Security Hole in SSH1 with RSAREF 160
Read the
CERT Advisory
carefully, because it's a bit complex. A buffer overrun in the RSAREF2 library, a common implementation of a common crypto algorithm, combines with a buffer overrun in version 1 of sshd to allow unauthorized execution of arbitrary code.
PGP is
not affected.
SSH2 is not affected. All versions of the free SSH1 are affected, but only "when --with-rsaref is explicitly supplied on the command line." (On my system, "ssh -V" tells me whether I compiled in RSAREF, presumably the same for both client and server.)
Re:How is this obnoxious comment informative? (Score:1)
A healthy dose of conspiracy for the day (Score:2)
Someone on BUGTRAQ floated that the RSAREF buffer overflow might be used in an AIM-style ``detection'' fashion. (Remember the AIM buffer overflow that was used to see if the client on the other end was a ``genuine'' AIM client or not?)
As most know, if you're in the US, RSAREF is the be-all and end-all of what you can use -- and only then, noncommercially. If you want to use RSA without RSAREF, you have to buy software from someone who pays RSA licensing fees. (On a side note, it's probably worthless to see if you can get a personal license from RSA to use OpenSSL or some other toolkit, even if you have money. I floated this question on the OpenBSD list, since OpenBSD includes OpenSSL, and it seems it's been tried -- and RSA ignored the request.)
In any event, RSA could theoretically use the RSAREF vulnerability to scan US hosts for compliance with the RSAREF mandate. If the buffer overflow was there, and they were a commercial entity, the red alert klaxon would sound and the lawyers would be summoned. Not a pretty picture.
The way to combat a potential scenario like this would be to get the news out as fast as possible that you can patch RSAREF (RSA graciously allowed us in the CERT advisory to patch it, gee how nice of them) and should ASAP.
Re:just compile without RSAREF (Score:2)
And to RSA as well. It's amazing to me that in the CERT advisory, they grant permission to have this fix be made, but don't grant permission for any further fixes to be made, should they become necessary. I can see if, in their original onerous license, they might not have added that clause just because they weren't thinking about it. But come on, RSA! Wake up!
My personal feeling is that they put out the code ``for the benefit of academia'', to train a horde of students to bow down at the RSA throne -- and then when those students get out in the Real World(TM), they love RSA the algorithm, but need to shell out big bucks to use a better RSA implementation because -REF just plain sucks. It would not surprise me if this were intentional.
Re:The problem is C, and yet another overflow bug (Score:1)
The last time I reported an overflow vulnerability in the NT kernel to Microsoft, their bug-report CGI script crashed and the bug report was lost. Very frustrating. So, for the record, here it is.
There's an exploitable bug in the decompression code for RLE-compressed BMP files. (Yes, that code is inside the NT 4 kernel. Bad design decision.) It's easy to create a BMP file that will crash NT 4 every time it is opened. An attack could potentially be built on that, with enough work.
I don't really have the time to analyze this problem in detail, (life is too short to debug other people's code without source) but someone might want to work on it and report it to CERT.
Hmmm.... Doesn't seem to be... (Score:1)
$ ssh -V
SSH Version 1.2.27 [i586-unknown-linux], protocol version 1.5.
Compiled with RSAREF.
What gives? I thought RSAREF shouldn't be there anymore.
Re:How is this obnoxious comment informative? (Score:1)
when someone is asking for a simple yes/no answer, and you're making them go click on the hyperlink when you could've answer their question in less keystrokes, that sounds pretty rude to me.
Capiche?
NiftyTelnet SSH (Score:1)
Visit http://www.lysator.liu.se/~jon asw/freeware/niftyssh/ [lysator.liu.se] for the info and download.
Re:just compile without RSAREF (Score:1)
Is there any reason why we couldn't gut, clean and all but replace the code in RSAREF, document the changes and still stay within the bounds of the license??
