is more secure than NT4.
Re:Hey, Windows on a Linux/PPC machine... (Score:2)
Well, I posted the link straight from crack.linuxppc.org so I can't vouch for how it was created. The link from the main page mentions SheepShaver.
Re: Unompressed by both, but more impressed by (Score:1)
Mindcraft again, but this time... (Score:1)
Re:this is a very good point (Score:1)
"The number of suckers born each minute doubles every 18 months."
-jafac's law
Re:my, this is getting interesting, BUT... (Score:1)
Damn, third day of thunder or what..?
hehe (Score:1)
Re:bogoMIPS? (Score:2)
"Bogomips is a measurement provided in the Linux operating system that indicates in a relative way how fast the computer processor runs. The program that provides the measurement is called BogoMips. Written by Linus Torvalds, the main developer of Linux,
Re:Time for some DoS attacks (Score:1)
To force reload even of cached pages and cached inline images in Netscape Navigator/Communicator, use Shift-Reload, or View|Reload.
Netscape's Reload button is crippled by design [netscape.com]. Also see this page [netscape.com] for more details.
Example of proficient techies at Microsoft. (Score:3)
1:00pm - Tuned IIS' performance options reset application protection to Medium, and rebooted.
8:54am - Changed IIS' application protection to Low and rebooted, site back up
In other words, "Dragged slider bar in IIS window to a different setting, and waited five minutes while the system rebooted and restarted most of the services."
"Tuned" my ass.
Re:I suspect Micorsoft just killed Windows 2000. (Score:2)
Re:What hardware IS the LinuxPPC box? (Score:1)
Re:Hey, Windows on a Linux/PPC machine... (Score:1)
my, this is getting interesting, BUT... (Score:1)
Re:Crack with the root password? (Score:1)
Pardon me for butting in... what do you mean, Windows 2000 is a relatively new operating system??? Correct me if I'm wrong (please!) but isn't Win2k a.k.a. NT 5? I'm pretty sure that it's "built on NT technology" (which is redundant, given what NT stands for, but that's okay, this is MS). What does this mean? Windows 2000 is not new, it's using a kernel that's been around for several years (I'm sure NT is at least as old as Linux, but I don't know, can anybody help me out here?). Of course, it has supposedly been improved over time, but I'm not sure...
Crack with the root password? (Score:1)
ESR's article == FUD (or at least BS) (Score:1)
Non-Microsoft operating systems such as
Linux are invulnerable to macro attacks, immune to viruses, and can laugh at Back Orifice.
This is pure unadulterated bullshit and ESR knows it. I couldn't bring myself to read any further to see if he redeems himself so my apologies if he said "just kidding" later on. In his attempt to build up alternative OS's he has falsely stated that MS is vulnerable to attacks that are unthinkable in _all_ other OS's (or at leas Linux). What makes it all the worse is that Linux is far superior to Windows (especially 9x) in terms of real security. Let's stick to the facts and win on the level instead of trying to bead MS at their game of lies and half-truths.
To those who don't see the problems in ESR's statements, here's a quick rebuttal of the sentence above:
Vi has had macro attacks in the past and any application can have a design that allows macro attacks. They simply have to treat data files as scripts. While I can't think of an application that has such a vulnerability at the moment it does not make non-MS OS's immune since it is not an OS issue. MS has the responsibilty for Mellissa et al. not because they made the OS but because they made the programs (Outlook and Word) that were the vector for the worm.
Linux may be less vulnerable to viruses due to more attention to kernel security and memory protection, but it is also fair to say that not many people have tried. I would hesitate to call it invulnerable, but I'll concede the point if a security expert can convince me otherwise.
Laughing at Back Orifice is pure and complete BS. Crackers don't need to install BO, it's already there!!! Seriously, all BO is is a remote GUI. Most linux servers have X installed and everything can be configured with a terminal anyway, all they need is root access. BO may be a more stealthy, but a cracker needs to get Administrator access in the first place to install it and it is slightly easier to monitor for BO listening on one of your ports than it is to monitor all telnet and X connections for root activity.
In any case the name of the game is to prevent root access in the first place. I believe that Linux does a more comprehensive job of this, but we need real arguments, not lies, to win the fight.
--
Re:??? If we know the root password... (Score:1)
Re:Crack with the root password? (Score:3)
in directly as root remotely. You'd still
need to get at least a non-root shell somehow.
