Copy Link
Add to Bookmark
Report

Default Newsletter Issue 07

eZine's profile picture
Published in 
Default Newsletter
 · 5 years ago

  

Default newsletter Issue #7
http://default.net-security.org
19.10.1999 Help Net Security
http://www.net-security.org



TABLE OF CONTENTS
-----------------

I. Editorial
II. Default mirrors
III. Defaced pages
IV. 5 reasons why your Mac is safer than wintel
V. Setting up a great desktop Linux
VI. How to make safe Windows 95 based server
VII. Apple Power Mac G4
VIII. Web based encrypted e-mail (critic and the response)
IX. More from the ACPO front
X. Welcome to the wonderful world of cellular phreaking
XI. Unix logging and auditing tools
XII. Freedom of the speech related incidents





I. Editorial
-----------------

Hey again. After another box of Marlboro lights (bless them:) texts are re-formated
and you are reading new issue of Default newsletter. Three weeks passed since the
issue no. 6, but we were busy on redoing HNS. If you don't know 26.10.1999 is
our first anniversary, and HNS will change a little (on the better ofcourse:)
We have four new mirrors and lot of new subscribers. If you don't know
HNS/Default webboard is open now. Do join the discussions or give comments and
ideas in the following URL:
http://net-security.org/webboard.html

Enjoy reading,

For the HNS and HNS Default Crew:

Berislav Kucan
aka BHZ, webmaster Help Net Security
bhz@net-security.org

Xander Teunissen
aka Thejian, co-webmaster Help Net Security
thejian@net-security.org


Subscribing information:
mail majordomo@net-security.org with a message in the body "subscribe news youremail"



II. Default mirrors
---------------------

http://www.nwo.net/default
http://www.403-security.org/default
http://www.monitor.hr/security/default
http://www.attrition.org/~modify/texts/zines/default
http://www.projectgamma.com/archives/zines/default
http://www.dark-e.com/default
http://ech0.zort.org/default
http://www.deepquest.pf/default
http://hns.crolink.net/default
http://tlsecurity.com/e-zines/
http://default.aviary-mag.com
http://packetstorm.securify.com/mag/default

If you mirror Default, please inform us, so we could add you to the list.



III. Defaced pages
-------------------

Mirrors thanks to Attrition (www.attrition.org)

Site: State of Arizona (www.state.az.us)
Mirror: http://default.net-security.org/7/www.state.az.us.htm

Site: China Material Technology Research Center (chimeb.edu.cn)
Mirror: http://default.net-security.org/7/chimeb.edu.cn.htm

Site: Viacom Brazil (www.viacom.com.br)
Mirror: http://default.net-security.org/7/www.viacom.com.br.htm

Site: Department of Electronics, India (www.doe.gov.in)
Mirror: http://default.net-security.org/7/www.doe.gov.in.htm

Site: NOAA Climate Monitoring & Diagnostics Laboratory (luey.cmdl.noaa.gov)
Mirror: http://default.net-security.org/7/luey.cmdl.noaa.gov.htm




IV. 5 reasons why your Mac is safer than wintel
----------------------------------------------------

I know that's an old story, an old flame opening.Well but it's a sad reality
that wintel can't admit, or is that mac users that are wrong?All following
descriptions consider that you don't have an anti virus or firewall, just
default configuration without any update patchs.

1-Virus
Mac user are also affected by virus.But there's something I always like to
do to compare the number of virus in the virus list description...Around
18,000 on windows, around 75 times less on Mac.Just a fact:-)Why that?
Main reason is that it's hard to code sophisticated virus.The best actuality
just can read your internet preference file and forward to an email account,
or corrupt files but can't affect hardware.On wintel the virus can deeply
affect your computer, in the worst case you can even thrash your motherboard
which was the case of virus like CIh.The kind of affections are also very
different (thank to the OS) they're 3 main types of virus on wintel:
*Affecting files: injecting code in a file or a exe (*.exe, *.com etc...)
they're resident in memory.
*Affecting boot sectors: no mater if the disk contains the operating system
or not you'll have to reinstall everinthing in most case.Usualy the first
sector (face ?, track ?,sector 1)
*The trojan: they allow a remote person to do anything on the computer.It's
not dangerousat all, it's only the use that the person will do with it.It's
different.
On mac you won't find any trojan with such controle on your system.The only one
that could look like a netbus or back orifice would be WDTech
(http://weedo.blackout.org/WDTech_RAE_ReadMe), it's still buggy in ver 1.2b1.
But the other problem for potential attacker is that you can't insert code in
a mac a existing software.Many software allow u to hyde code in a simple jpg file

2-Default settings.
well from registry, to network shares windows 9* (less with NT) has more
holes than a swiss cheese.I could say a lot but the just read bugtraq.

3-Burst the stack.
Denial of Service attack against a mac are highly difficult thanks to the
open transport structure (macOs tcp/ip interface).Who never had fun with
poor port 139 open?Of course you could patch but for common users it was
not so important.Even syn flood attack doesn't bored that much open transport.
I drove very badly my mac from other OS with DOS tos.From wintows network hack
toys, to linuxppc network toys.I never had to restart my computer.

"I sense much NT in you.
NT leads to Blue Screen.
Blue Screen leads to downtime.
Downtime leads to suffering.
NT is the path to the darkside."
- Unknown Unix Jedi*

4-Most reliable OS to run a webserver.
I know I could easily use of us army website who switch to webstar running on
MacOs, damm I did!Most hacked sites were running NT server according to
Attrition**.It's very safe, I didn't say unhackable but the safest.The only
reported site running Mac system (MacOSX)was the only one for along time,
whereas 82 servers where repported for the month of september.MacOs X with
apache server allow more hit (connexions) on a site than regular MacOS so for
forget the argument saying that MacOs based webserver can server less
connexions.It was more or less true...but in the past.Another interesting
fact is that if you plan to run a webserver on win95 (yes some are doing it!
look netcraft.com) don't forget that you have to restart it every 45 days it
can't stay on-line more.

5-Y2K issues?Think Y3K!
Y2k is very "a la mode" word for several reasons.First it's a good business
for many companies around the world.Then it can be the total chaos for wintel
box, even if simulations in great companies were done very often since past
months, even if they applied 10,000 patchs it remains just a simulation.Not
only wintel computers or software are potential source of issues, Unix also
even if their chaos day will later on 1 jan 2047.MacOs is y2k compliant since
1984 and compliant till year 29,940...

"We may not have got everything right, but at least we knew the century
was going to end."
-Douglas Adams

According to information week (http://www.techweb.com/se/directlink.cgi?IWK19980525S0037 )
the Y2k software fiw will cost $ 600 billions.Well at that price you can
get 500,417,014 iMacs at $1199 each, if you place this order I'm sure you'll
get a discount.

deepquest had an injection of MacOs when he was 9 years olds, 18 years later
he's a sys admin who'd pay to work on MacOs X.

--Deepquest
Patience is key to knowledge
deepquest@default.net-security.org

credits:
Unknown Unix Jedi*: riped from http://www.attrition.org/quotes/msoft.html
** hacked OS stats attrition : http://www.attrition.org/mirror/attrition/os.html




V. Setting up a great desktop Linux
-----------------------------------


The problem: as most Linux distributions do not have predefined graphic
interface, which looks nice by default, few common misinterpretations
appear:

1) Linux does not have a complete, good looking graphic interface (GUI)
2) Setting things up requires a lot of work


Well, how is the X system designed?
The base of the GUI is the X server, that is, an appropriate binary
file for your graphic card. Those binaries usually reside in /usr/X11R6/bin/
and are named XF86_xxxx, where ``xxxx'' is the specific server. Which
server to start is determined by a file ``X'' which is a symbolic
link to some of the real server binaries. SO, the symbolic link ``X''
is located in /etc/X11 (or in /var on SuSE machines). Let's say we
have a XF86_VGA16 server (the compatible one for all VGA cards) in
the /usr/X11R6/bin. To specify to run it, one has to issue

``cd /etc/X11; rm X; ln -s /usr/X11R6/bin/XF86_VGA16 X''

An X server cannot be started without the proper config file, /etc/XF86Config.
As this file usually needs changes before it becomes useful, ``XF86Setup''
binary is provided. Run that command and select the parameters you
want. Changes will be saved upon the exit, and you will have your
X server configured. If it doesn't work, you may manually modify XF86Config,
or create a symbolic link manually, as described above.