Fixing stack, or language, not good enough (Score:4)
So, let's just change chips. :-) Of course, that's hardly enough. Can't we clear up a lot of these exploits by fixing the stack? The answer is yes, we could clear up a lot of them. But that sadly, it's not going to cure the class of problem completely.
Why should stack and data pages be executable? Why are any pages that are executable also writable? Well, there are a couple reasons for that. Certainly it hasn't always been that way. But the signal trampoline code from gcc(1) makes this very attractive, and it's a bit annoying to change. You still have to deal with issues of mmap(2), which can ask for pages with any access bits it cares for.
And let's not pretend please that C is the issue here. It's not. You're diddling the instruction set. I don't care if you used a Pascal compiler. You could still diddle it. Then again, there's something to be said for having a cleaner library. See the end of this missive for a simple, elegant, and effective approach to one class of these problems in C by someone famously inclined toward the simple and elegant.
What I strongly suggest that anyone interested in this do is read existing literature on this. Yes, it's work, but it's really, really good for you. Start with the paper StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks [ogi.edu]. And yes, the buffer overrun in the version of Perl referenced by this paper has long since been fixed. But then read about how to defeat this [insecure.org]. You can also check out disabling an executable stack on Solaris [uwaterloo.ca], and why this isn't a cure-all [cam.ac.uk].
Even with a non-executable stack, you can still be bitten. Several such exploits have appeared on bugtrak. Here's one [fi.upm.es]. The short explanation for why this isn't a panacea is that if I push a pointer to "/bin/sh" and a (char *)0 on the stack in a place right before an system(3) (well, or or execl(3) or execve(2) or whatever) then it'll still suck to be you. Notice I haven't executed any code that I put on the stack. I just managed to change some of the arguments to existing calls.
Let me put up a copy of some mail [indiana.edu] from Ted T'so, who said it well:
So let's not get too self-satisfied with having non-executable stacks. It's still not enough.Here's [deja.com] the promised gem of insight from Dennis [bell-labs.com]:
That's certainly an, um, interesting approach, eh?Re:naughty bits (Score:1)
RSA gives consent to patch (We shouldn't need it) (Score:1)
Given that they're an IP-happy organization with a long history of iffy code I'm glad to see that they're doing the obvious thing and giving others permission to fix the problem. Of course if they weren't requiring use of their code for "their" algorithms this wouldn't be an issue.
Re:Not ssh, RSAREF (Score:1)
Slightly Old News? (Score:1)
Re:How is this obnoxious comment informative? (Score:1)
It's uptight people like you who make me sick. Someone should moderate you down.
I fully understand that I will be moderated down too.
Is this fixed already? (Score:4)
Okay, I have heard about this RSA/ssh buffer overrun thing for a few weeks now. So I do
[rangek@pinot-noir rangek]$ ssh -V
SSH Version 1.2.27 [i586-unknown-linux], protocol version 1.5.
Compiled with RSAREF.
But then I do
[rangek@pinot-noir rangek]$ rpm -q --queryformat '%{CHANGELOGTEXT}"\n"' ssh
- RSAref buffer overrun patch (rsa.c) as described in Core SDI advisory
from December 1, 1999. Thanks to Oystein Viggen for sending me this patch."
So is this the fix for the advisory in the story or is this another new problem that this package is vulnerable to?
Re:Interesting point. (Score:1)
www.zedz.net RPMS already updated (Score:3)
From the ChangeLog:
* Mon Dec 06 1999 Jan "Yenya" Kasprzak
- RSAref buffer overrun patch (rsa.c) as described in Core SDI advisory from December 1, 1999. Thanks to Oystein Viggen for sending me this patch.
