[LWN Logo]
[LWN.net]

Sections:
 Main page
 Security
 Kernel
 Distributions
 Development
 Commerce
 Linux in the news
 Announcements
 Back page
All in one big page

See also: last week's Security page.


News and Editorials

SSH 1.2.30 released, new restrictive license. Since we published last week's Security Summary, two new versions of SSH 1.2.X have been released, 1.2.29 and 1.2.30. Both of these newer versions include bug-fixes, some of them security-related. In addition, though, as a kicker, both of the new versions have an updated license, directly taken from the ssh 2.X series. The license for ssh 1.X and 2.X has never been totally free, but the original 1.X license allowed both commercial and non-commercial uses in most cases. As of this point, anyone wanting to continue to use the ssh 1.X series will probably need to purchase a commercial license in order to do so (student and faculty members using it for non-commercial or charitable purposes are excepted).

When we posted the above item on the LWN Daily Page earlier this week, we also pointed out the availability of OpenSSH, a free software alternative to SSH from the folks at OpenBSD. OpenSSH supports both the ssh 1 and ssh2 protocols. It seems likely that many people who haven't bothered to move from ssh to openssh, if only because of inertia, may decide to do so now that SSH Communications has decided to further restrict their licensing.

We must, however, include one caveat, courtesy of Dave Finton, who pushed us to investigate potential patent issues with OpenSSH. Although OpenSSH itself is a free software product, openssh 1.X does use the patented RSA algorithm, which could get a commercial company into trouble, if they choose to move to it:

SSH comes in two varieties. The older protocol 1 comes in two major variants: protocol 1.3 and protocol 1.5. Both are supported by OpenSSH. Both of these use the asymmetric cryptography algorithm RSA (which is patented in the USA) for key negotiation, and then use a short list of symmetric algorithms for data hiding: 3DES and Blowfish (there used to be a few others, but they had security problems). Some ssh 1 implementations also include the IDEA symmetric algorithm, but because it is patented in some nations, and because the other two supplied algorithms are sufficient, OpenSSH ships without it.
Our story still has a happy ending, though, because the newer openssh 2.X series has no dependence on any patented algorithms:
The other SSH variety is protocol 2. Protocol 2 was invented to avoid the patent issues regarding RSA, and to fix the CRC data integrity problem that SSH1 has. By using the asymmetric DSA and DH algorithms, protocol 2 avoids all patents.

ZDNet calls this outcome a Cinderella story, not just because OpenSSH was created as a free alternative to SSH, but because the project was already fully-developed and available to replace SSH Communication's ssh, the minute they chose to restrict their license too far. "The moral of this tale? Next time you encounter a piece of software whose license is too restrictive for your tastes, don't get mad; do what the OpenSSH project did and get even!"

For even more fun, check out the feedback on the above ZDNet article. One respondent compared the situation to another several years ago:

A similar Cinderella story occurred when University Minnesota put "excessively restrictive" licensing terms on commercial use of the then "open sourced" gopher software which triggered a flight of commercial users into the arms of a nascent technology out of CERN called world wide web. I was one of them.

Rain Forest Puppy's White Paper. In last week's Security Summary, we link to a ZDNet article that discusses a white paper from Rain Forest Puppy on proposed guidelines for researchers and vendors dealing with security issues. The ZDNet article did not provide a URL for RFP's white paper, which is available at http://www.wiretrip.net/rfp/policy.html. (Thanks to Alex Butcher, Brent J. Nordquist and others).

Openhack-interactive security redux (eWeek/ZDNet). eWeek/ZDNet promotes OpenHack, its current challenge/contest to hackers to break into a set of preconfigured systems. "Some in the industry say that hacking contests are just publicity stunts, positing that, since the typical prize money is so small, no hacker worth his or her salt would want to participate. My view is more practical. Hackers who deface Web sites aren't in it for the money. They may not even be in it for the publicity. They do it because they can."

Security Reports

/tmp vulnerabilities in XFree86 4.0.1. Joseph S. Myers reported a /tmp vulnerability in the installation program for XFree86 4.0.1, commenting that he had previously reported the same problem for XFree86 4.0 in March and that other such errors could be found elsewhere in XFree86. BugTraq ID 1430 gives a concise list of the vulnerabilities he has reported. No comment has been seen from the XFree86 development team as of yet, nor any distribution updates.

XFree86 4.0 local root vulnerability. FreeBSD has issued an advisory regarding a vulnerability in XFree86 4.0 that can be exploited by a local user to get root access. They provide updated packages but also discourage the installation of XFree86 4.X on multi-user systems with untrusted local users. They also indicated that XFree86 4.0.1 most likely contains a fix for this problem.

BitchX format bug. BitchX, a popular IRC client, contains an exploitable formatting error, both in 1.0c16 and 75p3. An exploit can take the client down remotely. Patches for both versions have been made available.

ftp setproctitle() vulnerability. A format string vulnerability in setproctitle() impacts multiple versions of ftp, including proftpd, wu-ftpd, FreeBSD, NetBSD and OpenBSD. An upgrade to proftpd 1.2 and FreeBSD 2.2 or later will fix the problem for those platforms.

