[7798] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Security Hole in Axent ESM

daemon@ATHENA.MIT.EDU (Bert Driehuis)
Sat Aug 29 21:51:58 1998

Date: 	Sat, 29 Aug 1998 22:44:12 +0200
Reply-To: bert_driehuis@NL.COMPUWARE.COM
From: Bert Driehuis <bert_driehuis@NL.COMPUWARE.COM>
X-To:         "Mark (Mookie)" <mark@ZANG.COM>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <199808280933.CAA06281@zang.com>

On Fri, 28 Aug 1998, Mark (Mookie) wrote:

> >ESM does not only look at CRC's to verify if a file is genuine.  It also looks
> >at the timestamps; both the m-time and the c-time.  m-times are easy to change,
> >c-times are a lot harder and leave a trace.

[snip]

> This doesn't leave a trace. There are numerous other programs to completely
> replace all timestamps as normal, undetected. Technology has come a long way
> since the above was written.

This is why BSD/OS since version 3.0 disallows setting the clock
backwards when running at normal securelevel. I think more operating
systems need that feature. Subverting timestamps in this environments
becomes much harder.

Cheers,

                                        -- Bert

Bert Driehuis, MIS -- bert_driehuis@nl.compuware.com -- +31-20-3116119
The grand leap of the whale up the Fall of Niagara is esteemed, by all
who have seen it, as one of the finest spectacles in nature.
                -- Benjamin Franklin.

home help back first fref pref prev next nref lref last post