Default US SRPMS install uses RSAREF (Score:2)
-B
Re:CASH to surf the web (Score:1)
The Key Point is... (Score:2)
Not to mention that you have to specifically enable this particualar library - which I doubt most people would have, given the other choices of ciphers (correct me if I'm wrong, but *I* saw no reason to)... then again, IANACG (Crypto Guru)
OpenSSH? (Score:3)
Kaa
Interesting point. (Score:1)
Affected Items (Score:3)
p5-Penguin, p5-Penguin-Easy, jp-pgp, ja-w3m-ssl, ko-pgp, pgpsendmail, pine4-ssl, premail, ParMetis, SSLtelnet, mpich, pipsecd, tund, nntpcache, p5-Gateway, p5-News-Article, ru-pgp, bjorb, keynote, OpenSSH, openssl, p5-PGP, p5-PGP-Sign, pgp, slush, ssh, sslproxy, stunnel, apache+mod_ssl, apache+ssl, lynx-ssl, w3m-ssl, zope
Re:OpenSSH? (Score:1)
Re:OpenSSH? (Score:1)
Re:The Key Point is... (Score:1)
"If you're going to make claims back them up or get out of my fucking face."
I suggest you do the same. You don't have very convincing arguments about OpenBSD source auditing being an "urban legend". And it is still considered the most secure OS around.
Re:Interesting point. (Score:2)
This is a classic example of ``security by obscurity'', and it's what Microsoft relies on. I would say that the problem would have been found eventually. If you follow BUGTRAQ at all you'll notice that there are people finding buffer overflows in code they don't have the source to simply by throwing shellcode into fields that look like they have a fixed length. If it makes it crash, they've found a potential exploit. (Note to security gurus: yes, I know this is terribly simplistic; but it makes my point.)
Re:ssh on linux (Score:1)
This doesn't only affect ssh (Score:1)
Re:just compile without RSAREF (Score:1)
Debian Version of SSH (Score:1)
SSH Version 1.2.26 [i586-unknown-linux], protocol version 1.5.
Standard version. Does not use RSAREF.
So all of you with a stock Debian slink install should be okay. Does anyone know about the ssh version in potato (unstable)?
Sean
Re:OpenSSH? (Score:1)
FUNCTIONALITY ADDITION: Nov 11, 1999 Various OpenSSH improvements have been made since the 2.6 release shipped. To resolve the various (non-security related) features which users may want, we are making a jumbo patch available. This is now at VERSION THREE. Revision 3 of this jumbo source code patch exists. NOTE: /etc/sshd_config and /etc/ssh_config may need changes.
And the other way round too! (Score:1)
Non-commercial users, as I understand it, must also use RSAREF and aren't allowed to go with faster, better alternatives.
If RSA had found this problem before anybody else, scanning commercial entities to see if they were using the non-commercial-only RSAREF is only the half of it. They could also have scanned non- commercial entities to see if they were using non-RSAREF libraries. Patent violations! Cease And Desist! Kill! Kill! Kill!
Re:The Key Point is... (Score:2)
The OpenSSH implementation checks all outputs it gives, as well as all inputs it gets, so it won't cause the bug.
This is according to Theo himself, who seems far too precise (OK, anal) to let pride get in the way. Me, on the other hand, correcting myself for the second time, am obviously fine spewing crap out. sigh
Re:Affected Items (Score:1)
Re:The Key Point is... (Score:1)
> It's kinda hard to audit code that's not released...(i.e. RSAREF)
Hmmm... that's funny. I have the source to RSAREF right here in front of me. I'm sure millions of other people do too.--
Re:OpenSSH? (Score:1)
This is a fundamental issue with RSA in the USA (Score:2)
RSAREF is provided as a service to people who want to do R&D and have more brains than money, as it were. Datafellows Ltd. and the other windoze SSH vendors had to license BSAFE or negotiate their own license for implementing and selling RSA-capable software in the USA for money, as is the intent of RSADSI (it is their livelihood).
Nonetheless, for non-commercial usage, there are more than a few people who might suggest that it is worthwhile to sidestep this issue by simultaneously not depriving RSADSI of income, and also not leaning on them to support RSAREF, which sucks and is a total waste of time/money for them. I'm not saying that you should do an end run around the patent if you live in the USA. What I am suggesting is that
So, make up your own mind about what's morally, legally, and ethically the right thing to do. Our patent system sucks, the "Smart card" RSA patent may not really apply, yada yada, but more importantly, what is the Right Thing to do here?