LPRng incorrect file permissions. LPRng author Patrick Powell posted an advisory reporting that LPRng 3.6.15 and earlier incorrectly installed by default suid root. He identified a manner in which the root privilege could be exploited and recommended that all users of LPRng remove the suid root permissions or upgrade to LPRng 3.6.20, in which the installation no longer assigns suid root.

Note, however, that the removal of root permissions may break compatibility with the older lpr/lpd installations, according to Cy Schubert.

tnef remote compromise. SuSE issued a security advisory regarding a vulnerability in tnef that could be remotely exploited to overwrite system files. tnet is a program that extracts mail packaged in Microsoft Outlook format. Updated packages are provided.

FreeBSD: libedit. FreeBSD has issued an advisory for problems with the libedit library, where its use of a configuration file can be abused to cause a user of libedit to execute commands unknowingly. A patch for the problem is provided.

CGI scripts. The following CGI scripts were reported to contain vulnerabilities:

Commercial products. The following commercial products were reported to contain vulnerabilities:

Updates

wu-ftpd. Check the June 15th Security Summary for a link to the mini-audit that turned up the latest set of problems with wu-ftpd. wu-ftpd 2.6.1 contains fixes for this problem. Note that this is not the same problem as multiple vendor ftpd security report listed above.

man/makewhatis vulnerability. A /tmp file vulnerability has been found in makewhatis versions 1.5e and higher. Check last week's LWN Security Summary for the original report.

This week's updates:

Previous updates:

dump/restore. A security vulnerability in dump/restore has been fixed as of dump 0.4b18. Check the June 15th Security Summary for details.

canna. Check last week's Security Summary for more details.

Buffer overflow in inn. A buffer overflow in inn 2.2.2 has been reported that can be an issue if the option "verifycancels" in /etc/news/inn.conf is set to "true". Setting this option to "false" should fix the problem.

ISC DHCP client. Check the June 29th Security Summary for more details. An upgrade to 2.0pl1 or 3.0b1pl14 should resolve the problem.

Qpopper. Check the May 25th Security Summary for more details. Qpopper 3.0.2 or later should fix this problem.

OpenSSH. Check the June 15th Security Summary for details.

Majordomo wrapper vulnerability. Check the June 1st Security Summary for the initial report.

FreeBSD system call. FreeBSD has issued an updated advisory regarding a system call problem originally discussed in the June 1st Security Summary.

Resources

Bastille Linux 1.1.1.pre2. A minor update to the Bastille Linux security hardening script has been made available, including bug fixes and improvements to the API library.

Nessus 1.0.2. OpenBSD support has been added, as of this latest minor update to the Nessus security scanner.

Secure-Linux Patch 2.2.16 version 1. The secure-linux patch has been updated to support the latest stable kernel, 2.2.16.

PScan simple security scanner. In response to the growing number of reports of exploitable format string vulnerabilities, Alan DeKok announced PScan, a simple program that checks for potential format string problems in the source code.

Building Internet Firewalls, second edition released. O'Reilly has announced the release of the second edition of "Building Internet Firewalls". "The second edition is much expanded. It covers Linux and Windows NT, as well as Unix platforms. It describes a variety of firewall technologies (packet filtering, proxying, network address translation, virtual private networks) as well as architectures (e.g., screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls)."

Cybernotes (July 3rd). The July 3rd edition of Cybernotes, a publication from the National Infrastructure Protection Center (NIPC), is now available (PDF format). Cybernotes is published bi-weekly and produces a spread-sheet-like listing of reported vulnerabilities and affected operating systems.

Events

July/August security events.
Date Event Location
July 14-16, 2000. H2K / HOPE 2000 New York, New York, USA.
July 26-27, 2000. The Black Hat Briefings Las Vegas, Nevada, USA.
July 28-30, 2000. DEF CON VIII Las Vegas, Nevada, USA.
August 14-17, 2000. 9th Usenix Security Symposium Denver, Colorado, USA.
August 14-18, 2000. Ne2000 (Networking 2000) Lunteren, The Netherlands
August 18-20, 2000. Hack Forum 2000 Ukraine
August 20-24, 2000. Crypto 2000 Santa Barbara, California, USA
Aug 22-23, 2000. WebSec 2000 San Francisco, California, USA
For additional security-related events, included training courses (which we don't list above) and events further in the future, check out Security Focus' calendar, one of the primary resources we use for building the above list.

Section Editor: Liz Coolbaugh


July 13, 2000


Secure Linux Projects
Bastille Linux
Immunix
Khaos Linux
Nexus
Secure Linux
Secure Linux (Flask)
Trustix

Security List Archives
Bugtraq Archive
Firewall Wizards Archive
ISN Archive

Distribution-specific links
Caldera Advisories
Conectiva Updates
Debian Alerts
Kondara MNU/Linux Advisories LinuxPPC Security Updates
Mandrake Updates
Red Hat Errata
SuSE Announcements
Yellow Dog Errata

Security Software Archives
munitions
ZedZ.net (formerly replay.com)

Miscellaneous Resources
CERT
CIAC
Comp Sec News Daily
Crypto-GRAM
LinuxLock.org
Linux Security Audit Project
LinuxSecurity.com
OpenSSH
OpenSEC
Security Focus
SecurityPortal

 

Next: Kernel

 
Eklektix, Inc. Linux powered! Copyright © 2000 Eklektix, Inc., all rights reserved
Linux ® is a registered trademark of Linus Torvalds