Basically he is just lowering the barrier of entry from "get a root shell" to "get a shell", but given the number of rootkits out for Linux, these are already pretty equivalent (penetrating a Linux box remotely is a lot harder than getting root once you are in).
Re:NT != DOS (Score:1)
In ANY context, "Denial of Service" is abbreviated DoS, not DOS. The poster made a mistake.
Pointless Test (Score:1)
What would make a more interesting test is to have a competition between NT/2K and Linux where they would run a standard set of services (web, mail, maybe directory services). Then you unleash crackers on it and see what gets broken.
Really all this is doing is testing the security of TCP/IP stacks on both OS's, and the security of Apache vs. IIS serving up static pages. It's much more an Apache vs. IIS thing than a Linux vs. Windoze thing.
---
Re:Packet loss (Score:1)
i.e. exp(j*PI) - 1 = 0
So you are giving -2 cents?
Re:linuxppc is not a good comparison (Score:2)
Who is 'they'? Lunux/PPC put one of their own boxes on the line for this. You were expecting maybe an PIII-500 running Slackware?
Re:Note the Letters PPC (Score:1)
You're right of course!
I basically meant I wonder if Win2000 would run on a similar spec machine...
The "unstoppable" Windows NT...HAHAHAHAHAHAHA (Score:1)
Re:??? If we know the root password... (Score:1)
(sunrpc) (t-net) (httpd)
Re:Playing Devils Advocate, But... (Score:1)
We've had a lot of experience with these kind of DoS attacks. Our experience is that various NTs and Linux boxes bog down or eventually become non responsive; although the Linux doesn't usually crash per se. However, our BSDI boxes chug right along without even so much as a blink.
FWIW.
"Get Real" (Score:1)
Meanwhile, the LinuxPPC has been chugging along, being attacked 2 million times an hour with no success. He's even tried to make it easier for people. No faltering, no crashing - even the Slashdot effect hasn't killed it. LinuxPPC has multiple processes open and even telnet - the W2K only had the webserver open. LinuxPPC is still cooking along, W2K couldn't even handle having one process happening and died multiple times.
"The router's down" - but a test confirmed that it was up. Weather? Other systems in the area at the same time were up, and the weather wasn't a factor in the entire time that the computer was crashing (what - 9 times now?). Excuses - if a company can't come out and say that they failed and will work to correct the problem, then they are dishonest and people shouldn't do business with them. You're going to trust your business and mission critical applications to these yokels? You never know when they're telling the truth or feeding you a line. At least with Linux you know exactly where you stand and where to go to fix any problem that may arise. No one is hiding anything in the Linux community - that's not how our software was developed. Open Source means Open. No lies, no deception. That's something I want to base my business on and something I want to base my mission critical apps on...
Get with the real world - dump your Microsoft fantasies and get on a real OS. Why do you think so many major computer manufacturers are supporting Linux? (Remember - Microsoft doesn't manufacture hardware - only software - so the industry leaders are still the hardware manufacturers that choose which OS to use). SGI is even talking about dumping Irix in favor of Linux. Can you seriously attempt to compare NT to Irix??? Sun is putting Linux alongside Solaris in their support. NT doesn't hold a candle to Solaris, regardless of what the proprietory benchmarks make out. The real world is Unix and Linux. The fantasy world is Microsoft. Sooner or later you're going to have to wake up and face reality...
Re:What version of LinuxPPC is this? (Score:2)
--
Re:dickhead (Score:1)
You eigther have both boxes DoSed in equal measure to give us all a neat insight into how they cope under the same strain or you don't Dos either box at all.
Clearly the latter option is far easier to achieve, and is inherently more sensible as the entire competition is about cracking and not DoSing.
Anyone who attempts to DoS either machine is clearly a bit of a no-brainer as they're seeing a contest designed to be constructive and doing something destructive instead.
Re:ssh is not free software (Score:1)
Package: ssh
Status: install ok installed
Priority: optional
Section: non-US/non-free
Case closed
Daniel
Load difference (Score:1)
linux ppc:
load average: 0.22, 0.25, 0.23 (equals about 25% processor usage, right?)
windows:
% Processor Time Avg: 30-47
Re:root password (Score:2)
That doesn't follow. Assuming you aren't talking about exploiting a bug in fingerd itself, simply knowing valid user names won't help much because you must still crack the password for that account (good luck).
Even if you manage to get in (not necessarily by brute-forcing the password), the shell may be a flytrap - a potemkin shell while the system logs everything it can about you while paging the sysop.
