[2080] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Macintosh Web Server Issues

daemon@ATHENA.MIT.EDU (Chris Garrigues)
Mon May 13 20:00:45 1996

To: kgmlists@3rdmill.com (Karl Mitze)
Cc: www-security@ns2.rutgers.edu, cwg@deepeddy.DeepEddy.Com
In-Reply-To: Your message of "Mon, 13 May 1996 10:19:04 EDT."
             <v01510101adbcef4523f8@[206.119.50.25]> 
Date: Mon, 13 May 1996 15:38:17 -0500
From: Chris Garrigues <cwg@DeepEddy.Com>
Errors-To: owner-www-security@ns2.rutgers.edu

-----BEGIN PGP SIGNED MESSAGE-----

Content-Type: text/plain; charset=us-ascii

Unfortunately I don't have the reference handy, but several months ago, a challenge was put out to the net community to break into a WebStar server.  The money wasn't paid out.

The fact is that a Mac running WebStar is far easier to secure than a Unix box.  The problem with the Unix box is that it starts out listening all over the place and you have to turn all those things off w/o making the system unusable.  A mac, on the other hand, starts out listening to *nothing* and you then enable the services that you want to provide.

You don't find very much on securing a mac because there's so little to do.

For me, "Due dilligence" probably means:

	1) Running Satan or something like it to see what ports your 
	   system is listening on, and if there's anything you didn't 
	   know was there disabling it.  (Note that Satan will *not* get
	   into your system because it only exploits known unix holes.
	   However, it will tell you what ports are being listened to.)
	2) Vetting any and all CGI scripts to make sure that they do 
	   what you think they do and only what you think they do.
	   This particularly means making sure that input is never
	   parsed as a command of any sort.  Again, on a Mac, there are
	   fewer ways for this to happen.
	3) If you're also running an FTP server, make sure it's not possible
	   for an FTP user to put an executable script somewhere that it could
	   be run as a CGI by your web server.  (The easiest way to do this
	   is to make sure that your web hiearchy and your FTP hiearchy
	   don't share any folders.)  A similar warning holds for any other
	   combination of "ways to put files on the server" and "ways to run
	   files on the server".

a mail server is a potential risk, but one thing you have going for you is that anybody trying to crack your site will assume that you're running sendmail on a Unix box and if there are security holes in your mail server, they probably won't look for them.  On the other hand, I apparently sent someone's Mac-based mail server into a tail-spin by sending a PGP-signed email message.   The rule of thumb is that the more commonly a package is used, the fewer security holes it will have, but the more likely those that it does have are will be known.  Make sure you stay in contact with your vendor for any security patches.

Chris


- -- 
Chris Garrigues                    O-              cwg@DeepEddy.Com
  Deep Eddy Internet Consulting                     +1 512 432 4046
  609 Deep Eddy Avenue
  Austin, TX  78703-4513              http://www.DeepEddy.Com/~cwg/



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQB1AwUBMZeds5aQnaaFII2dAQGRgAL/WrcToya5p+zB6KBdcjZ02vOOWhPIOUTu
vXRWnQ/54fvQLHXioFzfGge3PvSBwZIT3yPVXQhD5zKIeDSI3oAyVA2xq72yO9I+
zPmWi09K2X3YqBM5APjtdS3D2sLzc/Zn
=+rvO
-----END PGP SIGNATURE-----

home help back first fref pref prev next nref lref last post