Maximum Mac OS X Security

   

SSH can replace a number of protocols. Included here is some information on vulnerabilities for two of the most popular protocols it is used to replace: telnet and rlogin.

telnet

telnet's single largest vulnerability is in its specification, but as a demonstration of the additional insecurity that can be found, even in an application that never tried to be secure in the first place, we've included a listing of some recent telnet vulnerabilities, as well as NCSA Telnet vulnerabilities, since 1991. These telnet vulnerabilities turn out to be typical Unix application vulnerabilities, and problems of this type are common in most Unix network applications: vulnerabilities that can allow arbitrary execution of code as the process owner and a vulnerability that can lead to denial of service.

Although these vulnerabilities are serious, the most serious vulnerability that telnet has is its inherent cleartext nature. The telnet protocol transmits everything, including usernames and passwords, in cleartext. The best solution to this vulnerability is to not enable telnet, and not use it as a client. If you are curious about seeing what telnet traffic looks like, install Etherpeek, IPNetMonitor, or Snort, or use the built-in tcpdump program, or any other similar package on a machine, do a bit of telnetting around, and see how much you can see with the sniffers. You can find these programs at http://www.wildpackets.com/products/etherpeek_mac, http://www.sustworks.com/site/prod_ipm_download.html, http:// sourceforge .net/projects/snort/, and under man tcpdump in the man pages. The telnet protocol RFC is available at http://www.ietf.org/rfc/rfc0854.txt.

telnet vulnerabilities include the following:

rlogin

Like telnet, vulnerabilities involving rlogin include typical vulnerabilities: buffer overflows from which root access can be gained .

Although such vulnerabilities are serious, the most serious vulnerability with rlogin, like telnet, is that it transmits everything, including usernames and passwords, in cleartext. As with telnet, the best solution to this vulnerability is to not enable rlogind .

NOTE

Believe it or not, rlogin was an attempt at a secure protocol. It was developed at a time when Unix machines were owned by companies, and personal Unix machines were rare. Security-conscious system administrators did not want to incur security problems on either their own machines or someone else's. They never created an account for a "bad" user . Therefore, someone connecting to a system via rlogin was assumed to be a trustworthy user coming from another Unix system.

The rlogin RFC, available at http://www.ietf.org/rfc/rfc1282.txt, contains a cautionary tale on the security problems that spoofing a trusted host might incur. However, the RFC does not express any concern about rlogin's transmission of data in cleartext. Obviously, the author never envisioned a world with so many untrustable Unix hosts and users.

Vulnerabilities involving rlogin include:


   
Top

Категории