I can't make that decision for you. All I can do is present the facts and some relevant discussion.
If you want more explicit advice, you can ask RSADSI, but they are famous for being vague about these issues, and aren't making any money by supporting stupid questions about free libraries.
Re:OpenSSH? (Score:2)
Re:Default US SRPMS install uses RSAREF (Score:1)
just installed SSH1 v1.2.27 last night on a new machine. I got lazy and installed via a SRPM, and didn't do anything more than 'rpm --rebuild ./ssh-1_2_27-5us_src.rpm'. It's uses RSAREF. Bummer.
See my other post. [slashdot.org]
I think 1.2.27-7us fixed this bug.
Re:The Key Point is... (Score:2)
Re:Is this fixed already? (Score:1)
From BUGTRAQ in a message by Iván Arce (http://www.core-sdi.com):
As noted in the advisories (
http://www.core-sdi.com/advisories/buffer%20ove
and http://www.cert.org/advisories/CA-99-15-RSAREF2.h
there are TWO buffer overflows. The first is in the SSH distributed file rsaglue.c the second is in the rsa.c file that is part of the RSAREF2 distribution.
Re:Not very bad (Score:2)
For me, that means the machines at work were vulnerable, and the machines at home are not
Re: Read the link (Score:2)
If you don't like people who answer with links, that's fine. That has nothing to do with moderation in most cases, and in this case, nothing at all because you weren't the one with the moderator points.
Re:OpenSSH? (Score:2)
Thank you for unexpected civility (and on Slashdot, of all places! What the world is coming to?...). The assholes were rude and wrong.
A quote from the OpenBSD web page:
NOTE: OpenSSH does not have the ssh 1.2.27 rsa bug.
but also
SECURITY FIX: The USA version of the ssl library package, called sslUSA26, contained buffer overflows. A binary patch is available for people who installed before December 3.
and
The third ssh jumbo patch is now available. Numerous (non-security) additions/changes have been made to OpenSSH since the OpenBSD 2.6 release.
Kaa
Re:Not very bad (Score:2)
guarentee that 90% of the people reading this are safe.
I think you are wrong. A lot of people install ssh from the ssh rpms available on rpmfind [w3.org]. The us versions here are compiled with RSAREF. But I think the latest version fixes this. See my other post [slashdot.org].
Re:International users... (Score:1)
What is RSAREF? (Score:1)
1) What is RSAREF?
1a) Is RSAREF only required if you use the RSA encription algorithm?
1b) Can one use ssh (or OpenSSH) without RSA? Is this preferable?
2) Is it legal to use ssh without REFRSA in the US?
Thanks
Your problem is you are using packages (Score:1)
Not to sound elitist, but if you're not compiling from source, then you should contact your software vendor for information as to what the hell they've done. It is especially annoying if it is not documented (in something other than the source code) what they've patched, if they haven't changed the version number at all.
Re:The Key Point is... (Score:1)
Re:Slightly Old News? (Score:1)
Core SDI developed the exploit. CERT is just notoriously slow
Re:Not very bad (Score:2)
clf:~> ssh -V
ssh: SSH Version 2.0.13
I'm ok, right?
Re:How does one test the server (Score:1)
Re:Not very bad (Score:2)
clf:~> ssh1 -V
SSH Version 1.2.27 [i586-unknown-linux], protocol version 1.5.
Standard version. Does not use RSAREF.
is more useful.
sorry.
Re:The Key Point is... (Score:1)
Their code auditing is what discovered this in the first place.
Re:You already have a natural, moral, and legal ri (Score:1)
Re:what about openssh1.2 with ssl? (Score:1)
The problem is C (Score:1)
To exploit them, read The Tao of Buffer Overflow [cultdeadcow.com], a well-written tutorial on how to crack a system that has a buffer overflow.