When the X server is started, a specific ``windowmanager'' is invoked.
Windowmanager is actually Xserver client. Few good ones are icewm
(gnome based), kwm (part of KDE), and WindowMaker. To say which windowmanager
to run:

on SuSE Linux: set WINDOWMANAGER environment variable to the filename
of the wm, i.e.

export WINDOWMANAGER=''/usr/X11R6/bin/icewm''

on Debian Linux, edit the .xsession file:

icewm

On RedHat, edit the .xinitrc file.
Recently, we have seen so many GUIs on Linux, and now its the problem
to choose one. When you count all the windowmanagers, their themes
and more, it looks like a big mess and you end up confused. This document
will try to give you an idea. As a perfect desktop I see icewm windowmanager,
supported by Gnome and KDE applications. KDE itself has its own kwm
windowmanager, but it just takes too much resources to load it, and
I am not quite satisfied with its design (kwm is Windows95-like, enhanced
environment). On the other hand, Gnome's Enlightenment windownamanager
just isn't a good choice for unified environment. icewm is very fast
and small, and has all the nice features like Themes (which completely
change your screen, not just colors), keyboard shortcuts (alt+tab),
system and network load meters in taskbar etc.. I would also prefer
Gnome over KDE apps. since Gnome is more unix-like, but KDE developers
have a huge number of GUI-ported or newly created applications, which
do promise.

Gnome is based on gtk (Gimp ToolKit), and KDE works on QTlibrary, set
of widgets from Troll. Since Xserver supports multiple widget types,
that is not a problem, old applications which do not have modern interface
still work with old Athena widgets:) Gnome has its own setup system,
control panel like, but the changes do not affect non-gnome based
applications. An advantage of kwm is that, after you set the colors,
design etc., it gives unified look and feel for all the applications
and windows.

XFree86 X Server isn't designed very well. Besides it has some limited
keyboard options compared to the console, it does not handle anything
except the graphics and X servers are rather messy. The things began
to change, new 3.3.5 server has support for more graphic cards, S3
Savage4 server is contributed by the S3 itself (S3 bought Diamond,
btw..). The XF86 server version 4 should be a great enhancement, it
will, beside the other things, support servers as modules, but, rather
ironic, if XF86 continues with the same speed as they did by now,
we'll wait for it for a long time:) Also, they are to implement the
Xprint server, which will finally solve all problems with Linux printing.

Summary?

Yes, icewm, Gnome and KDE apps. Where to get it? Most of it is included
in modern distributions like SuSE 6.1, 6.2, RedHat 6.0, Debian 2.1.
If you don't have them, or want more recent packages from the Internet,
you can find them on many distribution sites (suse.com, redhat.com,
debian.org, kde.org, gnome.org, xfree86.org).

Also, this subject is getting more and more audience, so I will open
the ``screenshots'' section on www.net-security.org/linux.

dev@net-security.org , www.net-security.org/linux




VI. How to make safe Windows 95 based server
-----------------------------------


It is sad true that today there is a chance 1:10 that your box will be attacked
successfully.Web admins try to protect their boxes on these ways:

1) Buying an expensive hardware firewall
2) Setting Windows NT firewall
3) Using Linux box as firewall
4) Using Mac so they confuse attackers

First choice is the worst one, because:

1) It gives you illusion that, because of its price, you are safe from all attacks.
2) Upgrades are hard to obitan and often hard to install
3) Next three choices are better :)

Second choice has its own flaws:

1) As in 1) for hardware firewall
2) Microsoft is lazy
3) There are cheaper things than Windows NT

Third choice is the best but:

1) It is to complicated to manage it if you are not properly educated and even
then your box can be compromised (Symatec etc).

Fourth choice is the second after the third one but:

1) There are only few Mac that serve as servers so public doesnt know about
its flaws yet.When ratio of Macs installed as server will be grater more
exploits will be known.

In my opinion third choice is the best one but as I said it is to complicated to
be managed by newbie user and it wont do you any good.If you dont know
what hit you and how to stop it, whats the use?So, the best thing you can
do is to use OS and software that you are familiar with and that is
Windows 95 (OSR2, 98...its all the same).

Why?

You should do that way, because:

1) It is cheaper than Windows NT, Mac or hardware firewall
2) It is not so complicated as Linux
3) There are lots of shareware that can do what you want them to do

You shouldnt do that way if you want that your box is:

1) Online store
2) Mission critical server
3) receiving lots of visits pro day
4) You do something important and your reputation is also very important to
you.

Soooo, lets go!

Things you will need:

Windows CD.I prefer Windows 95 OSR 2 and not Windows 98.
2-4 boxes.One based on at least PI 233 and other to can be based even
on 486/120.Ram is critical here.For server 64 and for other 16-32.

Now for the schemes:

a) Fairly great security

Firewall
I
Firewall
I
Watcher----------------------Web server



b) Great security

Firewall
I
Watcher----------------------Web server


c) Fair security

Web server
Watcher---------------------- &
Firewall

Instruction will be made for Fairly great security scheme with apendix for
other two.

Preparation:

First you need to install Windows on all boxes.In order to cut expenses you
have two choices:

1) Buy used Windows CD.It is not important if they are 95, 95 OSR 2 or 98
so you can try at 95.Those CD should be seld for bargain, because people
are just crazy about 98 and the dont notice that those two things are
practically the same.

2) Download security and other software from Internet.If you have CD reco-
rder put it on CD-R so you dont need to look after them every time you
need something.If your software is more than 1 month old check web
site for new versions.You will need:

a) Rebol.This fantastic scripting language provides you with easy-to-learn
easy-to-use interpreter that has inbuilt net tools.Download it from
www.rebol.com.
Caution! There are a very big possibility that this scripting interpreter
doesnt work on Windows 95 OSR 2, version German.
b) Two firewalls.First I recommend Conseal Firewall (Net Security
approved :).Second one obtain from www.hotfiles.com or
www.tucows.com.Why two different firewalls?You will remove
possibility that script kiddies will reach you Web server, because
they will usually give up the work when they see two firewall servers.
You will also reduce opened flaws in firewalls (flaws that are not yet
known).
c) If you cannot run rebol on you computer buy something like Delphi or
download dev c++.I discourage you from using VB, because it is
unstable and bloatware.
d) Web server.Go to www.hotfiles.com type in web server and find some-
thing free.It would be great if you could make program that will check if
web server is running and if not, it would start another one.
e) Antivirus and CRC checker.Antivirus that will not prevent you from
using it in the network and CRC checker like NS Watch that will
check boxes for their applications integrity and find new things
in windows.ini, system.ini, and registry run keys.
f) OS upgrades.The most needed OS upgrade is that one for Dial-Up
networking that has Winsock protected from OOB attack.It would
be a very stupid thing that your firewall fails in its mission, because
of OOB attack.

3) Basic netkit.Netkit from Gericom (German computer manofacturer)
consist from 5 port hub, 2xRJ45 3m cables and 2x10 MBit cards
costs about 80 DEM (= 45 U$D).If you are going to use 4 boxes you
will need one more kit but without hub.

4) Boxes:

a) Best:

Firewalls: PII 266, 64 MB, 8 GB HDD
Server: PII 350, 128 MB, 18 GB HDD
Watcher: PII 233, 64 MB, 8 GB HDD

b) Optimum:

Firewalls: PI 166, 32 MB, 2 GB HDD
Server: PII 233, 64 MB, 3 GB HDD
Watcher: PI 100, 32 MB, 1 GB HDD

c) Cheap:

Firewalls: PI 133, 32 MB, 1,6 GB HDD
Server: PI 233, 32 MB, 2 GB HDD
Watcher: 486/120, 16 MB, 850 MB HDD

It is very wise to use optimum configuration.Equipment can be damaged in
attacks (viruses especially) so you will reduce possible damage.