Worse, it's trivial to write a potemkin shell that escapes to a real shell only if the client is in a magic IP address range and the user knows the magic command. That means *every* shell could be trapped, but only people on the local subnet could enter the command "O$ks&*%kk1!" and escape to a real shell.
I don't know of any potemkin shells in a standard distribution, but a non-responsive one is trivial to write if you know basic socket programming. Even a responsive one can be quickly built if you use chroot() and are careful what commands you copy into your sandtrap.
Re:bogoMIPS? (Score:2)
For everything you ever wanted to know about this topic, visit the BogoMIPS mini-HOWTO [unc.edu]
Re:Check out ESR's article on this (Score:1)
The difference is they fixed sendmail. Another Melissa can come along any day. Next time it probably won't be a Macro. There is now a problem in excel 97 that uses ODBC to take over the machine, without any warning.
Re:Unimpressed by both, but more impressed by Linu (Score:1)
I disagree. Remember that the audience for these stunts is the world's PHBs. They don't know the difference between a crack and a DOS attack (or a crack on the DNServers).
Sure, MS will have some excuses -- maybe even some good ones -- but the outstanding fact for the PHBs will be that MS put up the challenge and the box did go down. Repeatedly. And after the fiasco of the DOJ trial, where they were repeatedly shown to be liars and falsifiers of evidence, those excuses/reasons are apt to ring slightly hollow in ears that don't know how to weigh them. The seeds of doubt have been sown.
Also, those PHBs will hear that the content of the Web site was changed by 'hackers'. We all know that it was a BFD, but the PHBs don't. Or, if some few happen to know it, they'll be asking themselves: Have I been buying software from a company that is stupid enough to leave such a simple and obvious leak when setting up a security challenge?
Ditto for all the other downs, even if a few PHBs believe MS's explanations and realize that none(?) of the problems really represent cracks [see, even I can't say 'none' with full confidence!]. PHB: Have I been buying software from a company stupid enough to leave so many simple and obvious failure modes when setting up a high profile demonstration of their newest flagship product?
No, the egg won't be on any penguins' faces.
The only question now is deniability. How will MS wriggle out of this one? My prediction is that they will say it was an unauthorized test by a subcontractor or a couple of rogue employees, that MS proper had nothing to do with it, and that besides, it wasn't an up-to-date build anyway. The real thang is secure and it don't never crash. (Remember, you heard it first on
Re:I suspect Micorsoft just killed Windows 2000. (Score:1)
Re:NT != DOS (Score:1)
You people make me downright nauseous.
Windows NT (Not Today?) (Score:1)
Why not use an Alpha? (Score:1)
For my choice, I run Linux at home on my new AMD K6-III 450 toy.
Re:downtime (Score:1)
Re:Yep, it's BOCHS (Score:1)
Pretty lame (Score:1)
Memory Usage:
MemTotal: 158760 kB
MemFree: 19468 kB
MemShared: 123140 kB
Buffers: 9432 kB
Cached: 72416 kB
SwapTotal: 67468 kB
SwapFree: 67468 kB
There's 72M of memory being used as cache.
Notice that the swap has not been touched. We
don't get a ps to see how many copies of httpd
or anything else are running...
Re:actually it is (Score:1)
Re:linuxppc is not a good comparison (Score:1)
How many people use Linux on PPC versus the number of people who use W2K on Intel?
--
Re:160,000K memory installed in LinuxPPC box (Score:1)
160MB of ram?
Re:114000K memory used on win2k test box (Score:1)
"The number of suckers born each minute doubles every 18 months."
-jafac's law
Re:linuxppc is not a good comparison (Score:1)
I wouldn't be surprised if someone at M$ could predict this outcome, only to be trampled by marketoids.
____
Corrected URL (Score:1)
You're welcome. :)
--Tom
Re:Incentive to crack linux box (Score:1)
Blather really should get moderated down. Now if someone posts something thoughtful and intelligent that is pro-MS and they get moderated down, then something is wrong. I don't see that happen much (people posting anything intelligent that is pro-MS, let alone it getting moderated down), and when it does happen, someone else will usually moderate it back up.
no one here owns MicroSloth stock
I certainly don't own any, but I'd bet there are quite a few people who read and even post on Slashdot that own Microsoft stock. And I'm not just talking AC's or obvious Microsoft apologists either.