It's a real problem. All the safer languages that were fast (Modula, Pascal, Ada) have died off. C++ was on the right track until the Standard Template Library came out with its unsafe iterators; now there are whole new classes of holes.
Sorry for the rant. I used to work on secure operating systems, and things aren't getting better; they're getting worse. What passes for "secure systems" today is pathetic.
Re:Interesting point. (Score:1)
Re:This is a fundamental issue with RSA in the USA (Score:2)
Our good friend, Theo de Radt, said as much. OpenSSH checks the args to the RSAREF package strictly, and so is not vulnerable. SSH1 w/ RSAREF is vulnerable (and there is aparently a working exploit). Any packages that use RSAREF might also have holes (OpenSSL, etc).
Here [openbsd.org] is a good graphic describing the encryption situation
---
1.2.27-7us is fixed (Score:2)
I shoulda been installing SSH via sources anyway.
-B
Re:Not very bad (Score:1)
Right, but anyone on Bugtraq has known about this for a long time, and has had plenty of time to upgrade to OpenSSH or SSH2. And if you're actually running Linux and not reading Bugtraq, IMO you're pretty much asking to get rooted.
And anyway, SSH is the kind of thing you _should_ build from source, no matter how nice RPMs are. I mean, hell, I love rpm, but do you know who built those RPMs on rpmfind? I could easily build a trojaned SSH (for instance, make it so the RNG subsystem always returns 0, so your keys are easy to guess) and submit it to rpmfind (faking the hostname, etc so it looks like it came from redhat or SSH). If it came from RedHat's ftp site (and the GPG signature validated), I would probably consider it, but getting SSH from someone you don't know is not particularly smart. Just get the source from the official site (somewhere in finland, check www.ssh.fi for links) and build it yourself.
For instance, I get PGP/GPG RPMS from ftp.gnupg.org and ftp.pgpi.org because they are trusted sources, so I'm ok with that. I also trust the SSH ftp site: if they had RPMs there I would get them, but they don't, so I build from source. But I won't trust some random person who submits to rpmfind.
Re:OpenSSH? (Score:2)
Subject: Re: Security Advisory: Buffer overflow in RSAREF2
From: Niels Provos
Date: 1999-12-04 22:45:20
In message , Gerardo Richarte writes:
I fear that this posting should have been even clearer. To sum the problem up more clearly:
ssh-1.2.27 (if compiled with RSAREF2) is vulnerable. Attackers can obtain a shell on the machine running sshd. The exploit uses buffer overflows in the RSAREF2 implementation AND in the rsaglue.c file in ssh-1.2.27. I am surprised that there wasnt a bigger outrage on the mailing list about this, it is quite serious!!!
On the other hand, OpenSSH is not vulnerable to this remote exploit. Since rsaglue.c was rewritten, OpenSSH does stricter parameter checking than ssh-1.2.27 and these recent problems in ssh-1.2.27 did NOT affect OpenSSH.
Nonetheless, OpenSSH users in the USA that use OpenSSL compiled with RSAREF2 should update their ssl library (since isakmpd or httpd may be affected), see previous postings on Bugtraq, and http://www.openbsd.org/errata.html#sslUSA [openbsd.org]
Another thing is worth mentioning, RSA could use the buffer overflow in RSAREF2 to scan machines in the USA for RSA license violation. For example, sshds that do not use RSAREF2 do will behave differently than those that do.
Information on OpenSSH can be found at http://www.openssh.com/ [openssh.com]
Information on OpenSSL can be found at http://www.openssl.org/ [openssl.org]
Re:Debian Version of SSH (Score:1)
sshd? (Score:1)
what about openssh1.2 with ssl? (Score:1)
SSH Version OpenSSH-1.2, protocol version 1.5. Compiled with SSL.
Is that all right? It doesn't mention RSAREF, so I wasn't sure. I suspect it's fine, given that it doesn't directly mention RSAREF, but I thought I'd check.