Setting up:

First install Windows on every box.Then configure hardware and net
properties.Be sure to SET PASSWORD on every place you can and that
those password are DIFFERENT and wordlist proof.After that install
firewall and web software.On every firewall set the same rules so that
it can hold attacks for a time.It is unwise to set, for example, on one firewall
to block just OOB and on other ACK flood, so when first is firewall is down,
because ACK the second will be because of OOB.Do not install on this boxes
anything unnecessary either software or hardware.The last thing you need to
set is Watch box.It is the brain of everything.Install antivirus so it checkes
other boxes harddrives on low priority (we do not want to stop the whole
process, because of the virus scan), then use something like ours
NS Watch to scan for possible changes in exes CRCs, system.ini,
win.ini and registry run keys.I will make a option in NS Watch that will
enable to save logs.You could also set a small BBS so you could check
logs from outside while you are not at the place.

How safe is it?

System with two firewalls will help you to evade attacks from script kiddies.
They are looking for easy entrance and if there are non (two firewalls) then
they will go away.Watch box will protect you from trojans etc.It is high priority
that you DONT OPEN ANY emails on these boxes.Rather set email server
on server box and then download it to distant box.Antivirus will try to find
and viruses but if you dont execute games and all unnecessary software
on System boxes you will not experience any problems.

Costs (estimated in Croatia):

2xPI 166, 32 MB, 2 GB HDD = 600 DEM
PII 233, 64 MB, 3 GB HDD = 500 DEM
PI 100, 32 MB, 1 GB HDD = 200 DEM
4xWindows 95 = 200 DEM
2xNetkit = 160 DEM
Web & Email server = free
Rebol interpreter = free
Delphi (for utiliy developing) = 200 DEM
Antivirus (good, net scanning enabled) = 200 DEM
_______________________________________

2060 DEM

For that money you can hardly get any good hardware firewall.

Appendix:

If you are to reduce hardware parts (less firewalls or none) that you are
reducing System security.Easy calucations.
Do not take this prices for good.I am sure that you can reduce fundings
but think yout it: for 2060 DEM you can buy just one new computer.
Of course aboves prices for boxes are without monitor.You just need one
from you present box.
You can also set another services like news, or telnet but with them you
are making your box more vulnerable.

Conclusion:

As much as I tried to present you cheap Windows based configuration always
have in your mind somewhere that there is no such a Windows based
configuration as Linux based.However Windows boxes outnumber Linux
ones in maintance hours, logs trace hours etc.This configuration can serve
you for a long time and after you start to create a large amount of net traffic,
change it for Linux based, especially if you will try to set online store or
something like that.

For any comments contact me via goltha@net-security.org

Tomislav "Goltha" Petrovic
Net Security programer
goltha@net-security.org



VII. Apple dissapoints with it's delay - Mac G4
----------------------------------------------------


The top-of-the-line, 500-MHz version of Apple's Power Mac G4 -- originally
scheduled to ship in October -- may be delayed past Apple's current November
ETA because of outstanding performance issues, sources said.

Motorola's Semiconductor Product Sector in Austin, Texas, is reportedly working
to resolve "errata" that affect its new G4 processor when run at speeds of 500 MHz
or higher. And according to Motorola's own schedule, a fix isn't due until December.
Motorola released Revision 2.2 of its G4 processor this summer, followed closely
by Revision 2.6, which is shipping in the initial, 400-MHz version of the Power
Mac G4. Sources said -- and Motorola's Technical Support Hotline confirmed --
that both revisions 2.2 and 2.6 contain errata that can be avoided only by keeping
the processor speed below 500 MHz. Motorola tech support said that Revision 2.8
will fix this issue when it arrives in December.

Sources said that the problem -- which only arises when the G4 is run at speeds
of 500 MHz or higher -- can result in some corruption in the processor's data
cache. Motorola's recommended workaround is to enable the "GlobalWaitR" register
in the processor, which, while preventing
the problem, slows timing throughout the chip.

Motorola's Technical Support Hotline confirmed both the existence of the errata
and the workaround, which it acknowledged entails a "speed hit."

Although the G4 processors in shipping Power Mac G4s contain the errata, their
sub-500-MHz speeds keep them from encountering the corruption problem, sources
said.

Indeed, another source said, this issue might never evince itself in Macs, since
the OS doesn't manipulate data rapidly enough to cause the problem -- the glitch
would more likely effect more-efficient embedded operating systems. Even if data
corruption should occur, a source said, the result would be nothing more than a
system freeze, easily fixed with a restart.

"That kind of errata isn't unusual for new ships from any manufacturer," said
Keith Diefendorff, editor in chief of the Microprocessor Report in Sunnyvale,
Calif. He said that Motorola's warnings don't necessarily portend serious problems:
"Motorola, as a company, is relatively conservative, and they like to have everything
perfect."

Sources said Apple is telling a somewhat different story to its resellers and
customers. In a report to dealers last week, Apple reportedly noted "intermittent
shortages" of the 400- and 450-MHz Power Mac G4 systems and listed an "expected"
October ship date for the 500-MHz configuration. Sales staff at the Apple Store,
by contrast, said the top-speed model will be available by the end of November.

atlienz
atlienz@default.net-security.org




VIII. Web based encrypted e-mail (critic and the response)
-----------------------------------------------------------


If you are subscribed to ISN mailing list, you received this e-mail giving
out "paraonic" comments (who isn't at least a bit paranoid this days:)
We mailed Hushmail and gor their opinion on this post. So again we from
HNS didn't write this post or it wasn't written by us. We were just interested
in Hushmail comments to that post. You could read the original post and reply
to the post below.

Post:
-----------

Hi

If you value your freedom, only use hushmail for fun; don't say anything
you wouldn't say to a cop.

hushmail.com is claiming to provide strong encryption on email via a
web-based interface. You can only send encrypted mail to other hushmail
account holders, so people will obviously encourage their mates to join.
A very clever net--woven by the fish themselves?

Show me your friends...

Anyway I checked who is hosting the service . It was registered by
radiant.net who, on their home page, claim that hushmail is just a client
of theirs. Maybe, but then who owns the company? Safemail enjoys a big
link on the homepage, while lesser bodies such as Maxim Chemicals are
relegated to a list on another page. The other clients of radiant.net are
very interesting. It is a 'British' Columbia internet provider exclusively
for the 'corporate community'. Bear in mind the recent history of BC re
environmentalists particularly.

>From their 'about us' page:

"The corporate client needs a higher level of service and attention to
detail that is just not available from providers dealing with tens of
thousands of residential users. This dedication to the corporate community
is exactly the emphasis at Radiant and why Vancouver's businesses are
migrating to Radiant Communications."

Good buddies include:

B.C. Construction Association
New Westminster Police
Curlew Lake Resources Inc
D'N'A Military Import & Supply Inc
Georgia Pacific Securities Corporation
Hyatt Industries
Kerrisdale Lumber
Maxim Chemicals
Mineral Development Group
Pacific Metals Ltd.
Rubicon Minerals Corporation
Vancouver Condominium Services

and yes, the western canada wilderness comittee is in there too, but to me
that is no less corporate.

Well, call me paranoid if you like but it seems to me that it would be
very easy for a bunch of good buddy loggers and miners to get together
with the NW police and their extremely wealthy local internet experts (not
to mention the local redneck militia supplier) to provide this nice easy
crypto-mail service and erm... help out all the activists they love so
much.

Peer Review

A prerequisite for any encryption algorythm to be taken seriously is that
the source code be available for scrutiny by other cryptographic experts.
This is the only way ordinary folks can assure themselves that the thing
they use is actually secure. If many experts over a period of years have
been unable to mount aq sucessful attack on the encryption, then there is
a good chance that it is ok. There is too much to go into here, but
although hushmail's stuff is publicly available, I haven't found much peer
review (lots of advertising of course).