As for your assertation that people aren't working as hard to get into the Linux box, I don't know if that is true. They are offering a real, tangible incentive (you get to keep the box if you get in). That is a pretty good reason. And unlike Microsoft, whom many wouldn't care to do debugging work for gratis, lots of people are happy to help out Linux developers.
Re:linuxppc is not a good comparison (Score:1)
not mad or anything, but last I checked LinuxPPC ran on non-intel processors.
In case you ["didn\'t notice","have no sense of humour"] this message was posted completely out of fun.
Re:Crack with the root password? (Score:1)
This is a big issue. It is really unfair for MS to put out a "special test version" of Windows and challenge everyone to crack it. It means nothing. Just assume that nobody gets in, because they have done their homework and fixed all of the NT4 holes. MS claims victory. Win2k gets released. Crackers install it on their home machines, look it over from the advantage of home court, and find the holes. Two weeks later, the OS that crackers couldn't crack is wide open, with scripts for the script kiddies on all the hot web sites. Just because you win when your opponent is fighting blind doesn't mean you are invincible. Just wait until you have to fight again on fair terms, and then you can say you are, well, not invincible, but at least "tough."
Of cource, even fighting blind, the guys working on it (I'm not one of them) seem to have done pretty darn well. I don't know what more to expect than periodic system crashes. With MS admins watching over the system, as soon as anything screwball happens, they are going to reboot, change the accounts, and remove the crack. A watched pot never boils, especially if you take it off the burner every time it starts to simmer.
On the other hand, the source code for the Linux box is out there. The guys setting up the contest, without going into specifics, have pretty much told everyone how the thing was set up: stock install, with apache added and Telnet enabled. This is a fair test of a system's security. It may go down. Maybe not. Who knows?
I'm not taking a position for or against MS or Linux. I think they both have good things to offer. I wouldn't put mission-critical stuff on an NT box, but it has a lot of good uses. I like Linux, too, but it isn't for everything, either. Heck, even Macs have strengths!
MS's challenge is pretty much worthless. (I hope they get torched, though!)
Re:Hear! Hear! (Score:1)
Re:Initial user account? (Score:1)
Re:Denial of Shitheads (Score:1)
Hackers hack, crackers crack, and me... I write code and manage the systems here at where I work. Never once have I had break out a DoS or Spoof to do something productive. Do I know how to do these things? Yes. Do I see a need to do these things? No. Am I going to campaign to take away someone's rights to do these things? Hell no. It's a free country - do whatever the hell you want. Just don't come bitching to me if you do something illegal and the law clamps down on you...
Re:Incentive to crack linux box (Score:2)
Let me say they are on my mind, but Linux is on my computer. That is good enough for me, was it good for you?
ports (Score:1)
Re:Time for some DoS attacks (Score:1)
Ok, so that was sort of weak because Microsoft only asked us to stress test it in a specific way which did not include DoS, but my next point is better.
DoS against the Linux machine impedes the ability of others to attack it, and thereby reduces their ability to get a free machine.
DoS against the Windows machine impedes the ability of others to attack it, and thereby reduces the amount of free testing Microsoft gets (of the kind it wants).
If the cracker's aim is not to work for Microsoft for free, he or she should aim DoS attacks against the Windows machine, but not against the Linux machine.
Re:linuxppc is not a good comparison (Score:1)
"The number of suckers born each minute doubles every 18 months."
-jafac's law
Re: Unompressed by both, but more impressed by (Score:3)
"That's an application, not Windows 2000," he said.
"It's been up for most of the day today," he added.
Now that's comedy.
Ivan.
Bottom Line (Score:2)
I look at the Windows 2K log and what I see mirrors my experience with WinNT: a lot of reboots for fairly minor things (tweaking the web server and tweaking tcp/ip). I look at the Linux log and I see stability.
The bottom line is that NT is not as stable as Linux for Internet applications.
Re:Crack with the root password? (Score:2)
I'm a bit confused now. How can it be called "cracking" when you have been given the root password by the owner? I thought the whole point of cracking was to *get* the root password (or some equivalent).
Having the root password isn't useful if you can't get to a prompt to use it.
You can't login as root from a remote machine, you'd have to be able to get into the system *first* and *then* su root for the password to be useful. So some crackery needs to be employed to get that far.
Re:??? If we know the root password... (Score:3)
Re:Playing Devils Advocate, But... (Score:2)
Re:hehe... a fine suggestion... ssh... or lsh! (Score:2)
Re:bogoMIPS? (Score:2)
The view from Haaz's land (Score:2)
www.linuxppc.com/crack/ [linuxppc.com],
which is not the same as the crack target server, crack.linuxppc.org.