Thanks,
David Andre
Re:The Key Point is... (Score:2)
As for that "urban legend," you're smoking crack. OpenBSD is very up-front that everything in the base installation has undergone extensive testing; ssh, because it is not free software, is not in the base install. Idiot.
Re:Not very bad (Score:1)
--rp
Re:CASH to surf the web (Score:1)
gasp gasp... pant
muahahahahahahahahahahahahahahahah hee
tee hee... heeeeeee....
Re:The problem is C (Score:1)
If the stack was not executable, buffer overflows would be a denial of service attack, not an opportunity for an attacker to root your machine.
Most buffer overflow attacks take advantage of unchecked array limits to put malicious code on the stack and forge the return address of the non-bounds-checking subroutine to make it execute that code. That code then performs some system calls that drop the security of your machine to zero...
If the stack isn't executable, executing that "malicious code" generates a seg fault or memory trap... I'd rather have my sshd seg fault and die, as opposed to letting someone root my machine.
Re:The Key Point is... (Score:2)
Aside from that, you're right
Daniel
Additional info... (Score:1)
/Joakim Crafack
Re:Interesting point. (Score:1)
Not ssh, RSAREF (Score:1)
Personally, I'm glad Debian distributes its ssh without RSAREF.
Would the vulnerability exist if RSAREF was open sourced? I doubt it. There are plenty of other RSA implementations that don't have this problem.
,,, (Score:1)
OpenSSL
OpenSSL with RSAREF is not vulnerable.
OpenBSD / OpenSSH
and following the subsequent link to the OpenBSD page:
"A buffer overflow in the RSAREF code included in the USA version of the libssl package (called sslUSA, is possibly exploitable in httpd, ssh, or isakmpd, if SSL/RSA features are enabled or used. NOTE: International users using the ssl26 package are not affected."
--
Flames? Think I'm a karma whore?
Re:OpenSSH? (Score:2)
OpenSSH -is- affected, at least for older versions for the US. International versions are not affected, and I believe the latest OpenSSH for the US is also not affected.
SSH 2 availability (Score:1)
At least for now, ssh -V yields:
SSH Version 1.2.27 [i686-unknown-linux], protocol version 1.5.
Standard version. Does not use RSAREF.
I guess I'm OK, although I'd like to be out from under these silly Patent restrictions. :(
just compile without RSAREF (Score:2)
If you get hacked because of this bug, please write a nice "thank you" letter to the U.S. Patent Office.
RSAREF is also slow. I think RSA believes their patent enforced monopoly entitles them to write sloppy, slow, poor quality code. The international RSA libraries are much better all around. Not that I would encourage those of you in the US to violate the law by avoiding RSAREF...
But I would like to point out that the RSA patent is about to expire, and those of us in Canada and Europe don't touch RSAREF with a 10 foot pole.
How is this obnoxious comment informative? (Score:1)
Security Software (Score:1)
Not very bad (Score:3)
ssh -V
This should return the following:
Standard version. Does not use RSAREF.
Also, let's not forget that the Bugtraq people have known about this for months. If you don't read Bugtraq, you should.
Re:Your problem is you are using packages (Score:1)
Re:Your problem is you are using packages (Score:1)
Very simple. If you don't compile the source or patch the code yourself, you have no way of knowing what, if anything, your RPM/etc. is patched for, which specific CERT advisories, etc.
Sure you do. You check the changelog. If you don't trust the packager, get the source package and look it over. If you really don't trust the packager, get the tar.gz sources.
All I was asking was whether the message in the changelog I saw was about this bug or another, new one. I was confused because I got the fix weeks ago, and heard about it several other places weeks ago. Now all of a sudden it pops up on Slashdot.
So the problem isn't packages, it is the variable pace of news on the net. I.e., it apparently takes CERT quite a while (~2 weeks) to publish a notice, by which time the fix is already in place on quite a few systems.
And I don't think there is anything elite about installing raw source all the time. You try to manage a few dozen workstations and servers running quite a few packages not found in the standard distribution (RedHat in this case) without package management. Hardly possible, I assure you.