A good summary of some of the cons is at:

<http://www.counterpane.com/crypto-gram-9908.html#Web-BasedEncryptedE-Mail>
http://www.counterpane.com/crypto-gram-9908.html#Web-BasedEncryptedE-Mail

People I have corresponded with who are in the business of strong
encryption have confirmed my hunches. Anyone who knows anything about
security wouldn't touch this with someone else's computer, methinks. But
that's not who they are after, obviously. People need to be warned and we
need to find out more. It could well be bona fide, or at least
well-intentioned, but there is not enough information provided to know
that. As this can possibly be a matter of being imprisoned for some
people, I think warnings should be prepared and circulated, unless someone
with more knowledge than me can show it is as secure as pgp.

Any help appreciated. If you think this will do as a warning then feel
free to forward it to people you care about.

Andy

PS: Nearly forgot;
<http://www.radiant.net/>http://www.radiant.net/


Reply:
-----------

I'm really not sure what to think here... we've got the most secure web-
based email in the world, we offer it for free, we give our source code away
for free to everyone, we ask for all the crypto community to look at it, tear
it apart, find holes, or give their blessing, whatever....
and then we get a mail message like this, from a "privacy/security group",
saying "using HushMail is like talking to a cop".....

Perhaps you are fogetting that there are 100 million people out there using
*absolutely* no security on their web-based email. Many of them actually
care about their privacy, but the convenience of web-based email over-rides
their concerns. And, most of them haven't heard of HushMail. And if net-newbies
read unverified and untrue text about how "HushMail is probably
totally insecure", they'll go right on using their Yahoo!Mail accounts,
while Eshelon just keeps sucking their email up, databasing
it, for later search and retrieval. Somehow your article doesn't strike
me as "forward thinking privacy material"...

You might want to read our commentary on Bruce Schneier's crypto-gram (and
also his latest crypto-gram, in which he implies he doesn't have a problem
with our technology, but does dislike the mis-quoting going on in the press)
- it's linked off the "What's New" secion of our site:
http://www.hushmail.com/bruce_comments.htm

FYI, Radiant Communications is our bandwidth provider. They are also a
great bunch of people. Hush Communications Corporation is based in Anguilla,
also where the yearly Financial Cryptography conferences are held (which we
are sponsoring next year). If it makes you "feel" any better,
Vince Cate (a friend of mine who lives down the street here) is on our Advisory
Board... maybe you've heard of him, search on his name at wired.com if not,
since you seem to not trust "us". HushCom also has a large marketing subsidiary
in Austin, Texas, where I (and most of the other co-founders of Hush) are originally
from.

Sir, you can write whatever you feel like, but I might point out that a
lot of people who know a hell of a lot about security, privacy, and really care
about it, might think that slamming HushMail based on heresay and "Their Bandwidth
Provider also has <gasp> Police Web-Pages" a little less than good reporting...
If you're going to say something negative, try saying *exactly how* HushMail
isn't secure. If so, you might be surprised to find that we're happy to
hear about any potential security problems - and we fix them, and keep our *entire*
source code archive online, so all the truly interested can see the history and
development of HushMail.

Cliff Baltzley
Chairman, Hush Communications Corporation



IX. More from the ACPO front
------------------------------


Hi Ya'll,

Time for another update. I thought I would just send you this press
release for:
http://thetrainingco.com. We're looking forward to our presence there,
and we are sharing a booth with the people holding the Convention. If
you have any questions, feel free to mail me at natasha@infovlad.net

**********************************
CHILDREN: INNOCENCE EXPLOITED

Pedophiles, Child Phonographers and others who abuse, exploit and
victimizes children for their own selfish gain have turned
a once small criminal problem of a decade ago into monster of almost
immeasurable size. In 1994 a US study reported that
more then 450,000 pornographic images and files where available on the
Internet. Today that has grown to tens of millions!

Natasha Grigori, Founder of an Internet based group called the
Anti-Child-Porn Organization, states that "... with an estimated
500 million Internet users by the year 2000, technology has out striped
the global community ability defend against the
explosion of child pornography." Further Natasha claims "Pedophiles and
child pornographers are using the Internet to
facilitate their type of criminal actively; tracking and seducing
children, networking with other pedophiles, and as a medium
to exchange and sell for profit not only their product of banned child
pornography, but the children themselves."

The goals of The Anti-Child-Porn Organization is to educate the public
and politicians to this epidemic and the danger these criminals pose
to the collective social interest. To address the supply and demand
issues related to these illicit materials and to facilitate
co-operative
efforts between police agencies and other public interest groups,
world wide. Through the ACPO's web site, individuals can report
child-porn sites and news groups. These reports are then verified and
if confirmed, ACPO will use specialized software to trace the site and
report the findings to the appropriate law enforcement agency.

For further information please visit www.antichildporn.org

Thanks All

Natasha Grigori Founder ACPO

============================
Thanks for being 'Child-Friendly'
Natasha Grigori Founder
ACPO http://www.antichildporn.org/
mailto:natasha@infovlad.net
============================




X. Telecom 101 - Welcome to the wonderful world of cellular phreaking
----------------------------------------------------------------------

Hello and welcome once again. Well I guess this is the part where I explain
where this column has been the last couple of issues. Fact is I'm kind of busy
with a lot of other things and HNS main at the moment, but I've practically
finished a whole series of columns for the upcoming issues, so not to worry.

We'll be digging into the world of cellular phones a bit in upcoming
issues. This has several reasons. From the practical point of view (for me that
is) I can't discuss any other sort of telephony network specifically, because
of the amount of different systems used in the world today. Besides that, I want
to deal with some issues here which you guys and gals out there can actually try
out and use. Being international and all, we feel the need to cover international
standards first and when any of you feel the need to go further into a topic, just
let me know. Your wish is my command. For today, we'll start off with creating a
bit of understanding on the history and workings of GSM (you've got to learn how
something works before you can break it down :).

General oversight on GSM

Today probably the widest used standard in mobile telephony is GSM, which
was originally devised between 1982 and 1992 by the Conference of European
Posts and Telegraphs (CEPT) to create a more international standard in cellular
communications then all the systems which differed almost on a country basis.
he technology was also aimed at having a greater capacity, security and flexibility.
The name GSM was derived from the French name Group Special Mobile. Later, probably
to add a bit of the international touch, this was changed to Global System for Mobile
communication. It's probably the most widely used of the major teleservice technologies
used around the world. I came across claims of 120 million users worldwide in 120
countries, and it's hard to believe but with the speed at which these numbers are
growing (how many of your friends don't have one yet?) I'd say even these huge
numbers are getting outdated soon too. Because of this, the original goal of
setting Pan-European standard in telephony has been overachieved and
because of international roaming agreements between telecom operators, users can
nowadays often continue to use their mobile phones when in other countries . As
with almost all telecommunication services, GSM can be divided in bearer services,
teleservices, and supplementary services. The service for which it is known most
is of course the basic voice transmission teleservice we call
"making a (mobile) telephone call". :) Other services for example include
(with an additional fax adaptor) facsimile and SMS to name but a few, nowadays
you can even get your e-mail on your GSM!

The workings of GSM

A GSM MS (mobile station, here the mobile phone) uses a radio link which is
controlled (also by radiolink) by the BSS (Base Station Subsystem). The calls
between mobile phones or mobile phones and regular phones are switched through
the MSC (Mobile services Switching Center). This network is then overseen by the
OMC (Operations and Maintenance Center). Security in this network uses four
principles, subscriber identity authentication, subscriber identity confidentiality,
signaling data confidentiality, and user data confidentiality which are implemented
in the SIM (subscriver identity module), the MS and the network itself.

The GSM technology digitizes and compresses data and (sending and receiving
with rates up to 9600 bps) utilizes either the 900 or 1800 MHz frequency
band (890-960 bands are standard for telephony) splitting each band in 200 Khz
channels which then, using a method known as Time Division Multiple Access (TDMA)
are split into 8 time slots. Speech signals are divided in 20 ms samples which
after encoding gives a total bit rate of 13 kbps. A received signal is made from
the linear combination of previously received samples and the difference between
the predicted and the actual sample, so basically the current sample is predicted
rom the information of a previous sample. The data is besides speed and
electromagnetic interference issues also encoded for
security/privacy's sake.