Re:What does the message at the bottom mean? (Score:2)
If the machine is ever compromised, I can see the winner saying, "Oh, you mean I get this LinuxPPC machine? I thought I was going to get *crack*!"
Re:Mindcraft again, but this time... (Score:2)
D
----
Re:No (Score:2)
Actually I was under the impression that it originally stood for "Kalle's Desktop Environment".
Re:my, this is getting interesting, BUT... (Score:2)
Not so (at least as of 1:50 Central)
Current Server Statistics:
Uptime and Load Average:
1:49pm up 3 days, 2:11, 3 users, load average: 0.32, 0.37, 0.26
Memory Usage:
total: used: free: shared: buffers: cached:
Mem: 162570240 105615360 56954880 99618816 4542464 55717888
Swap: 69087232 0 69087232
MemTotal: 158760 kB
MemFree: 55620 kB
MemShared: 97284 kB
Buffers: 4436 kB
Cached: 54412 kB
SwapTotal: 67468 kB
SwapFree: 67468 kB
Processor Info:
processor : 0
cpu : 604
clock : 132MHz
revision : 3.3
bogomips : 263.78
zero pages : total 0 (0Kb) current: 0 (0Kb) hits: 0/222364 (0%)
machine : Power Macintosh
motherboard : AAPL,9500 MacRISC
L2 cache : 512K unified
memory : 160MB
I just refreshed and got it (dns doesn't have it but I have the ip)
What version of LinuxPPC is this? (Score:2)
For one thing the Apache server has been modified.
I thought this was supposed to be a clean install?
--
Re:Why... (Score:2)
Unices sounds too much like Unisys.
Guestbook "compromise" (Score:2)
However, I remember reading yesterday that someone got backorifice on it, and that's a genuine crack. I don't know the details, though.
D
----
Re:Running as Root (Score:2)
The question might be why have Microsoft's business customers consistantly chose to run crappy DOS/Win over better alternatives such as OS/2 and Windows NT. (Although, everyone runs as root under OS/2 also.)
--
Re:Some would say UNIX is inherently insecure (Score:2)
My paperweight is pretty secure too.
Nice theory though, perhaps we'll see it in practice someday.
SSH security (Score:2)
PermitRootLogin no
IgnoreRhosts yes
PermitEmptyPasswords no
--
Hey, Windows on a Linux/PPC machine... (Score:2)
This is morbidly cool
screenshot [linuxppc.org]
crack is running LinuxPPC 1999 (Score:2)
Re:NO! (Score:2)
No. According to Intel Payola W2K requires a PII. As a workstation, the beta seems faster than NT4 on my P-133.
As for the 64MB part - try 128MB instead. Maybe the faster processor is an attempt to make up for all of the swapping.
--
Re:ESR's article == FUD (or at least BS) (Score:2)
--
Running as Root (Score:2)
The attitude in the unix security community seems to be "oh that's only user space - the *system* wasn't comprimised", but that's litte condolence if some VP is pissed because lost all of his porn files and his account spammed the entire company.
Basically the only virus protection advantage that Linux has over NT is that MS Office doesn't run on Linux. You can get the same 'protection' on Windows by running corel, Lotus, Star or something else.
--
Re:Denial of Shitheads (Score:2)
Okay, let me get this straight... In your mind, it's okay to use a DoS to nearly knock another machine down, just so you can spoof it, but it's not right to use a DoS to totally knock a machine off the net?
Riiiiiiiiiigghhhttt....
Did the thought ever cross your mind that Spoofing is just as heinous as a DoS? That neither of them has any real use in an active and productive society?
Here's a buck... go buy a clue.
Memory usage ~ Fair play (Score:2)
It says memory usage around 114Mbs...
Perfmon info from 8/6/99 10:00am
Datagrams Received/sec Avg: 250
Fragments Received/sec Avg: 4
Total Fragment Reassembly Errors 30000 in the last hour
Connections Avg: 500
% Processor Time Avg: 40
Memory use steady at about 114000K
They also posted a new support document explaining how what is happening to the machine is normal :
http://support.microsoft.com/support/kb/article
I would like to learn some more on this mega server, more specs (steady size of the swap file, cpu idle time, if someone can use the machine to play minesweeper right now...)
This really is fun to see... Happy happy joy joy!!