Package management is something I am thankful for everyday. Hell, I even make packages for software that is only released internally because it is just so much easier to install that way.
I don't use RSAREF (Score:1)
With much better RSA libraries out there, why use it, other than the legal threats from RSA.
Re:The Key Point is... (Score:1)
Re:naughty bits (Score:1)
In practice, only medical texts tend to do so. (Now you know why physicians take Greek and Latin.) The rest of us just add the normal English endings. It's not like these comes up very often in pillow talk.
You can see the -ides inflection in compounds:
As for irides (literally, rainbows), hm... I suppose some of these naughty bits might on occasion be iridescent.I'm glad slashdot has never done a feature article on how to talk dirty in Latin [obscure.org]. Otherwise we'd doubtless be innundated with requests for Natalia the Irrumatrix. :-)
And no, "Irrumatrix" isn't the bootleg, uncut, XXX-rated version of that silly Matrix movie with Keanu caught doing the naughty. Then again, with recent advances in digital technology, one never knows what they might come up with. :-)**2
Re:OpenSSH? (Score:1)
I as ked about this [sigmasoft.com] on the OpenBSD [openbsd.org] tech mailing list [openbsd.org], and Theo de Raadt [mailto] as sured me that it didn't [sigmasoft.com].
Re:The Key Point is... (Score:2)
Old News? (Score:2)
I remember reading an explanation of a buffer overflow in ssh that allowed a cracker to get in to the last server anyone would have suspected a successful breakin to...
Re:Most SSH2 installations in USA *are* affected (Score:1)
NiftyTelnet supports SSH on Mac?! I've been waiting for ssh support in a Mac client for quite some time, so I was initially quite excited to hear you say that...
However, I checked out the NiftyTelnet home page and they don't mention SSH support anywhere. I downloaded it and the application didn't have any SSH options either. Perhaps you are speaking of the Kerberos authentication support?
I'm looking for end to end encryption, so if I'm wrong about this, please let me know!
Why is this a problem? (Score:2)
No offense, but not all of us have time to wade through security issues at the end of every day, download source code patches and recompile our affected apps. (Though don't get me wrong, I do spend a very insignificant portion of my work day browsing Bugtraq e-mails.) Bug reports like this tend to be very well researched and include information such as affected packages and affected stock distributions.
Major package distributions have people on staff that do this for us, update packages, and ship out updates in very short order. In this case, the patch was made available very shortly after the bug was announced to Bugtraq, and new RPM's were made available shortly after that. If you don't trust your vendor to be on the ball with things like this, it's time you found another vendor.
For those administering high-profile systems, systems in a high-security environment, or packet kiddies that just KNOW they're going to be hit by their IRC "enemies" as soon as any exploit is released, definitely either stick with source releases and apply patches immediately, or pay attention to ways to work around problems until an official/binary patch is made available.
For The Rest Of Us, RPM's and packages are much less of a headache (mine are downloaded and installed automatically), and I can spend my free time USING the tools on my system instead of being "elitest" and re-building them all the time.
CERT/CC Comments on Slashdot discussions (Score:2)
Its interesting to see all the discussions on slashdot about this set of vulnerabilities and the CERT Advisory. I'll try to answer some of the questions raised here.
1) What was the delay?
We try very hard to be as "correct" as possible when writing an advisory, and to put the problem in the proper scope, which sometimes means we're slower than other sources, but also usually means that we are generally pretty accurate. The original ssh vulnerability was not directly exploitable, but the CORE SDI folks found the RSAREF vul, which can be exploited through the ssh vul. In working with them, we understood the problem, and began to contact vendors who might be affected. We then discovered that the original fix as provided by CORE SDI wasn't complete, and worked with them to develop a more complete fix. Also, there were a wide variety of legal issues to discuss with our legal counsel. It takes a while to get all the ducks in a row. By far, though, the biggest chunk of time was trying to understand the whole scope of the problem -- what products might be affected, etc.