In the next issue, I will discuss the actual coding and relevant encryption
algorithms as well as the implementation of the different security methods
(as mentioned above) in this system.

So stay tuned :)

Xander Teunissen,
aka Thejian, Help Net Security


XI. Unix logging and auditing tools
------------------------------------


Introduction:
-------------*

in this text i will talk about logging and auditing tools used in the Unix operating system
enviroment. whenever a user enters a system (be it through a network service or physically
at a terminal) he/she leaves trace of entering. this information is stored into different
types of log files, depending on what action the user takes. these logging and auditing
programs are very valuable to every system and network administrator and are therefore
included in every Unix-like system by default. other than these, there are also some other
commercial loggers which help better system logging.
logging improves site security very much. a lot of hackers do not know what types of loggers
exist and how to modify them, so logging always makes things easier for the system admins.
therefore, every administrator should enable all sorts of logging, even if it somehow
affects the privacy of system users.
however, logging programs are not the only part of a secure network. they too have some
limitations. a good example is when an intruder spoofs his/her IP address. then you have a
fake address which is of no use to you. therefore, loggers make tighter security but are not
the only security measure.

Unix default logs architecture:
-------------------------------*

as i said earlier, Unix provides a wide selection of auditing and logging tools. most of
them are intergrated in the system by default, but there are also some which come with
certain programs. basically, Unix stores log information in plain ASCII or in some other
formats, usually numerical. to access a log file one must first have root permissions
(although on old Unix versions everyone can look at and modify log files).
different versions of Unix store these files under different locations. /usr/adm was used
in early versions of Unix. then came /var/adm which was newer so that the /usr directory
could be mounted read-only. today, the most common locations are the /var/adm and /var/log
directories.
within these directories you can find log files.

Log file name: Purpose of the log file:
--------------*-----------------------------------------------------------------*
ACCT (PACCT) records commands which users run.
ACULOG records dial-out attempts.
LASTLOG records last successful and unsuccessful login.
LOGINLOG records bad login attempts.
SULOG records attempts of using the 'su' (superuser) command.
UTMP records who is currently logged into the system.
WTMP records who was in the system and system shutdowns and startups.
XFERLOG records use of FTP service.

other than these, which are essential for every system admin and potential intruder, there
are: MESSAGES (records system messages and outputs from the console), UTMPX (extended UTMP),
WTMPX (extended WTMP) and VOLD.LOG (logs errors from external media devices (CD-ROM drives,
floppies, external hard drives, etc.)).
i will now go detailed into each one of these logs.

LASTLOG -- this utility shows you who logged last time into your account. when you connect
to a host and type in the correct username and password combination the login program runs
lastlog:

--
login: hacker
password:
Last login: Tue Jul 20 15:54:25 from some.address
--

also, under some System V Unix versions you have both successful and unsuccessful logins:

--
login: hacker
password:
Last successful login for hacker: Tue Jul 20 15:54:25 from some.address
Last unsuccessful login for hacker: Tue Jul 20 13:44:03 from some.address
--

after this display, the login program updatess the lastlog file with new information. then
it also updates utmp and wtmp files.
by using the 'finger' command, you can see when a particular user logged in last time.
when you use the command, the program merely displays the users lastlog file (which is
located in /var/adm/lastlog or /var/log/lastlog for each user).
a big flaw in the lastlog file is that it is always overwritten on each new entry. this
means that if a hacker, once in the system, connects again with the use of 'rlogin' (remote
login utility) or, on old systems, 'login', the information stored will be overwritten with
new information -- in this case localhost (127.0.0.1). this is useless to the system
administrator. therefore, i recommend that you make a shell script which will make a backup
of an existing lastlog file for each user every couple of hours (cron-spawned task).
this can be done with a simple 'mv' and 'cp' commands combination. first you move the
existing backup to a new one and then copy the new lastlog into the old backup.
by default, there are no Unix programs which enable you to read the lastlog file. therefore,
i have included a simple Perl script which will work on SunOS and allows you to read the
lastlog file. you might want to change the second line into /var/log/lastlog if it doesn't
work. also, if you make a couple of adjustments you can make it work on any Unix-like
system. for details on this, take a look at the lastlog header file (LASTLOG.H) which is
usually located in the /usr/include directory. basically, the program checks for a command-
line argument. if none is given it uses /var/adm/lastlog. after that, it calculates the
number of seconds in half a year. this is done to determine output format (because logins
which are more than six months old are printed differently) for the lastlog file. after
this, the program reads every line, decodes it, and prints it on the screen.
also worth of mentioning is that some really old Unix systems log the lastlog information
into a file called .lastlog which can be found in each user home directory ('ls -al' will
check for this).
while lastlog can be useful, it does not provide a very detailed history of each login.
for this you must check the wtmp file.

UTMP -- this file is located in /var/run/utmp or in /etc/utmp. basically, it lists currently
logged users. programs such as 'who','w','whodo','users','write' and 'finger' use the utmp
log constantly to check for specific users on the system.
on some systems the utmp file permissions are set to be writable by any user. some programs,
which create virtual terminals, need this to show that the user is logged in on that virtual
terminal without requiring superuser privileges. this can help a hacker to modify the file
or even delete his/her entries.
in Berkeley-type Unix systems the entries in the utmp (and wtmp) contain: name of the
terminal device used for login, username, hostname (if not from a terminal) and the time
of login. under System V Unix you have: username, terminal line number, device name, process
ID of the login shell, code for type of entry, exit status and time of login. under Solaris,
IRIX and some other which use extended utmp and wtmp, you have: username up to 32 characters
long, inittab ID (type of connection), terminal name up to 32 characters long, device name,
code for type of entry, exit status, process ID of the login shell, time of login, session
ID, unused bytes for future expansions and remote hostname (if not from a terminal).
i should also mention that some versions of 'su', if not used correctly, will not report to
utmp and wtmp that you changed your enviroment. for example, if you become a superuser the
program will not update the log files and you will appear to have normal user privileges
(when someone uses 'finger' or similar service). this can be very confusing, not only to the
users but also to programs that are currently running. to correct this, use a dash with the
superuser command: 'su - root'. this will change your enviroment.

WTMP -- this log file is usually found in /var/adm/wtmp. every time a user logs in or out,
Unix makes a record of that action in the file wtmp. therefore, wtmp keeps a big database
of all user logins and logouts. this file will grow constantly and so many admins make
scripts which zero (blank) the file now and then (cat /dev/null > /var/adm/wtmp). this,
however, isn't recommended. rather than that, an administrator should make copies of the
old wtmp before it is zeroed out. these backups should be placed on another storage computer
or on external disks.
wtmp cannot be read, so you need a special program for this. 'last' is great for this. if
you run it with no command-line arguments it will show you all logins and logouts on all
services and devices for your network (you can abort the display with the interrupt
character (usually CTRL-C)).

--
$ last

john ttyp2 some.address Tue Jul 20 15:42 - 15:50 (00:08)
hacker ftp 195.229.205.8 Mon Jul 19 03:15 - 04:45 (01:30)
root console Mon Jul 19 08:00 still logged in
...
--

first you have the username, then the service/port used. after that there is a remote
address (or not, if the login came from the terminal/console). there is also a date and
how long that particular user was using the service.
to be more specified, you can use a username for the parameter. this will show you login and
logout records for a particular user:

--
$ last hacker

hacker ftp 195.229.205.8 Mon Jul 19 03:15 - 04:45 (01:30)
hacker telnet 195.229.205.8 Mon Jul 19 02:03 - 02:04 (00:01)
hacker ttyp4 fake.host Sat Jul 17 14:10 - 15:24 (01:14)
--

you can also use a number which specifies how many last logins you want to see. for example:

--
$ last -1

john ttyp2 some.address Tue Jul 20 15:42 - 15:50 (00:08)
--

some versions of the 'last' program enable you to look at entries from other files (such
as your backup files). you simply put '-f otherFile' as the argument. but, if your program
doesn't allow this then simply change the name of the backup to wtmp and you will be able
to read it. remember though that is you're reading your backup, each new user entry will be
stored into that backup.
you could also use 'ac'. it provides you with statistics for each user. this is useful for
checking the amount of time a user is logged in, etc.
on some systems, wtmp also logs system shutdowns/reboots and startups.
also, under some SVR4 systems you can look at the contents of the wtmp file by doing a
'who -a' command.

LOGINLOG -- failed login attempts (if you are not using System V Unix) are recorded in a
special file called /var/adm/loginlog. to log these attempts you must specifically create
this file by the following procedure:

--
# touch /var/adm/loginlog
# chmod 600 /var/adm/loginlog
# chown root /var/adm/loginlog
--

a bad attempt is when a user types in a wrong password fives times in a row. after the fifth
time the system will usually disconnect you. this is how a loginlog looks like:

--
hacker:/dev/pts/8:Tue Jul 20 16:30:01 1999
hacker:/dev/pts/8:Tue Jul 20 16:30:22 1999
hacker:/dev/pts/8:Tue Jul 20 16:30:35 1999
hacker:/dev/pts/8:Tue Jul 20 16:30:49 1999
hacker:/dev/pts/8:Tue Jul 20 16:30:58 1999
--

loginlog is useful when you want to check if someone is attempting a brute force over your
password.

ACCT (PACCT) -- process accounting is when every command typed by every user on the system
is being recorded. this is mostly used when you want to bill your users for using a specific
service and CPU time. /var/adm/acct contains the log information. this is not human readable
so you need to use a specific program called 'lastcomm' and 'acctcom':

--
$ lastcomm

sendmail S root __ 0.05 secs Tue Jul 20 19:50
vi F hacker __ 0.22 secs Tue Jul 20 13:24
--

first we have the program name, then the user which ran that program and finally the loading
time and the date/time of use. the flags (above S and F) are: S (command was executed by the
superuser), F (command ran after a fork, but without an exec), D (command generated a core
dump file when it exited) and X (command was terminated by signal).
although acct is useful, both for the system administrator and for the hacker, it has some
limitations. for example, it does not say from what arguments were given to the program and
where the particular program is located. therefore, if a hacker renames his program
(like a trojan, C compiler, etc.) there is no way you could know what the real program was.
under System V (SVR4) you start the accouting with the command 'startup' which is located in
the /usr/lib/acct directory. the accounting is logged into /var/adm/pacct and you view it
with the 'acctcomm' program.
under BSD you activate process accounting with 'accton filename' (it is found in /usr/etc or
/usr/lib/acct) where 'filename' is usually /var/adm/acct or /var/adm/pacct. you read the
file with 'lastcomm'.

MESSAGES -- this is a very useful log file (located in /usr/adm or /var/adm). it basically
logs every output message which is printed on the system console screen. it works by echoing
what's on the screen and printing it to a special file along with the date/time and computer
involved. here is an example (SunOS 4.1):

--
Tue Jul 20 13:20:34 computer1 su: 'su root' not succeeded for hacker on /dev/ttyp3
Tue Jul 20 13:20:34 computer1 su: 'su root' not succeeded for hacker on /dev/ttyp3
--

we see that a hacker is trying to compromise superuser privileges but doesn't know the
password (remember that we also have the sulog for this particular example).

SYSLOG -- this facility was created at the University of Californica at Berkeley for their
program sendmail. since then it has been ported to almost all Unix-like operating systems.
syslog is a host-configurable, unique system logging utility. it uses a special system
logging process which is located in /etc/syslogd or /etc/syslog. programs that need to have
information logged send that information to syslog. these messages can be logged to various
files, devices, remote computers, etc.
when a program wants to send a message to syslog, it must generate a syslog log message.
this message consists of four things: program name, facility, priority and the log message.
facilities are: kern (kernel), user (regular user processes), mail (mail system), lpr (line
printer system), auth (authorization system -- login, su, getty, ftpd, etc.), daemon (other
system daemons), news (news subsystem), uucp (Unix-to-Unix Client Protocol subsystem),
local0 - local7 (reserved for site-specific use) and mark (facility that sends out a message
every 20 minutes). there are also some others but the differ on the version you have. they
are: authpriv (other authorization messages), cron (cron daemon), ftp (ftp daemon messages)
and syslog (syslog daemon messages).
priorities are: emerg (emergency condition (system crash or similar), sent to all users),
alert (alert for immidiate correction of a system program/database), crit (critical alarm,
usually a hardware error), err (normal error), warning (warning message), notice (condition
that is not an error but should be handled in a special way), info (informational message),
debug (messages used in debugging processes) and none (indication not to send specific
messages to the selected file).
when the syslog daemon (syslogd) starts up, it first reads its configuration file (usually
/etc/syslog.conf) to see where to log specific things. after that, syslog is in 'listening'
mode -- it listens for log messages from three sources. these three sources are: /dev/klog
(used to read messages from the kernel), /dev/log (Unix domain socket. used to read messages
generated by local processes) and UDP port 514 (Internet domain socket. used to read/get
messages generated by other machines in the local area network).
to specify what actions syslog should take when getting log messages you must edit the
/etc/syslog.conf file to suit your network organisation and architecture. here is an example
file (Digital Unix V4.0):

--
# example syslog.conf file:

kern.debug /dev/console
daemon, auth.notice /var/adm/messages
auth.* @loggingHost.com, /dev/ttya
syslog.* /var/adm/syslog/syslog.log
lpr.debug root, operator
*.emerg *
--

note: when writing a syslog.conf file be sure to use TABs and not spaces!

you can see that each line has two arguments: a message selector field (for declaring which
actions and messages to log) and an action file (which specifies what to do with the logs).
the message selector field is divided into two parts: a facility and a priority.
for exmaple, kern.debug specifies that syslog should log all messages for the kernel which
have to do with debugging. you can also put an asterisk sign ('*') to specify all. for
example, *.debug would specify to log all debugging messages. kern.* would specify to log
all kernel messages.
the action field specifies what to do with the log files. there are five actions to choose
from: log to a file or device (in this case the field must include path of the file or
device), send a message to a specific user (sends a message to the specified user(s) only if
they are logged in (according to utmp)), send a message to all users (send a global message
to all users on the system. in this case there should be an asterisk sign in the action
field), send a message to a program (in this case you must include a pipe sign ('|') and
path to the specified program/action, such as sendmail) and send a message to a remote host
(you must include '@' and a hostname).
i will now explain line by line our syslog.conf example. the first line logs debugging
messages from the kernl to the system console device (/dev/console). the second line logs
daemon and authorization notice messages into the messages logging service. the third line
logs all authorization messages and sends them to a remote host in the local network (this
is a really good idea for a system administrator) and to a line printer which is connected
to the /dev/ttya. the fourth line logs all syslog messages into a file called syslog.log.
then we have an instruction which logs all line printer debugging messages and sends them
to two users: root and operator (if they are logged in). the last line logs all emergency
errors from all services and sends them across the system to all online users.
syslog is a great security service. it administrated correctly you can make it a powerful
audit tool. i recommend that you enable remote host logging to two or more computers in
your network (but remember that this chokes up traffic).

ACULOG -- each time you make a telephone call with your modem (dial-out call) it can be
recorded. this is activated by the command 'tip' or 'cu' (also, Berkeley version of UUCP
command). the entry is stored into a file called /etc/remote.

--
root (Tue Jul 20 08:50:22 1999) <network2, , /dev/cua> call completed
hacker (Tue Jul 20 11:03:10 1999) <mil dialout, 01283-9993, /dev/cua> call completed
--

in the first example, root made a call and connected directly to the modem. the user hacker
called the specific dial-out number. we see that both calls were completed.
this log utility is useful but isn't very detailed. for example, you don't have the duration
of the call.