In my experience, most compromises happen well after the fix has been known for a long time anyway, so I believe that a delay to make sure we've got the facts straight is usually better than being the first one to get it wrong.
Having said that, though, I believe it is crucial for sites concerned with security to monitor sources like BugTraq and Security Focus. We don't pretend to be a replacement for sources like that.
2) What about product X?
If we have information about a particular product, its in the advisory.
3)Is CERT trying "to act like international users are not affected?"
I don't think anything in the Advisory implies that international users are not affected. We do say "sites not restricted by patent law may choose to use a non-vulnerable implementation of RSA." But that's not the same thing.
If you have other questions not addressed in the Advisory, or suggestions, comments, or criticisms about the advisories in general, you can mail them to cert@cert.org> [mailto]. I'll do my best to personally respond, modulo the slashdot effect. :-)
Shawn Hernan,
Vulnerablity Handling Team Leader,
CERT/CC
READ THE FOLLOWUP!! There IS an exploit! (Score:2)
I thought it was safe reading the message you posted, however someone followed up with this:
---------------------------
Date: Mon, 13 Dec 1999 22:03:15 -0300
From: Iván Arce
To: BUGTRAQ@SECURITYFOCUS.COM
Subject: Re: ssh-1.2.27 exploit
snip
We have a working exploit against Linux and OpenBSD, we are waiting for CERT to publish their advisory. As soon as that happens, or before if its taking too long, we'll publish the exploit. Since the problem is not being actively exploited (as far as we know), there didnt seem to be a reason to post the exploit code with our advisory.
-ivan
---------------------------
Nothing shady about it.. (Score:2)
As the RSA algorithms are patented only in the US, it's illegal to use any other RSA implementation not specifically licensed from RSADSI. Outside of the US, the patent does not apply and you're free to use better, open RSA implementations.
Re:I don't use RSAREF (Score:2)
Once September rolls around, the patent will end and the US can finally move to better RSA implementations.
Re:The problem is C (Score:2)
I think I've also read someplace that i386 architecture does not distinguish between executable pages and text pages in memory. You can mark a page read-only, but you can't mark it unexecutable.
My memory may be mangling my recollection of these issues, so feel free to correct me if I'm wrong.
Re:How does one test the server (Score:2)
Beware Of Geeks Bearing Gifts, eh? (Score:3)
It's an ad for their upcoming RSA Security Expo, which should be absolutely fascinating to attend.
More so, now, as the down-in-the-trenches network administrators trust for them lies in quiet but definite shreds, based upon their reaction to the RSAREF2 Buffer Overflow. Buffer overflows happen. They suck, but it's a consequence of the coding systems we've just not found an acceptable replacement for. It was not their technical error but their absolutely shocking response after the hole was discovered last week:
Fix information
~~~~~~~~~~~~~~~
RSA Security was contacted and replied that they don't support RSAREF2 anymore.
For futher details you may contact John Linn
A patch is provided below, please read carefully the file license.txt from the RSAREF2 distribution before applying it.
But that's OK. It's good to know where you stand with people. The geeks of the Internet got a CERT-certified patch in. RSA made it illegal to use.
Nice. Tragic, sad, maybe even a bit pitiful. I liked RSA for a long time, and really, really expected better. Maybe someday they'll earn back my trust.
It won't be today.
Yours Truly,
Dan Kaminsky
DoxPara Research
http://www.doxpara.com
Re:The problem is C (Score:2)
Perhaps you're thinking of Franz Lisp.
Even if the 386 had no support for separate rwx bits on page tables, there are newer architectures available.
But that won't help you, really. I'll explain why in a separate posting.
Re:SSH 2 availability (Score:2)
You can get the SSH2 from various anonymous ftp sites around the globe for purposes of NON-COMMERCIAL USE and EDUCATIONAL USE as defined by the Licence Agreement.
http://www.ssh.org/licensing/ssh2_non-commercia
So it all depends on what position you are in. Works great for me(tm)