SULOG -- newer version of the 'su' program log directly to their own log file called sulog
instead of using the messages log file. under System V Unix you can set some options for
sulog in a file called /etc/default/su:

--
# file to log all su attempts
SULOG=/var/adm/sulog
# device to log all su attempts
CONSOLE=/dev/console
# log using the syslog facility?
SYSLOG=yes
--

here is an example file from a computer running Ultrix V4.2A:

--
BADSU: hacker /dev/ttyqc Tue Jul 20 15:24:00 1999
BADSU: hacker /dev/ttyqc Tue Jul 20 15:25:24 1999
SU: hacker /dev/ttyqc Tue Jul 20 15:30:13 1999
--

we can see two bad superuser attempts and one good -- the hacker finally guesses the 'su'
password.

XFERLOG -- if you use the Washington University FTP server, then you can enable session
logging to a file called xferlog which is located in the /var/adm directory (the location
is defined by the configuration variable _PATH_XFERLOG in the header file PATHNAMES.H).
here is an example log:

--
Tue Jul 20 20:22:04 1999 some.address 3920288 /etc/passwd a _ o a hacker@fake.com ftp
Tue Jul 20 21:45:33 1999 some.address 23043 /etc/host.deny a _ o a hacker@fake.com ftp
--

to explain this log file. the first entry is the date and time. then we have the hostname
and the size of the transfered file. after that is the file path, then file type (a = ASCII
or b = binary). then we have special action flag (T = tar archive, C = compressed, U =
uncompressed, _ = undefined), then the direction (o = outgoing, i = incoming). then user
type (a = anonymous + e-mail address, g = guest, r = local user with password) and then
service used (FTP by default).

also, remember that there are files like access_log (NCSA HTTPD server logger), maillog
(mail utility logger), etc. all of these depend on what software you have installed so
take a closer look at your manuals to see which log utilities you have on your system.
another things is Network Services logging -- inetd. you can add a '-t' (trace) flag to log
every TCP/UDP connection made to your host. the log will appear in /var/adm/messages.
other than this you can use TCP Wrappers and log all incoming connections.

as you can see, there is a huge variety of system log utilities. some are more important
than others, but all should be activated. don't hesitate to be paranoid -- most of the times
it will save you the effort of catching a hacker.

Shell history files:
--------------------*

other than logs previously described, shell history files are also a security measurement.
newer shells keep a record of all commands you typed into a hidden file in your home
directory. BASH shell uses .bash_history, KSH and SH shells use .sh_history, CSH and ZSH
use .history. SH ($ prompt) and CSH (% prompt) do not use history saving by default,
therefore it is a good idea for a hacker to first change the shell to SH or CSH.
other than this, a hacker should link the history file with /dev/null (using the command
'ln -s /dev/null .bash_history' for BASH shell). if no other option is left one should
simply delete the history file, or modify it from another shell which doesn't save the
command history (SH or CSH as stated above).

Security measures:
------------------*

i recommend that you put superuser permissions on all log files on your system. if a hacker
compromises a normal account but can't get to the root privileges this will make his life
harder. also, keep backups of your logs. this should be done daily with crontab jobs. you
can also make use of simple shell scripts such as this one:

--
#!/bin/ksh
BFILE=$(date +backup.%y.%m.%d.tar.Z)
cd /var/adm
tar cf - . | compress > ../adm.backups/$BFILE
exit 0
--

you can run this script every night. it compresses the whole /var/adm directory using 'tar'
and then uses the 'compress' command to shorten the output file. after that it puts the
result file into a directory called /var/adm.backups under a name which is called after
the time and date of that action. these backups should then be transfered to another
guarded computer inside your network or to an external media drive (CD-ROM, floppy, etc.).
the best security measure would be to put all log files to a remote computer in your
network. this computer should then be physically and remotely secured. you should put a
firewall to guard that computer:

internal, private network

computer 1 ----- computer 2 ----- computer 3 ----- computer 4 \
|
|
remote log computer

to send logs to this remote host you have to configure your syslog.conf file (as mentioned
earlier). however, you can also make two or more remote log computers. this will tighten
up security (remember, though, that this also chokes up traffic inside your network).
remember not to use same passwords, or even operating systems on these remote log computers.
other than logging to a remote computer, you can also log directly to a network printer.
to do this just put a line into syslog.conf which will redirect all logs of your choice to
the printer. also, be sure not to log to the printer solely -- use another device for backup
logging in case of an emergency.

Fooling the logs:
-----------------*

first off, every intruder should spoof his/her IP address before attacking. my method of
secure

  
hacking a host is as follows. first try to get an anonymous telephone line. this can
be done either by connecting your laptop computer on to a payphone or to someone's phone
line. after that, spoof your IP address. then use two or three gateway computers and finally
reach your target host. therefore, even if they log your attempts of entry they will get
nothing -- you don't exist.
basically, try to explore your host. try to get an account at the ISP where users from your
target have accounts on. that way, if you can't get root you won't be so suspicious (unless
you make something stupid).
if you enter the system first change your shell to SH or CSH (i recommend CSH). from there
alter the shell history file ('ls -al' from your home directory will show you hidden files)
and link it with /dev/null -- of course, only if it exists. you can also try an old trick:
type 'unset HISTFILE' when you enter the host -- this will stop history logging.
after that you have a variety of logs to modify. this can, however, only be done by having
superuser, root, privileges. if you don't have root you have one option left. don't alter
anything on the system (except the history file) and run 'rlogin' to 127.0.0.1 (localhost).
by doing this you will alter the lastlog file to show entry from localhost and, if you
remember, there won't be a trace in lastlog of your entry.
if you get root you have a couple of programs for log altering to choose from:

Name of the cleaner: Purpose of the program:
--------------------*--------------------------------------------------------------------*
clear.c deletes entries in utmp, wtmp, lastlog and wtmpx.
cloak2.c changes entries in utmp, wtmp and lastlog.
invisible.c overwrites values in utmp, wtmp and lastlog with predefined values.
marryv11.c edits utmp, wtmp, lastlog and acct.
hide.c changes entries in utmp.
remove.c deletes entries in utmp, wtmp and lastlog.
wipe.c deletes entries in utmp, wtmp, lastlog, acct (pacct), utmpx and
wtmpx.

note: do not use zap.c or zap2.c, these programs only put zeros in the log files. CERT
released a special program which checks for zeros, and can therefore determine that
the system was compromised by a hacker.

when you upload or create (retype -- if you're really paranoid of xferlog and similar FTP
log utilities) a log modifier or your choice (i highly recommend wipe.c because it can be
used on almost all Unix-like distributions and can modify 6 log types), simply compile it
and run with appropriate arguments (usually a username which you want to clear).
remember to check the log files after modification. do this with 'who', 'w' and 'last'
commands.
also, before leaving take a look at the syslog.conf file. you will find all sorts of things
there (of course if the service is active). take a look if there is remote host logging
involved. if there is, then try to hack into that host although many times admins leave the
same passwords for all hosts in the local network. after you enter that computer erase and
modify all logs that have to do with you, and of course alter the syslog file on the primary
host so it doesn't log remotely any more.
if you find out that they are using a printer to view the logs then first look at the active
process list ('ps' command). if you find a print action there kill it and remove the command
line for printing from the syslog.conf file (remember, however, that everything that was
printed out cannot be modified (unless you physically get to your host)).
also it would be a good idea to flood the syslog UDP port (514) if it's active (it is by
default) with a Denial of Service attack. in this way you will crash the syslog daemon and
you will stop all logging services on the target host.

Conclusion:
-----------*

Unix loggers are very important for every system. if you are a system administrator i highly
recommend that you make a remote log facility computer and gaurd it with a firewall inside
your network.
on the other hand, if you're exploiting the use of log files try to look for them constantly
because paranoia can be very useful.

Appendix:
---------*

I have included two files to this article: wipe-100.tgz (Wipe log cleaner version 1.00) and
lastlogReader.pl (Perl script for reading lastlog files).

http://default.net-security.org/7/wipe-100.tgz
http://default.net-security.org/7/lastlogReader.pl



airWalk
interScape Security Resources
http://interscape.net-security.org






XII. Freedom of speech - related incidents
------------------------------------------

*******************************************************************
You cannot put a rope around the neck of an idea;
you cannot put an idea up against the barrack-square wall and
riddle it with bullets; you cannot confine it in the strongest prison
cell your slaves could ever build.
--Sean O'Casey

*******************************************************************
Every day the battle between freedom and repression rages through the global ether.
Here are this week's links highlights from NewsTrolls(http://www.newstrolls.com):
*******************************************************************

Thursday, September 23:

Louisiana students reject wearing
<http://www.worldnetdaily.com/bluesky_bresnahan/19990923_xex_tagged_stude.shtml>
Pepsi-logo'ed, Social Security bar code ID cards around their necks at all times...

and one student
<http://www.geocities.com/SiliconValley/Bridge/1086/School/barcodes.html>
breaks the easy encryption and shows other how easy the encryption is to break...

From the Rules
<http://www.cab.latech.edu/ruston/rhs/hand2.htm>
Concerning ID Card:

"The I.D. card must be in the possession of the student at all times while at school,
and penalties for non-possession will range from a detention assignment for a first
violation, to suspension from school for later or major violations. Refusal to submit
I.D. card is an automatic suspension, effective immediately."


--------------------------------------------------------------------------

Weekend, September 24-26

Giuliani's attempt at censorship
<http://www.nypost.com/news/14547.htm>
won't hold up in court...

"The one thing the city cannot do is use the power over the purse to
punish dangerous ideas." The experts agreed with Giuliani that the city is
under no obligation to fork over money to the Brooklyn Museum of Art - as
the U.S. Supreme Court ruled in a case of federal funding for the arts last June.
"But once it funds, and then decides to de-fund one part of the arts community - if
that decision is designed to suppress views - there's a First Amendment problem,"
said Norman Siegel of the New York Civil Liberties Union."

UK's Orwellian camera use
<http://www.newscientist.com/ns/19990925/caughtonca.html>
on mall shoppers...

81.4% of women in Arusha region in Africa have
<http://www.africanews.org/PANA/news/19990923/feat9.html>
had their genitals mutilated...

"The practice is so deeply embedded in those communities that a woman
who escapes the practice as a child would certainly be "operated on" during
her first delivery - against her will. Findings have revealed that the operation
is also carried out on very young girls, including toddlers, "so that they will
not rebel and bring shame to their families." When asked, the communities
say they perform female genital mutilation as a means of controlling women's
sexual drive so that they remain faithful to their husbands. Other reasons given,
according to the research, include the belief that the female private part is
dirty and it is more hygienic if the clitoris is removed. There are also communities
who believe that the clitoris will kill a child coming through the birth canal,
if the organ is not removed in good time. "

----------------------------------------------------------------------------

Monday, September 27

Guarani Indians of the Brazilian Jungle get an
<http://www.foxnews.com/js_index.sml?content=/scitech/092599/brazil.sml>
IT school for their village... but they still need phone lines for Internet
access...

""We usually confront religious sects and campers who invade our lands with
poisoned arrows", said Jo?o da Silva, the 85-year-old tribal chieftain. "But
computers are different. They will help us protect and defend our traditions".
Girls in tasseled skirts and boys in loincloths performed a ritual song and dance
to welcome the arrival of the PCs which they have named "ayu ryrurive" - meaning
"boxes to store language" in Guarani. "We need to learn the technology of white
men in our fight to keep and protect our lands, culture and young people," said
the chief."

Hmm...is the FBI planning to round up dissidents and blacks
<http://216.46.238.34/showinsidecover.shtml?a=1999/9/26/144339>
in their Y2K operation Mad Max???

"The ten-year FBI veteran contends that U.S. intelligence agencies, including the
FBI, the CIA, Navy Intelligence and other intelligence services, have drawn up
plans in case a Y2K "castastrophe" hits next January. But beyond January, says
Powers, "they were also preparing for Y2K-related events to occur throughout the
year 2000. In fact, they were planning for operations as far down as June, when
the weather turns warm in certain cities." The "Mad Max" plan, named after the
1980s Mel Gibson film depicting the total breakdown of social order, is a worst-case
contingency plan, claims Powers. "The FBI expects, in this [worst] case scenario,
that people would begin to riot and loot. And specifically they believe this would
happen in urban areas among black citizens," says the retired agent."

-------------------------------------------------------------------------------

Tuesday, September 28

ABC publishes IP addresses of
<http://www.sjmercury.com/svtech/news/breaking/merc/docs/081486.htm>
chat room participants

Appeals court decides publishers cannot include freelance writers' work
<http://www.sjmercury.com/breaking/docs/022316.htm>
in their databases without permission

Over 2 million farmers in China were duped into
<http://www.insidechina.com/news.php3?id=95254>
now-collapsed investment firms ...

"The three organizations were founded in the early 1990s with the approval
of the ministry of agriculture and were designed to use interest from farmers'
investments to provide loans for machinery and equipment. More than two
million farmers invested in the organizations, attracted by interest rates in
excess of 15 percent, the center said. "But because of serious corruption at
the administrative level, much of the invested money cannot be repaid," center
spokesman Frank Lu said. More than 40 billion yuan ($4.8 billion) was deposited
by farmers across the province, of which 10 billion yuan ($1.2 billion) has been
lost, he said, adding that the government had only committed to repay one billion
yuan. As a result, more than 50 protests involving 5,000 farmers have erupted in
the province since the beginning of the month, while 10 farmers were detained by
police in Qidong county during one of the demonstrations. "

------------------------------------------------------------------------------

Wednesday, September 29

China bans Time Magazine even though
<http://www.sjmercury.com/breaking/docs/074660.htm>
Time is hosting a buisness forum in Shanghai...

"But the edition, whose masthead was emblazoned with the headline
``China's Amazing Half-Century,'' fell foul of Chinese censors by including
articles written by exiled dissidents Wei Jingsheng and Wang Dan, and the
Tibetan Dalai Lama."

And check out this quote from the same article on Summer Redstone kow-towing to the
Chinese Communist Party regarding MTV...

"Another conference delegate, Sumner Redstone, chairman of Viacom Inc,
made clear that his rock music video channel MTV would not challenge China's
Communist authorities. ``You can rest assured we are not going to take any
action with respect to our content that is displeasing to the Chinese government.''"

-----------------------------------------------------------------------------
Thursday, September 30

Wei Jingsheng emails China
<http://news.excite.com/news/r/990930/09/net-china-wei?printstory=1>
from Paris...

"Chinese dissident Wei Jingsheng sent e-mail messages to Beijing from Paris Thursday
to protest against official controls over the Internet and harassment of "cyber-dissidents"
by China. Wei, sitting before a screen in a cyber cafe in the French capital, e-mailed the
text of article 19 of the Universal Declaration of Human Rights, of which China is a
signatory and which guarantees freedom of speech, to five official or government-linked
addresses. They were the Chinese Foreign Ministry, CCTV state television, the Chinese
Internet information center and Peoples's Daily and China Daily newspapers. "They
have the power and the money but we have imagination and justice on our side," said
the exiled dissident, who now lives in the United States."

You can send
<http://www.rsf.fr/uk/alaune/opmail/mail19.html>
the same letter

----------------------------------------------------------------------------
Weekend Edition, Oct 1-3

Mourning the death of
<http://newstrolls.com/news/dev/guest/100199.htm>
80 million Chinese...

Tibetans are being forced to
<http://www.scmp.com/News/China/Article/FullText_asp_ArticleID-19991001032529583.asp>
take part in the celebrations

""Tibetans in Lhasa have been told that their pay or pension will be cut if
they fail to take part in rehearsals for celebrations of the 50th anniversary,"
the London-based Tibet Information Network said. Children and retirees had
been required to memorise patriotic songs and attend dance classes in the
run-up to the celebrations, in which they would be ordered to wave
Chinese flags, it said. "

Victorious Burmese Student Warriors, pro-democracy students, take hostages at Burmese Embassy
<http://www.scmp.com/News/Front/Article/FullText_asp_ArticleID-19991001174609704.asp>
demanding the release of all political prisoners in Burma


In just one week...

diva aka Pasty Drone
CEO
NewsTrolls, Inc.
"Free Minds...Free Speech...NewsTrolls"
http://www.newstrolls.com
pastydrone@newstrolls.com

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT